Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe

Overview

General Information

Sample name:SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
Analysis ID:1471674
MD5:a6d83330743edcff48a85dfa1013fdab
SHA1:0aa8362a86274edcba3c111e8d729b1e0198a92b
SHA256:03c769a2c069d127c2d9a5103853218a8f108074f0012776ff871dadf346c39e
Tags:exe
Infos:

Detection

Petite Virus
Score:42
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Petite Virus
Installs Task Scheduler Managed Wrapper
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries keyboard layouts
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe (PID: 2300 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe" MD5: A6D83330743EDCFF48A85DFA1013FDAB)
    • SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp (PID: 2828 cmdline: "C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp" /SL5="$103DA,8156847,189952,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe" MD5: B3937B0F947BBEB9F93859803C6FD14E)
      • BA002.exe (PID: 1436 cmdline: "C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe" MD5: 9AA0F5A7FBC6F7A2E6FEAF78F8E6B7D7)
        • installer.exe (PID: 3352 cmdline: .\installer.exe MD5: 4D66DE397B5BF1F085AA7046A578A34C)
          • GenericSetup.exe (PID: 1804 cmdline: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe MD5: 1F4C6E7D827B980005B2C9C057018BD0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\BurnAware Free\is-QUKL7.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
    C:\Program Files (x86)\BurnAware Free\is-7RQ8V.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
      C:\Program Files (x86)\BurnAware Free\is-PBHEO.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
        C:\Program Files (x86)\BurnAware Free\is-BSUHA.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
          C:\Program Files (x86)\BurnAware Free\is-KTHJV.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            00000002.00000002.3970419543.0000000006271000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              00000002.00000002.3970419543.000000000608D000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
                SourceRuleDescriptionAuthorStrings
                2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60b1e6f.2.unpackJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
                  2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60ad2ab.1.unpackJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
                    2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.608ee0f.3.raw.unpackJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
                      2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60b1e6f.2.raw.unpackJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
                        2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60ad2ab.1.raw.unpackJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
                          Click to see the 1 entries
                          No Sigma rule has matched
                          Timestamp:07/11/24-19:39:38.782654
                          SID:2025537
                          Source Port:49740
                          Destination Port:80
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/11/24-19:39:44.565238
                          SID:2849740
                          Source Port:49751
                          Destination Port:443
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/11/24-19:39:40.960268
                          SID:2849741
                          Source Port:49745
                          Destination Port:443
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/11/24-19:39:42.215264
                          SID:2849740
                          Source Port:49747
                          Destination Port:443
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/11/24-19:39:43.806977
                          SID:2849740
                          Source Port:49749
                          Destination Port:443
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/11/24-19:39:42.987417
                          SID:2849740
                          Source Port:49748
                          Destination Port:443
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:07/11/24-19:39:39.840011
                          SID:2849740
                          Source Port:49742
                          Destination Port:443
                          Protocol:TCP
                          Classtype:A Network Trojan was detected

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeReversingLabs: Detection: 13%
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00F87E70 CryptAcquireContextW,___std_exception_copy,CryptCreateHash,___std_exception_copy,CryptHashData,___std_exception_copy,CryptGetHashParam,6_2_00F87E70
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FF01E0 CryptAcquireContextA,CryptCreateHash,6_2_00FF01E0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FF0240 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,6_2_00FF0240
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FF0220 CryptHashData,6_2_00FF0220
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FEEB50 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,6_2_00FEEB50
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FEEE50 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,6_2_00FEEE50
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00F8F870 CryptReleaseContext,CryptDestroyHash,6_2_00F8F870
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: mov dword ptr [ebx+04h], 424D53FFh6_2_00FDC1C0
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                          Source: unknownHTTPS traffic detected: 104.16.213.94:443 -> 192.168.2.6:57188 version: TLS 1.0
                          Source: unknownHTTPS traffic detected: 104.16.149.130:443 -> 192.168.2.6:57184 version: TLS 1.0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\2024.07.11_13.50.15.338184_installer_pid=3352.txtJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\GenericSetup.exe.logJump to behavior
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeStatic PE information: certificate valid
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Source: Binary string: E:\Installer\Source\InstallerStealth\DevLib\obj\Release\DevLib.pdb source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdb source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Win32.TaskScheduler.dll.4.dr
                          Source: Binary string: E:\Installer\Source\InstallerStealth\WizardPages\obj\Release\WizardPages.pdb source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr
                          Source: Binary string: E:\Installer\Build\installer.pdb source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, installer.exe, 00000006.00000000.2432182463.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe, 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe.4.dr
                          Source: Binary string: E:\Installer\Source\InstallerStealth\OfferInstaller\obj\Release\OfferInstaller.pdb source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, OfferInstaller.exe.4.dr
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_00405434 FindFirstFileA,FindFirstFileW,4_2_00405434

                          Networking

                          barindex
                          Source: TrafficSnort IDS: 2025537 ET MALWARE Lavasoft PUA/Adware Client Install 192.168.2.4:49740 -> 104.16.148.130:80
                          Source: TrafficSnort IDS: 2849740 ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI 192.168.2.4:49742 -> 104.16.148.130:443
                          Source: TrafficSnort IDS: 2849741 ETPRO MALWARE Suspicious Domain (sos .adaware .com) in TLS SNI 192.168.2.4:49745 -> 104.16.212.94:443
                          Source: TrafficSnort IDS: 2849740 ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI 192.168.2.4:49747 -> 104.16.148.130:443
                          Source: TrafficSnort IDS: 2849740 ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI 192.168.2.4:49748 -> 104.16.148.130:443
                          Source: TrafficSnort IDS: 2849740 ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI 192.168.2.4:49749 -> 104.16.148.130:443
                          Source: TrafficSnort IDS: 2849740 ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI 192.168.2.4:49751 -> 104.16.148.130:443
                          Source: global trafficHTTP traffic detected: POST /v1/bundle/list/?bundleId=BA002 HTTP/1.1Content-Type: application/json;charset=utf-8Host: sos.adaware.comContent-Length: 185Connection: Keep-Alive
                          Source: global trafficHTTP traffic detected: POST /v1/event-stat/?ProductID=IS&Type=BundleInstallStart HTTP/1.1Content-Type: application/json;charset=utf-8Host: flow.lavasoft.comContent-Length: 848Connection: Keep-Alive
                          Source: global trafficHTTP traffic detected: POST /v1/event-stat/?ProductID=IS&Type=BundleProposedOffersIsEmpty HTTP/1.1Content-Type: application/json;charset=utf-8Host: flow.lavasoft.comContent-Length: 230
                          Source: global trafficHTTP traffic detected: POST /v1/event-stat/?ProductID=IS&Type=PageShown HTTP/1.1Content-Type: application/json;charset=utf-8Host: flow.lavasoft.comContent-Length: 188
                          Source: global trafficHTTP traffic detected: POST /v1/event-stat/?ProductID=IS&Type=BundleInstallComplete HTTP/1.1Content-Type: application/json;charset=utf-8Host: flow.lavasoft.comContent-Length: 1283
                          Source: global trafficHTTP traffic detected: POST /v1/event-stat/?ProductID=IS&Type=ProfileDebug HTTP/1.1Content-Type: application/json;charset=utf-8Host: flow.lavasoft.comContent-Length: 2860
                          Source: global trafficHTTP traffic detected: POST /v1/event-stat?ProductID=IS&Type=StubStart HTTP/1.1Host: flow.lavasoft.comAccept: application/jsonContent-Type: application/jsoncharsets: utf-8Content-Length: 274Data Raw: 7b 22 44 61 74 61 22 3a 7b 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 4f 73 56 65 72 73 69 6f 6e 22 3a 22 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 20 28 62 75 69 6c 64 20 31 39 30 34 35 29 2c 20 36 34 2d 62 69 74 22 2c 22 44 6f 74 4e 65 74 46 72 61 6d 65 77 6f 72 6b 22 3a 22 33 2e 35 2c 20 34 2e 30 20 43 6c 69 65 6e 74 2c 20 34 2e 30 20 46 75 6c 6c 2c 20 34 2e 35 2c 20 34 2e 35 2e 31 2c 20 34 2e 35 2e 32 2c 20 34 2e 36 2c 20 34 2e 36 2e 31 2c 20 34 2e 36 2e 32 22 7d 7d 0a Data Ascii: {"Data":{"BundleId":"BA002","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","OsVersion":"Microsoft Windows 10 (build 19045), 64-bit","DotNetFramework":"3.5, 4.0 Client, 4.0 Full, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2"}}
                          Source: global trafficHTTP traffic detected: POST /v1/event-stat?ProductID=IS&Type=StubBundleStart HTTP/1.1Host: flow.lavasoft.comAccept: application/jsonContent-Type: application/jsoncharsets: utf-8Content-Length: 151Data Raw: 7b 22 44 61 74 61 22 3a 7b 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 49 6e 50 72 6f 63 65 73 73 22 3a 22 74 72 75 65 22 7d 7d 0a Data Ascii: {"Data":{"BundleId":"BA002","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","InProcess":"true"}}
                          Source: Joe Sandbox ViewIP Address: 104.16.149.130 104.16.149.130
                          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                          Source: unknownHTTPS traffic detected: 104.16.213.94:443 -> 192.168.2.6:57188 version: TLS 1.0
                          Source: unknownHTTPS traffic detected: 104.16.149.130:443 -> 192.168.2.6:57184 version: TLS 1.0
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FCD610 recv,WSAGetLastError,6_2_00FCD610
                          Source: global trafficDNS traffic detected: DNS query: www.google.com
                          Source: global trafficDNS traffic detected: DNS query: flow.lavasoft.com
                          Source: global trafficDNS traffic detected: DNS query: sos.adaware.com
                          Source: unknownHTTP traffic detected: POST /v1/bundle/list/?bundleId=BA002 HTTP/1.1Content-Type: application/json;charset=utf-8Host: sos.adaware.comContent-Length: 185Connection: Keep-Alive
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://counter-strike.com.ua/
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005F98000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005B50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000006107000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005BDE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3965128605.000000000018D000.00000004.00000010.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.000000000608D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, BA002.exe.2.dr, is-BLFBV.tmp.2.dr, is-5QV8V.tmp.2.dr, is-F96N3.tmp.2.dr, is-BDOB3.tmp.2.dr, is-LACR3.tmp.2.dr, is-2A9L3.tmp.2.dr, is-KN6PN.tmp.2.dr, is-QIUH5.tmp.2.dr, is-FLSM1.tmp.2.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005F98000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005B50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000006107000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005BDE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3965128605.000000000018D000.00000004.00000010.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.000000000608D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, BA002.exe.2.dr, is-BLFBV.tmp.2.dr, is-5QV8V.tmp.2.dr, is-F96N3.tmp.2.dr, is-BDOB3.tmp.2.dr, is-LACR3.tmp.2.dr, is-2A9L3.tmp.2.dr, is-KN6PN.tmp.2.dr, is-QIUH5.tmp.2.dr, is-FLSM1.tmp.2.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng3.crl0
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://crl.globalsign.com/root.crl0Y
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                          Source: installer.exe, 00000006.00000002.3965677324.00000000006C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStart
                          Source: installer.exe, 00000006.00000002.3965677324.00000000006C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStartU
                          Source: installer.exe, 00000006.00000002.3965677324.00000000006C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubStart
                          Source: is-BDOB3.tmp.2.drString found in binary or memory: http://lame.sf.net
                          Source: is-BDOB3.tmp.2.drString found in binary or memory: http://lame.sf.net1.0LAME3.99rLAME3.99r43.99.4
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005F98000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005B50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000006107000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005BDE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3965128605.000000000018D000.00000004.00000010.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.000000000608D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, BA002.exe.2.dr, is-BLFBV.tmp.2.dr, is-5QV8V.tmp.2.dr, is-F96N3.tmp.2.dr, is-BDOB3.tmp.2.dr, is-LACR3.tmp.2.dr, is-2A9L3.tmp.2.dr, is-KN6PN.tmp.2.dr, is-QIUH5.tmp.2.dr, is-FLSM1.tmp.2.drString found in binary or memory: http://ocsp.comodoca.com0
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://ocsp.thawte.com0
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng30V
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng3ocsp.crt04
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                          Source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://webcompanion.com/privacy
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.drString found in binary or memory: http://webcompanion.com/terms?http://webcompanion.com/privacyOOptional
                          Source: is-BDOB3.tmp.2.drString found in binary or memory: http://www.audiocoding.com/)
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.000000000236D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.burnaware.com/
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.burnaware.com/2http://www.burnaware.com/2http://www.burnaware.com/&
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3968953523.0000000003419000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3968953523.00000000033ED000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.burnaware.com/after-install.html
                          Source: is-FLSM1.tmp.2.drString found in binary or memory: http://www.burnaware.com/update.verU
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005B50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005BDE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3965128605.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-5QV8V.tmp.2.drString found in binary or memory: http://www.burnaware.comD
                          Source: is-F96N3.tmp.2.dr, is-LACR3.tmp.2.dr, is-2A9L3.tmp.2.dr, is-KN6PN.tmp.2.dr, is-QIUH5.tmp.2.dr, is-FLSM1.tmp.2.drString found in binary or memory: http://www.burnaware.comDVarFileInfo$
                          Source: is-F96N3.tmp.2.dr, is-LACR3.tmp.2.dr, is-2A9L3.tmp.2.dr, is-KN6PN.tmp.2.dr, is-QIUH5.tmp.2.dr, is-FLSM1.tmp.2.dr, is-2RS4N.tmp.2.drString found in binary or memory: http://www.burnaware.comopenU
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.dk-soft.org/
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099446062.000000007FD10000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099078375.00000000026D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000000.2100552726.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.0.drString found in binary or memory: http://www.innosetup.com/
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005F98000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mp3dev.org/
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005F98000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mp3dev.org/0.89LAME3.93
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.palkornel.hu/innosetup%1
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099446062.000000007FD10000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099078375.00000000026D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000000.2100552726.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
                          Source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.webcompanion.com/:http://webcompanion.com/terms
                          Source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, installer.exe, installer.exe, 00000006.00000000.2432182463.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe, 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe.4.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
                          Source: installer.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
                          Source: BurnAware Free.log.7.drString found in binary or memory: https://flow.lavasoft.com
                          Source: installer.exe, 00000006.00000002.3965677324.0000000000688000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://flow.lavasoft.com0:15.
                          Source: installer.exe, 00000006.00000002.3965677324.0000000000688000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://flow.lavasoft.comj
                          Source: BA002.exe, 00000004.00000003.2428985153.00000000022A5000.00000004.00000020.00020000.00000000.sdmp, installer.exe, 00000006.00000002.3965677324.00000000006B5000.00000004.00000020.00020000.00000000.sdmp, GenericSetup.exe.config.4.drString found in binary or memory: https://sos.adaware.com
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Win32.TaskScheduler.dll.4.drString found in binary or memory: https://taskscheduler.codeplex.com/
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Win32.TaskScheduler.dll.4.drString found in binary or memory: https://taskscheduler.codeplex.com/F
                          Source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drString found in binary or memory: https://www.globalsign.com/repository/0
                          Source: unknownNetwork traffic detected: HTTP traffic on port 57189 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 57190 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 57188 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 57192 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 57193 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 57184 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57188
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57189
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57184
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57192
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57193
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57190
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FEEE50 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,6_2_00FEEE50

                          System Summary

                          barindex
                          Source: is-KTHJV.tmp.2.drStatic PE information: section name:
                          Source: is-KTHJV.tmp.2.drStatic PE information: section name:
                          Source: is-PBHEO.tmp.2.drStatic PE information: section name:
                          Source: is-PBHEO.tmp.2.drStatic PE information: section name:
                          Source: is-7RQ8V.tmp.2.drStatic PE information: section name:
                          Source: is-7RQ8V.tmp.2.drStatic PE information: section name:
                          Source: is-BSUHA.tmp.2.drStatic PE information: section name:
                          Source: is-BSUHA.tmp.2.drStatic PE information: section name:
                          Source: is-QUKL7.tmp.2.drStatic PE information: section name:
                          Source: is-QUKL7.tmp.2.drStatic PE information: section name:
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_004160764_2_00416076
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_0040E38E4_2_0040E38E
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_004124804_2_00412480
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_004039C84_2_004039C8
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_00418CC14_2_00418CC1
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_00418D9B4_2_00418D9B
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FCC8806_2_00FCC880
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FC10106_2_00FC1010
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FA9D506_2_00FA9D50
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FCFE306_2_00FCFE30
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FEA0C06_2_00FEA0C0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_010700106_2_01070010
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FEE1806_2_00FEE180
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_010127C06_2_010127C0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0109A6E06_2_0109A6E0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_01062A906_2_01062A90
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_01082AB06_2_01082AB0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0107AF926_2_0107AF92
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FE90A06_2_00FE90A0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0107B1C16_2_0107B1C1
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_010610206_2_01061020
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0107B3F06_2_0107B3F0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FF14B06_2_00FF14B0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FD77E06_2_00FD77E0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_010716B76_2_010716B7
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FE9B206_2_00FE9B20
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0108BD246_2_0108BD24
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_01073D4F6_2_01073D4F
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: String function: 00413724 appears 177 times
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: String function: 00403A63 appears 33 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00FF2308 appears 85 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 0100C2B0 appears 39 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00F89F40 appears 38 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00FD7F80 appears 37 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00F911B0 appears 60 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00FCD340 appears 162 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00FF2328 appears 34 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00FCD3E0 appears 151 times
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: String function: 00FD7520 appears 37 times
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Source: is-5LLBU.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                          Source: is-5LLBU.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099446062.000000007FE35000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099078375.00000000027F9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                          Source: is-KTHJV.tmp.2.drStatic PE information: Section: ZLIB complexity 0.9989476697198276
                          Source: is-BSUHA.tmp.2.drStatic PE information: Section: ZLIB complexity 0.9936018318965517
                          Source: is-QUKL7.tmp.2.drStatic PE information: Section: ZLIB complexity 0.993896484375
                          Source: is-BLFBV.tmp.2.drBinary string: DWDMicrosoft CorporationGetMessageTimeGetCursorPosuser32.dllRtlInitUnicodeStringNtOpenFileNtQuerySystemInformation\Device\KsecDDecaffine_table_construction input
                          Source: classification engineClassification label: mal42.troj.evad.winEXE@9/81@4/2
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FD9850 GetLastError,_strncpy,FormatMessageA,___swprintf_l,_strrchr,_strrchr,GetLastError,SetLastError,6_2_00FD9850
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00F872E0 CoCreateInstance,CoSetProxyBlanket,6_2_00F872E0
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware FreeJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeMutant created: \Sessions\1\BaseNamedObjects\GenericSetupBurnAware Free
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeMutant created: NULL
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeMutant created: \Sessions\1\BaseNamedObjects\GenericSetupInstaller_BA002
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeFile created: C:\Users\user\AppData\Local\Temp\is-DMLII.tmpJump to behavior
                          Source: Yara matchFile source: 00000002.00000002.3970419543.0000000006271000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-5QV8V.tmp, type: DROPPED
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeReversingLabs: Detection: 13%
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeString found in binary or memory: /LOADINF="filename"
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe "C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe"
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeProcess created: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp "C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp" /SL5="$103DA,8156847,189952,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe"
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe "C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe"
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exe .\installer.exe
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeProcess created: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp "C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp" /SL5="$103DA,8156847,189952,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe "C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe"Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exe .\installer.exeJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeJump to behavior
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: msimg32.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: mpr.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: dwmapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: shfolder.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: rstrtmgr.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: msftedit.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: windows.globalization.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: bcp47mrm.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: globinputhost.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: windows.ui.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: windowmanagementapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: inputhost.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: twinapi.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: twinapi.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: explorerframe.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: sfc.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: sfc_os.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: linkinfo.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: ntshrui.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: cscapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: dwrite.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: windowscodecs.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                          Source: BurnAware Free.lnk.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\BurnAware Free\BurnAware.exe
                          Source: Help.lnk.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\BurnAware Free\burnaware.chm
                          Source: Uninstall BurnAware Free.lnk.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\BurnAware Free\unins000.exe
                          Source: BurnAware Free.lnk0.2.drLNK file: ..\..\..\Program Files (x86)\BurnAware Free\BurnAware.exe
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpWindow found: window name: TSelectLanguageFormJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: OK
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: Next >
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: I accept the agreement
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: Next >
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: Next >
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: I accept the agreement
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: Next >
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: I accept the agreement
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: Next >
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: I accept the agreement
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: Install
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: I accept the agreement
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: Next >
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpAutomated click: I accept the agreement
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeStatic PE information: certificate valid
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeStatic file information: File size 8728608 > 1048576
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Source: Binary string: E:\Installer\Source\InstallerStealth\DevLib\obj\Release\DevLib.pdb source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdb source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Win32.TaskScheduler.dll.4.dr
                          Source: Binary string: E:\Installer\Source\InstallerStealth\WizardPages\obj\Release\WizardPages.pdb source: BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr
                          Source: Binary string: E:\Installer\Build\installer.pdb source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, installer.exe, 00000006.00000000.2432182463.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe, 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe.4.dr
                          Source: Binary string: E:\Installer\Source\InstallerStealth\OfferInstaller\obj\Release\OfferInstaller.pdb source: BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, OfferInstaller.exe.4.dr
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_004180F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004180F0
                          Source: initial sampleStatic PE information: section where entry point is pointing to: petite
                          Source: BA002.exe.2.drStatic PE information: section name: .sxdata
                          Source: is-VR3U7.tmp.2.drStatic PE information: section name: .didata
                          Source: is-FQ19R.tmp.2.drStatic PE information: section name: .didata
                          Source: is-F96N3.tmp.2.drStatic PE information: section name: .didata
                          Source: is-KN6PN.tmp.2.drStatic PE information: section name: .didata
                          Source: is-1G882.tmp.2.drStatic PE information: section name: .didata
                          Source: is-FLSM1.tmp.2.drStatic PE information: section name: .didata
                          Source: is-LACR3.tmp.2.drStatic PE information: section name: .didata
                          Source: is-8HNGJ.tmp.2.drStatic PE information: section name: .didata
                          Source: is-2A9L3.tmp.2.drStatic PE information: section name: .didata
                          Source: is-QIUH5.tmp.2.drStatic PE information: section name: .didata
                          Source: is-2RS4N.tmp.2.drStatic PE information: section name: .didata
                          Source: is-7C2AO.tmp.2.drStatic PE information: section name: .didata
                          Source: is-KTHJV.tmp.2.drStatic PE information: section name:
                          Source: is-KTHJV.tmp.2.drStatic PE information: section name:
                          Source: is-KTHJV.tmp.2.drStatic PE information: section name: petite
                          Source: is-PBHEO.tmp.2.drStatic PE information: section name:
                          Source: is-PBHEO.tmp.2.drStatic PE information: section name:
                          Source: is-PBHEO.tmp.2.drStatic PE information: section name: petite
                          Source: is-7RQ8V.tmp.2.drStatic PE information: section name:
                          Source: is-7RQ8V.tmp.2.drStatic PE information: section name:
                          Source: is-7RQ8V.tmp.2.drStatic PE information: section name: petite
                          Source: is-BSUHA.tmp.2.drStatic PE information: section name:
                          Source: is-BSUHA.tmp.2.drStatic PE information: section name:
                          Source: is-BSUHA.tmp.2.drStatic PE information: section name: petite
                          Source: is-QUKL7.tmp.2.drStatic PE information: section name:
                          Source: is-QUKL7.tmp.2.drStatic PE information: section name:
                          Source: is-QUKL7.tmp.2.drStatic PE information: section name: petite
                          Source: is-5QV8V.tmp.2.drStatic PE information: section name: .didata
                          Source: is-OIJLO.tmp.2.drStatic PE information: section name: .didata
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_00411130 push ecx; mov dword ptr [esp], ecx4_2_00411131
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_00413724 push eax; ret 4_2_00413742
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_00413A90 push eax; ret 4_2_00413ABE
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0100C2F6 push ecx; ret 6_2_0100C309
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0100BD43 push ecx; ret 6_2_0100BD56
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-BDOB3.tmpJump to dropped file
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeFile created: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-QIUH5.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\DiscInfo.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bass.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-7RQ8V.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bamedenclib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-BLFBV.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\EraseDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-OIJLO.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\Microsoft.Win32.TaskScheduler.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\UnpackISO.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-FLSM1.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\VerifyDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bassenc.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bashell64.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-FQ19R.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-8HNGJ.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\fr\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bamainlib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-VR3U7.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-5QV8V.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\SpanDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-3KPCR.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-5LLBU.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-JVN9C.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\en\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-KTHJV.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\baplayer.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\BurnImage.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\AudioCD.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\_isetup\_setup64.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bashell32.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-BSUHA.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-7C2AO.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\MakeISO.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\MediaDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-LACR3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\CopyImage.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-5U77G.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\DataDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\tags.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-F96N3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\OfferInstaller.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\unins000.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-PBHEO.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\es\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-QUKL7.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\WizardPages.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-1G882.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-2RS4N.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\DevLib.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bawmalib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\badecx.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\bassflac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-KN6PN.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\de\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\is-2A9L3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\basswma.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\Program Files (x86)\BurnAware Free\BurnAware.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\2024.07.11_13.50.15.338184_installer_pid=3352.txtJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\GenericSetup.exe.logJump to behavior

                          Boot Survival

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeFile created: C:\Users\user\AppData\Local\Temp\7zSC9543C70\Microsoft.Win32.TaskScheduler.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\BurnAware FreeJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\BurnAware Free\BurnAware Free.lnkJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\BurnAware Free\Help.lnkJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\BurnAware Free\BurnAware Free on the Web.urlJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\BurnAware Free\Uninstall BurnAware Free.lnkJump to behavior
                          Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled=True
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeMemory allocated: B50000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeMemory allocated: 1ABA0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeThread delayed: delay time: 600000Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWindow / User API: threadDelayed 2808Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWindow / User API: threadDelayed 2668Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-BDOB3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-QIUH5.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\DiscInfo.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\bass.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-7RQ8V.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\bamedenclib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-BLFBV.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\EraseDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-OIJLO.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\Microsoft.Win32.TaskScheduler.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\UnpackISO.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-FLSM1.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\bassenc.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\VerifyDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\bashell64.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-FQ19R.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-8HNGJ.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\fr\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\bamainlib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-5QV8V.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-VR3U7.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\SpanDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-3KPCR.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-5LLBU.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-JVN9C.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\en\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-KTHJV.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\baplayer.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\BurnImage.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\AudioCD.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\_isetup\_setup64.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-BSUHA.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-7C2AO.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\MakeISO.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\MediaDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-LACR3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\CopyImage.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-5U77G.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\DataDisc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\tags.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-F96N3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\OfferInstaller.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\unins000.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-PBHEO.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\es\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-QUKL7.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\WizardPages.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\DevLib.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-1G882.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-2RS4N.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\bawmalib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\badecx.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\bassflac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-KN6PN.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSC9543C70\de\DevLib.resources.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\is-2A9L3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\basswma.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpDropped PE file which has not been started: C:\Program Files (x86)\BurnAware Free\BurnAware.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe TID: 5796Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe TID: 2524Thread sleep time: -30000s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe TID: 5072Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe TID: 5796Thread sleep time: -600000s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_00405434 FindFirstFileA,FindFirstFileW,4_2_00405434
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FBE920 GetVersionExW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,GetModuleHandleW,GetProcAddress,GetSystemMetrics,6_2_00FBE920
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeThread delayed: delay time: 600000Jump to behavior
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3966757905.00000000007FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Q
                          Source: installer.exe, 00000006.00000002.3965677324.00000000006C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeAPI call chain: ExitProcess graph end nodegraph_4-16385
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_01079047 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_01079047
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_004180F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004180F0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_01089701 mov eax, dword ptr fs:[00000030h]6_2_01089701
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00F83EA0 GetProcessHeap,HeapFree,6_2_00F83EA0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_0041561A SetUnhandledExceptionFilter,4_2_0041561A
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_0041562C SetUnhandledExceptionFilter,4_2_0041562C
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_01079047 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_01079047
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0100B5EA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0100B5EA
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeMemory allocated: page read and write | page guardJump to behavior
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005BDE000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005BDE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Progman
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005B50000.00000004.00001000.00020000.00000000.sdmp, is-5QV8V.tmp.2.drBinary or memory string: ProgmanU
                          Source: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005B50000.00000004.00001000.00020000.00000000.sdmp, is-5QV8V.tmp.2.drBinary or memory string: Shell_TrayWndU
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_0100BF48 cpuid 6_2_0100BF48
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: GetLocaleInfoEx,GetLocaleInfoW,6_2_010059F0
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: ___crtGetLocaleInfoEx,6_2_01005BA6
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: EnumSystemLocalesW,6_2_0109258C
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: GetLocaleInfoW,6_2_01092AD8
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,6_2_01098FA3
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: EnumSystemLocalesW,6_2_01099301
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: EnumSystemLocalesW,6_2_0109921B
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: EnumSystemLocalesW,6_2_01099266
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_01099707
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_010998DB
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmpQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\7zSC9543C70\DevLib.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\7zSC9543C70\WizardPages.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00F97720 GetSystemTimeAsFileTime,__aulldiv,__aulldiv,6_2_00F97720
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_01091B5D _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,6_2_01091B5D
                          Source: C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exeCode function: 4_2_004148D4 EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,4_2_004148D4
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60b1e6f.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60ad2ab.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.608ee0f.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60b1e6f.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60ad2ab.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.5f99937.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000002.00000002.3970419543.000000000608D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-QUKL7.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-7RQ8V.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-PBHEO.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-BSUHA.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-KTHJV.tmp, type: DROPPED

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60b1e6f.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60ad2ab.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.608ee0f.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60b1e6f.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.60ad2ab.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 2.2.SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.5f99937.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000002.00000002.3970419543.000000000608D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-QUKL7.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-7RQ8V.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-PBHEO.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-BSUHA.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\BurnAware Free\is-KTHJV.tmp, type: DROPPED
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FCE690 htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,6_2_00FCE690
                          Source: C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exeCode function: 6_2_00FDEA40 bind,WSAGetLastError,6_2_00FDEA40
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid Accounts321
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          DLL Side-Loading
                          1
                          Disable or Modify Tools
                          OS Credential Dumping2
                          System Time Discovery
                          1
                          Exploitation of Remote Services
                          11
                          Archive Collected Data
                          1
                          Ingress Tool Transfer
                          Exfiltration Over Other Network Medium1
                          Data Encrypted for Impact
                          CredentialsDomainsDefault Accounts1
                          Native API
                          1
                          Scheduled Task/Job
                          2
                          Process Injection
                          1
                          Deobfuscate/Decode Files or Information
                          LSASS Memory2
                          File and Directory Discovery
                          Remote Desktop ProtocolData from Removable Media21
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts2
                          Command and Scripting Interpreter
                          1
                          Registry Run Keys / Startup Folder
                          1
                          Scheduled Task/Job
                          2
                          Obfuscated Files or Information
                          Security Account Manager156
                          System Information Discovery
                          SMB/Windows Admin SharesData from Network Shared Drive2
                          Non-Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal Accounts1
                          Scheduled Task/Job
                          Login Hook1
                          Registry Run Keys / Startup Folder
                          1
                          Software Packing
                          NTDS331
                          Security Software Discovery
                          Distributed Component Object ModelInput Capture3
                          Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          DLL Side-Loading
                          LSA Secrets2
                          Process Discovery
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                          Masquerading
                          Cached Domain Credentials341
                          Virtualization/Sandbox Evasion
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items341
                          Virtualization/Sandbox Evasion
                          DCSync1
                          Application Window Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                          Process Injection
                          Proc Filesystem2
                          System Owner/User Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1471674 Sample: SecuriteInfo.com.Program.Un... Startdate: 11/07/2024 Architecture: WINDOWS Score: 42 46 www.google.com 2->46 48 sos.adaware.com 2->48 50 flow.lavasoft.com 2->50 58 Snort IDS alert for network traffic 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 Yara detected Petite Virus 2->62 64 PE file has nameless sections 2->64 10 SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe 2 2->10         started        signatures3 process4 file5 36 SecuriteInfo.com.P....2818.3154.4230.tmp, PE32 10->36 dropped 13 SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp 38 48 10->13         started        process6 file7 38 C:\Users\user\AppData\Local\...\BA002.exe, PE32 13->38 dropped 40 C:\Program Files (x86)\...\is-QUKL7.tmp, PE32 13->40 dropped 42 C:\Program Files (x86)\...\is-KTHJV.tmp, PE32 13->42 dropped 44 49 other files (1 malicious) 13->44 dropped 16 BA002.exe 19 13->16         started        process8 file9 28 C:\Users\user\AppData\Local\...\installer.exe, PE32 16->28 dropped 30 C:\...\Microsoft.Win32.TaskScheduler.dll, PE32 16->30 dropped 32 C:\Users\user\AppData\...behaviorgraphenericSetup.exe, PE32 16->32 dropped 34 8 other files (1 malicious) 16->34 dropped 56 Installs Task Scheduler Managed Wrapper 16->56 20 installer.exe 1 16->20         started        signatures10 process11 dnsIp12 52 flow.lavasoft.com 104.16.149.130, 443, 57183, 57184 CLOUDFLARENETUS United States 20->52 66 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->66 68 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 20->68 70 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 20->70 24 GenericSetup.exe 14 6 20->24         started        signatures13 process14 dnsIp15 54 sos.adaware.com 104.16.213.94, 443, 57188 CLOUDFLARENETUS United States 24->54 72 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 24->72 74 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 24->74 signatures16

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe13%ReversingLabsWin32.PUA.ICBundler
                          SourceDetectionScannerLabelLink
                          C:\Program Files (x86)\BurnAware Free\AudioCD.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\BurnAware.exe (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\BurnImage.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\CopyImage.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\DataDisc.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\DiscInfo.exe (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\EraseDisc.exe (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\MakeISO.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\MediaDisc.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\SpanDisc.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\UnpackISO.exe (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\VerifyDisc.exe (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\badecx.dll (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bamainlib.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bamedenclib.dll (copy)4%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\baplayer.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bashell32.dll (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bashell64.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bass.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bassenc.dll (copy)2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bassflac.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\basswma.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\bawmalib.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-1G882.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-2A9L3.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-2RS4N.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-3KPCR.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-5LLBU.tmp4%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-5QV8V.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-5U77G.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-7C2AO.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-7RQ8V.tmp3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-8HNGJ.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-BDOB3.tmp4%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-BLFBV.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-BSUHA.tmp3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-F96N3.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-FLSM1.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-FQ19R.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-JVN9C.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-KN6PN.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-KTHJV.tmp3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-LACR3.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-OIJLO.tmp3%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-PBHEO.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-QIUH5.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-QUKL7.tmp0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\is-VR3U7.tmp2%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\tags.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\BurnAware Free\unins000.exe (copy)4%ReversingLabs
                          C:\Users\user\AppData\Local\Temp\7zSC9543C70\DevLib.dll5%ReversingLabs
                          C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe2%ReversingLabs
                          C:\Users\user\AppData\Local\Temp\7zSC9543C70\Microsoft.Win32.TaskScheduler.dll0%ReversingLabs
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://www.innosetup.com/0%URL Reputationsafe
                          http://ocsp.thawte.com00%URL Reputationsafe
                          https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
                          http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                          http://www.remobjects.com/ps0%URL Reputationsafe
                          http://www.webcompanion.com/:http://webcompanion.com/terms0%Avira URL Cloudsafe
                          http://lame.sf.net1.0LAME3.99rLAME3.99r43.99.40%Avira URL Cloudsafe
                          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%Avira URL Cloudsafe
                          http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStartU0%Avira URL Cloudsafe
                          https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=ProfileDebug0%Avira URL Cloudsafe
                          http://www.burnaware.com/0%Avira URL Cloudsafe
                          http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStart0%Avira URL Cloudsafe
                          https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=BundleInstallComplete0%Avira URL Cloudsafe
                          https://flow.lavasoft.com0%Avira URL Cloudsafe
                          http://www.mp3dev.org/0.89LAME3.930%Avira URL Cloudsafe
                          https://curl.haxx.se/docs/http-cookies.html#0%Avira URL Cloudsafe
                          http://www.dk-soft.org/0%Avira URL Cloudsafe
                          https://sos.adaware.com/v1/bundle/list/?bundleId=BA0020%Avira URL Cloudsafe
                          http://webcompanion.com/privacy0%Avira URL Cloudsafe
                          https://sos.adaware.com0%Avira URL Cloudsafe
                          https://flow.lavasoft.com0:15.0%Avira URL Cloudsafe
                          https://taskscheduler.codeplex.com/0%Avira URL Cloudsafe
                          https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=PageShown0%Avira URL Cloudsafe
                          http://www.burnaware.comD0%Avira URL Cloudsafe
                          http://lame.sf.net0%Avira URL Cloudsafe
                          http://www.burnaware.comDVarFileInfo$0%Avira URL Cloudsafe
                          http://www.audiocoding.com/)0%Avira URL Cloudsafe
                          https://taskscheduler.codeplex.com/F0%Avira URL Cloudsafe
                          http://www.burnaware.com/update.verU0%Avira URL Cloudsafe
                          http://www.burnaware.comopenU0%Avira URL Cloudsafe
                          http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubStart0%Avira URL Cloudsafe
                          https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=BundleInstallStart0%Avira URL Cloudsafe
                          http://counter-strike.com.ua/0%Avira URL Cloudsafe
                          http://www.mp3dev.org/0%Avira URL Cloudsafe
                          http://www.burnaware.com/2http://www.burnaware.com/2http://www.burnaware.com/&0%Avira URL Cloudsafe
                          https://flow.lavasoft.comj0%Avira URL Cloudsafe
                          http://www.palkornel.hu/innosetup%10%Avira URL Cloudsafe
                          http://www.burnaware.com/after-install.html0%Avira URL Cloudsafe
                          https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=BundleProposedOffersIsEmpty0%Avira URL Cloudsafe
                          http://webcompanion.com/terms?http://webcompanion.com/privacyOOptional0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          sos.adaware.com
                          104.16.213.94
                          truefalse
                            unknown
                            www.google.com
                            142.250.185.132
                            truefalse
                              unknown
                              flow.lavasoft.com
                              104.16.149.130
                              truefalse
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=ProfileDebugfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=BundleInstallCompletefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStartfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://sos.adaware.com/v1/bundle/list/?bundleId=BA002false
                                • Avira URL Cloud: safe
                                unknown
                                https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=PageShownfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=BundleInstallStartfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubStartfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://flow.lavasoft.com/v1/event-stat/?ProductID=IS&Type=BundleProposedOffersIsEmptyfalse
                                • Avira URL Cloud: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://www.innosetup.com/SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099446062.000000007FD10000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099078375.00000000026D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000000.2100552726.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.0.drfalse
                                • URL Reputation: safe
                                unknown
                                http://www.mp3dev.org/0.89LAME3.93SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005F98000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.Program.Unwanted.2818.3154.4230.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ocsp.thawte.com0BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drfalse
                                • URL Reputation: safe
                                unknown
                                https://flow.lavasoft.comBurnAware Free.log.7.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://lame.sf.net1.0LAME3.99rLAME3.99r43.99.4is-BDOB3.tmp.2.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStartUinstaller.exe, 00000006.00000002.3965677324.00000000006C1000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.burnaware.com/SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.000000000236D000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.webcompanion.com/:http://webcompanion.com/termsBA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://curl.haxx.se/docs/http-cookies.htmlBA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, installer.exe, installer.exe, 00000006.00000000.2432182463.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe, 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmp, installer.exe.4.drfalse
                                • URL Reputation: safe
                                unknown
                                https://curl.haxx.se/docs/http-cookies.html#installer.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.dk-soft.org/SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://webcompanion.com/privacyBA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://taskscheduler.codeplex.com/BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Win32.TaskScheduler.dll.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://sos.adaware.comBA002.exe, 00000004.00000003.2428985153.00000000022A5000.00000004.00000020.00020000.00000000.sdmp, installer.exe, 00000006.00000002.3965677324.00000000006B5000.00000004.00000020.00020000.00000000.sdmp, GenericSetup.exe.config.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://lame.sf.netis-BDOB3.tmp.2.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.thawte.com/ThawteTimestampingCA.crl0BA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.dr, Microsoft.Win32.TaskScheduler.dll.4.dr, installer.exe.4.dr, OfferInstaller.exe.4.drfalse
                                • URL Reputation: safe
                                unknown
                                http://www.burnaware.comDSecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005B50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005BDE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3965128605.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-5QV8V.tmp.2.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://flow.lavasoft.com0:15.installer.exe, 00000006.00000002.3965677324.0000000000688000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.burnaware.comDVarFileInfo$is-F96N3.tmp.2.dr, is-LACR3.tmp.2.dr, is-2A9L3.tmp.2.dr, is-KN6PN.tmp.2.dr, is-QIUH5.tmp.2.dr, is-FLSM1.tmp.2.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://taskscheduler.codeplex.com/FBA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Win32.TaskScheduler.dll.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.audiocoding.com/)is-BDOB3.tmp.2.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.burnaware.comopenUis-F96N3.tmp.2.dr, is-LACR3.tmp.2.dr, is-2A9L3.tmp.2.dr, is-KN6PN.tmp.2.dr, is-QIUH5.tmp.2.dr, is-FLSM1.tmp.2.dr, is-2RS4N.tmp.2.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.burnaware.com/update.verUis-FLSM1.tmp.2.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.mp3dev.org/SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3970419543.0000000005F98000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.burnaware.com/2http://www.burnaware.com/2http://www.burnaware.com/&SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://counter-strike.com.ua/SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://flow.lavasoft.comjinstaller.exe, 00000006.00000002.3965677324.0000000000688000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.burnaware.com/after-install.htmlSecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3968953523.0000000003419000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3968953523.00000000033ED000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.palkornel.hu/innosetup%1SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000002.3966285678.000000000233E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2098466936.0000000002590000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000002.3967179950.0000000002260000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000003.2101802904.00000000031B0000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.remobjects.com/psSecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099446062.000000007FD10000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe, 00000000.00000003.2099078375.00000000026D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp, 00000002.00000000.2100552726.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp.0.drfalse
                                • URL Reputation: safe
                                unknown
                                http://webcompanion.com/terms?http://webcompanion.com/privacyOOptionalBA002.exe, 00000004.00000003.2431734850.00000000005D0000.00000004.00001000.00020000.00000000.sdmp, BA002.exe, 00000004.00000003.2431430059.00000000022A8000.00000004.00000020.00020000.00000000.sdmp, WizardPages.dll.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.16.213.94
                                sos.adaware.comUnited States
                                13335CLOUDFLARENETUSfalse
                                104.16.149.130
                                flow.lavasoft.comUnited States
                                13335CLOUDFLARENETUSfalse
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1471674
                                Start date and time:2024-07-11 19:48:53 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 9m 8s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Run name:Run with higher sleep bypass
                                Number of analysed new started processes analysed:14
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
                                Detection:MAL
                                Classification:mal42.troj.evad.winEXE@9/81@4/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 85%
                                • Number of executed functions: 137
                                • Number of non-executed functions: 216
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • VT rate limit hit for: SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
                                No simulations
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                104.16.213.94Setup.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Adware.Downware.20552.29919.24444.exeGet hashmaliciousUnknownBrowse
                                    Setup.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Program.Unwanted.4662.20461.1147.exeGet hashmaliciousUnknownBrowse
                                        104.16.149.130Setup.exeGet hashmaliciousUnknownBrowse
                                        • geo.lavasoft.com/
                                        Setup.exeGet hashmaliciousUnknownBrowse
                                        • geo.lavasoft.com/
                                        Setup.exeGet hashmaliciousUnknownBrowse
                                        • geo.lavasoft.com/
                                        Setup.exeGet hashmaliciousUnknownBrowse
                                        • geo.lavasoft.com/
                                        SecuriteInfo.com.Program.Unwanted.4662.20461.1147.exeGet hashmaliciousUnknownBrowse
                                        • downloadnada.lavasoft.com/update/12.10.158.0/win32/AdAwareWebInstaller.exe
                                        Setup (1).exeGet hashmaliciousUnknownBrowse
                                        • wcdownloadercdn.lavasoft.com/12.1.4.1003/WebCompanion-12.1.4.1003-prod.zip
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        www.google.comhttp://www.xfinityconnect.comcastappmobile.162-240-175-16.cprapid.comGet hashmaliciousUnknownBrowse
                                        • 142.250.186.36
                                        http://track.fsome.us/?xtl=1viwu5za3qfkgb4bktigd6w9r2aiqj8ubi9x5aevx7vsdxmw96lm51d09tvturwitx5wwhlphpachqeuw68ny1p2uhpiqa5szmrev8&eih=pq9mx5ijy0kxtkev624h50srg6ww83cce1e&__stmp=sgg9ci&__onlt=hGet hashmaliciousUnknownBrowse
                                        • 142.250.186.132
                                        https://link.edgepilot.com/s/58f2f2eb/x4Qvr3PeoEWaCYfnNgIJ1g?u=https://onmicrosoft.highachieverssam.org/404Get hashmaliciousHTMLPhisherBrowse
                                        • 172.217.16.196
                                        https://www.canva.com/design/DAGKqBoB-pk/5yZY6xv4Mi45lnpws5bCrQ/edit?utm_content=DAGKqBoB-pk&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousUnknownBrowse
                                        • 216.58.206.36
                                        http://plnbl.io/review/WX__Ro3YJP2_Get hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                        • 142.250.184.196
                                        Mott Corporation_SKM_C590368369060_417161.pdf.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 142.250.184.196
                                        https://sites.google.com/view/thewassociatespe-lspllc/homeGet hashmaliciousHTMLPhisherBrowse
                                        • 142.250.186.68
                                        https://8pingstate.sbs/y289Get hashmaliciousUnknownBrowse
                                        • 172.217.18.4
                                        https://www.evernote.com/shard/s552/sh/d87c15a9-f5fc-dbbf-e870-00a99882fe99/Bu1HrA086twuEcRU5pyqlAC6c1YNBJWK_suwXIxI6ybw-NGqVUWWtfJo1wGet hashmaliciousHTMLPhisherBrowse
                                        • 172.217.16.196
                                        flow.lavasoft.comJDownloaderSetup.exeGet hashmaliciousUnknownBrowse
                                        • 104.16.148.130
                                        JDownloaderSetup.exeGet hashmaliciousUnknownBrowse
                                        • 104.16.148.130
                                        SecuriteInfo.com.Adware.Downware.20552.29919.24444.exeGet hashmaliciousUnknownBrowse
                                        • 104.16.149.130
                                        SecuriteInfo.com.Adware.Downware.20552.29919.24444.exeGet hashmaliciousUnknownBrowse
                                        • 104.16.148.130
                                        SecuriteInfo.com.Trojan.MulDrop24.56436.17805.29816.exeGet hashmaliciousUnknownBrowse
                                        • 104.16.149.130
                                        SecuriteInfo.com.Trojan.MulDrop24.56436.17805.29816.exeGet hashmaliciousUnknownBrowse
                                        • 104.16.148.130
                                        SecuriteInfo.com.Program.Unwanted.5399.28168.2681.exeGet hashmaliciousUnknownBrowse
                                        • 104.17.8.52
                                        SecuriteInfo.com.Program.Unwanted.5399.28168.2681.exeGet hashmaliciousUnknownBrowse
                                        • 104.17.9.52
                                        https://filezilla-project.org/download.php?type=clientGet hashmaliciousUnknownBrowse
                                        • 104.17.9.52
                                        sos.adaware.comSecuriteInfo.com.Adware.Downware.20552.29919.24444.exeGet hashmaliciousUnknownBrowse
                                        • 104.16.213.94
                                        SecuriteInfo.com.Trojan.MulDrop24.56436.17805.29816.exeGet hashmaliciousUnknownBrowse
                                        • 104.18.68.73
                                        SecuriteInfo.com.Trojan.MulDrop24.56436.17805.29816.exeGet hashmaliciousUnknownBrowse
                                        • 104.18.68.73
                                        SecuriteInfo.com.Program.Unwanted.5399.28168.2681.exeGet hashmaliciousUnknownBrowse
                                        • 104.18.68.73
                                        SecuriteInfo.com.Program.Unwanted.5399.28168.2681.exeGet hashmaliciousUnknownBrowse
                                        • 104.18.68.73
                                        Pokemon_ Ruby Version (V1.2).exeGet hashmaliciousUnknownBrowse
                                        • 104.18.67.73
                                        GenericSetup.exeGet hashmaliciousUnknownBrowse
                                        • 104.18.68.73
                                        VicoHome_App.exeGet hashmaliciousUnknownBrowse
                                        • 104.18.68.73
                                        _Papa Louie 2_ When Burgers Attack!.exeGet hashmaliciousUnknownBrowse
                                        • 104.18.68.73
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUShttp://www.xfinityconnect.comcastappmobile.162-240-175-16.cprapid.comGet hashmaliciousUnknownBrowse
                                        • 162.247.243.29
                                        http://track.fsome.us/?xtl=1viwu5za3qfkgb4bktigd6w9r2aiqj8ubi9x5aevx7vsdxmw96lm51d09tvturwitx5wwhlphpachqeuw68ny1p2uhpiqa5szmrev8&eih=pq9mx5ijy0kxtkev624h50srg6ww83cce1e&__stmp=sgg9ci&__onlt=hGet hashmaliciousUnknownBrowse
                                        • 104.18.11.207
                                        LummaC2.exeGet hashmaliciousLummaCBrowse
                                        • 188.114.97.3
                                        https://link.edgepilot.com/s/58f2f2eb/x4Qvr3PeoEWaCYfnNgIJ1g?u=https://onmicrosoft.highachieverssam.org/404Get hashmaliciousHTMLPhisherBrowse
                                        • 172.64.153.29
                                        DO70976789089.bat.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 188.114.96.3
                                        https://www.canva.com/design/DAGKqBoB-pk/5yZY6xv4Mi45lnpws5bCrQ/edit?utm_content=DAGKqBoB-pk&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        http://plnbl.io/review/WX__Ro3YJP2_Get hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                        • 104.22.54.104
                                        Mott Corporation_SKM_C590368369060_417161.pdf.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 104.17.2.184
                                        https://sites.google.com/view/thewassociatespe-lspllc/homeGet hashmaliciousHTMLPhisherBrowse
                                        • 104.17.2.184
                                        CLOUDFLARENETUShttp://www.xfinityconnect.comcastappmobile.162-240-175-16.cprapid.comGet hashmaliciousUnknownBrowse
                                        • 162.247.243.29
                                        http://track.fsome.us/?xtl=1viwu5za3qfkgb4bktigd6w9r2aiqj8ubi9x5aevx7vsdxmw96lm51d09tvturwitx5wwhlphpachqeuw68ny1p2uhpiqa5szmrev8&eih=pq9mx5ijy0kxtkev624h50srg6ww83cce1e&__stmp=sgg9ci&__onlt=hGet hashmaliciousUnknownBrowse
                                        • 104.18.11.207
                                        LummaC2.exeGet hashmaliciousLummaCBrowse
                                        • 188.114.97.3
                                        https://link.edgepilot.com/s/58f2f2eb/x4Qvr3PeoEWaCYfnNgIJ1g?u=https://onmicrosoft.highachieverssam.org/404Get hashmaliciousHTMLPhisherBrowse
                                        • 172.64.153.29
                                        DO70976789089.bat.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 188.114.96.3
                                        https://www.canva.com/design/DAGKqBoB-pk/5yZY6xv4Mi45lnpws5bCrQ/edit?utm_content=DAGKqBoB-pk&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        http://plnbl.io/review/WX__Ro3YJP2_Get hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                        • 104.22.54.104
                                        Mott Corporation_SKM_C590368369060_417161.pdf.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 104.17.2.184
                                        https://sites.google.com/view/thewassociatespe-lspllc/homeGet hashmaliciousHTMLPhisherBrowse
                                        • 104.17.2.184
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9adDO70976789089.bat.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        P.O.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        0001244.pdf.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        MT_056013785200.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        rSWIFT.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        Order_YK240612-01D(estimate).scr.exeGet hashmaliciousRemcosBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        SI HE Voy - TC Relet 11.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        RFQ_92889128.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        rC1JYAnNNn.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 104.16.213.94
                                        • 104.16.149.130
                                        No context
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2048216
                                        Entropy (8bit):6.523206686484186
                                        Encrypted:false
                                        SSDEEP:24576:j1H4xy4kR3za8sVPggUuBFzmBLSFRBNTvgADqjuOr75S6UMDmc9rO3T4JkQjy:jou9SzDiFr75S65Dbx6T4iX
                                        MD5:E5D98861DD116EDA1908CF22D466CD45
                                        SHA1:A689C7B7ED7C0E4346E1BA7FBEE00997F0B70F08
                                        SHA-256:0CD6431FA27A99E40FEE93B5741A3CED349F56609A9E9A75EF10859AF3DDF674
                                        SHA-512:6715E64D594401D60AC144DBC799C4F2E0EA99F5DE2FD46DC8BE111BCFFDEE0F27C246961B0561166389EBD7A569F29680AA48B328894F8C9F227E3428DC6FCA
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Reputation:low
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.....................P....................@.......................... 3......< ..........@............................-..>...p/..............,........-..............................p-.......................-.|....P-. ....................text............................... ..`.itext..< .......".................. ..`.data...............................@....bss.................\...................idata...>....-..@...\..............@....didata. ....P-.....................@....tls....<....`-..........................rdata.......p-.....................@..@.reloc........-.....................@..B.rsrc........p/.....................@..@............. 3......,..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1350360
                                        Entropy (8bit):6.642861347345999
                                        Encrypted:false
                                        SSDEEP:24576:ye08zSJMzUJ5I4VSwq2BdS/7IF3B9G4J+gPOiIsTAA7ZUWkUNmN:lkvS0395J+gPOYTAPamN
                                        MD5:08E8163EBA464CB7AE6F2B3A0BE3B291
                                        SHA1:5AC0076EC87BD3D06772CEFCAE11148021121046
                                        SHA-256:6E185E0ADF5B486AD1076F1C374196BA98651065934A7530D5110891BEEB0C2E
                                        SHA-512:513846CFF37BC120CDF5F39F2D6966EBB983A6C3EA89B324BF0865A0CF38BF14EBE33B26ACCE95133FAD4C441C660166D049C199002ABAC98086973CFBCA7F50
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Reputation:low
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................v..........X.............@..........................`.......z...........@..............................Z2... ...@......................8*..................................................8................................text....e.......f.................. ..`.itext...............j.............. ..`.data....e.......f...z..............@....bss.....y...............................idata..Z2.......4..................@....didata.............................@....tls....<................................rdata..............................@..@.reloc..8*.......,..................@..B.rsrc....@... ...@...F..............@..@.............`......................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1802456
                                        Entropy (8bit):6.520785784660294
                                        Encrypted:false
                                        SSDEEP:24576:MhUTyZQFMCiQonb6M9+yBKS4pEj3TihQXahcwgwux/Xl6jGyTtKMf:4qiTsSeGahc/wuxfADTtKE
                                        MD5:9791043AE6ABEBF8179899AADCAA6235
                                        SHA1:B53C8E37444D1B7D45150261A8DFADFF081148E4
                                        SHA-256:865D2CF4B136FF4B5EC65E97F1BCA6852567D8F9887021B790332B789B32FF03
                                        SHA-512:FA9B37F90113410DEDDC68547D07D2E80963C3CD45489D9A24D64D6746E64F1EFC5DCF2E1B09E2B3CAC4F5C07E656B5C10709B4507994ED94A242A7F3AD77B07
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Reputation:low
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.........................................@..........................P/..................@............................)..8....+..p...........l.......0*.T............................ *.......................).......*. ....................text....f.......h.................. ..`.itext... ......."...l.............. ..`.data....{.......|..................@....bss.........0...........................idata...8....)..:..................@....didata. .....*......D..............@....tls....<.....*......J...................rdata....... *......J..............@..@.reloc..T....0*......L..............@..B.rsrc....p....+..p..................@..@.............P/......l..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1538264
                                        Entropy (8bit):6.488992484377018
                                        Encrypted:false
                                        SSDEEP:24576:NXOpC0NNHAxRVJG0WdKM6BHS2xVDkGcM3qBSsEXmgTm8ELlOR:Njyo5SUu/M3qBSsEFTCLl4
                                        MD5:3B9CA55AAA6C2F1089F04317A1D0ED5C
                                        SHA1:D263CC81CDBE420F45B26BB46FBE367E0DBC5AAC
                                        SHA-256:6615AFC9218EC2AC5A9FC52C3195316BF2C7F3D1F015EEB505082A3541DF5451
                                        SHA-512:202EF63DE215AB5A9B94B753855276971782F617C8CECA8B92803D0DEAAE53BF222A20C6BD565CC0AB5E5B3515BDD6134F7F76BB2F91CA543504F9CE67FFA809
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................`...........n.......p....@..........................0.......S...........@...........................`..:5...`...............d..........8....................................................i..,....... ....................text...,N.......P.................. ..`.itext.......`.......T.............. ..`.data...pj...p...l...d..............@....bss....t|...............................idata..:5...`...6..................@....didata. ...........................@....tls....<................................rdata..............................@..@.reloc..8...........................@..B.rsrc........`......................@..@.............0.......d..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2240216
                                        Entropy (8bit):6.515674271457544
                                        Encrypted:false
                                        SSDEEP:24576:9YQlxYiPt1wRr3AJId1qBHSMi2UiHQho+3HxDfzFxPK05M9NyKIbTvhTjQF:+8/5ScHL+3HxDfRxCcTvhTu
                                        MD5:5BCD29D045C4346F0DC4DC16712608A4
                                        SHA1:05F58AD366145F9135C583A262C51C558CF48452
                                        SHA-256:6AE136A1B4ED9E5C1187F466FB304A0A1F42E6E92BD73FBD9C79904D1621E88B
                                        SHA-512:493718D696513C378139E50ECCF2A69041A37520EAF1F3060E25E6E9C83302FDBA24B3C2744698FEFA8D5D18CBAE6FB8F6B82259A904BCFFFFFC9ACF4400AD4E
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................J..........._.......p....@...........................6......."..........@............................/..;... 2...............".......0.L.............................0......................./......./. ....................text....'.......(.................. ..`.itext... ...@..."...,.............. ..`.data...p....p.......N..............@....bss.....................................idata...;..../..<..................@....didata. ...../.....................@....tls....<...../......$...................rdata........0......$..............@..@.reloc..L.....0......&..............@..B.rsrc........ 2......4..............@..@..............6.......".............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1439960
                                        Entropy (8bit):6.459374732571663
                                        Encrypted:false
                                        SSDEEP:24576:g1Y2Zf4AVKcuPVmsmgreaBtSLNomKP5WzSe3yjvTGK/k:af4Ag/SYP5WzSe3OTGK8
                                        MD5:D636263A0C8B6D3E1E09A3C6F512DD07
                                        SHA1:9D15830E18D428DBCFB098DB8781BDF8269CD14C
                                        SHA-256:8E19C44FFB6C9F2990EC70D0C3793AC2DBC0D4D054FC451FC9CD4A39C5F1DF82
                                        SHA-512:07BA604C7CCA094B512CDF746BC943F3546501C044E3FD2CABFA3B9D92454476306C0AF555342ACF045DA7083F40659CA81E168079353432DFD8112AF6F28BAF
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................~...b......t.............@.................................;d...........@..............................j0...`...T.......................j.....................................................t............................text...$o.......p.................. ..`.itext...............t.............. ..`.data...<h.......j..................@....bss.....{...............................idata..j0.......2..................@....didata.............................@....tls....<............"...................rdata..............."..............@..@.reloc...j.......l...$..............@..B.rsrc....T...`...T..................@..@....................................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:DOS/MBR boot sector, code offset 0x3c+2, OEM-ID ")TNQ9IHC" cached by Windows 9M, root entries 224, sectors 2880 (volumes <=32 MB), sectors/FAT 9, sectors/track 18, serial number 0x350518e3, label: "BOOT622 ", FAT (12 bit), followed by FAT
                                        Category:dropped
                                        Size (bytes):1474560
                                        Entropy (8bit):6.99474059909904
                                        Encrypted:false
                                        SSDEEP:24576:A1o795/aeZ9NJ6P+TqpVj9jyJYNQKj43FuI97CwiQqddnr5O9aH41SflbEkj3eSa:A1EU+TqpVjOYNnPnrw9arIkjuSgog
                                        MD5:A4A096CAB6079C2CFA88A8BDE0EAC3AA
                                        SHA1:14F2A0E33B11F047D16DE56E92567C5FAA6C5668
                                        SHA-256:1AB300A0A54B8F384CC457424EA0D2F3F46BEF11C0172429C6B207B2EC539E6E
                                        SHA-512:415F5EE18500D442824546002C8B21FC96EAC883BD5844862767381EF05803440115FBD7ACB569A68862FD89E6C11C6B63465895134020520E2070429FD6BFB7
                                        Malicious:false
                                        Preview:.<.)TNQ9IHC........@..................)...5BOOT622 FAT12 .3....|...x.6.7.V.S.>|........E.....|.M..G...>|...ry3.9..|t....|.. |..|.&.|...|...|...|....P|..R|.I|..K|. ..&.|...|..H....I|..K|......R|.P|..r.....r........}.u... ....t...}._.3...^....D...XXX..G.HH...|2.....I|..K|......PRQ.:.r...T.YZXr..........|....|..$|..I|.K|...p....t).........;..|s..6.|...O|3..6.|..%|.M|.......M|.....6O|....$|.6%|.....Non-System disk or disk error..Replace and press any key when ready...IO SYSMSDOS SYS..U.....@..`................. ..@..`................! .#@.%`.'..)..+..-../..1 .3@.5`.7..9..;..=..?..A .C@.E`.G..I..K..M..O..Q..S@.U`.W..Y..[..].._..a .c@.e`.g..i..k..m..o..q .s@.u`.w..y..{..}...... ..@..`................. ..@..`................. ..@..`................. ..@..`................. ..@..`............... ..@..`............... ..@..`............... ..@..`.................!..A..a.................!..A..a................!!.#A.%a.'..)..+..-../.../.3A.5a.7..9..;..=..?..A!.CA.Ea
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1227992
                                        Entropy (8bit):6.429619289168852
                                        Encrypted:false
                                        SSDEEP:24576:Z7xQFeOBnPU4ObAztEBrS5+cJg2g9hB6QCP11/TvtGoh:9DAy9ST29hB6QCP/Tvx
                                        MD5:2573FA5EA27B5BFC5EE3EE6CFE9A2EB9
                                        SHA1:96C74694EA78A9F24958C6B54342532C0F031831
                                        SHA-256:06B8CA60A33AAFF9F35535AC335559CE452CCDCBB79BF8125A7261BCB583D0AE
                                        SHA-512:FF48BC9DF0D39B24CE13A7FB32A333A5E50229DD9DD854732D6AE2272C75F7953D5CCB89C589A911B735667B9425D84FE30E21C69AE914863BD3C009FE848741
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................x...,....................@..............................................@...............................0...0...N......................4<......................................................t............................text....g.......h.................. ..`.itext...............l.............. ..`.data....f.......h...|..............@....bss.....{...............................idata...0.......2..................@....didata.............................@....tls....<................................rdata..............................@..@.reloc..4<.......>..................@..B.rsrc....N...0...N...Z..............@..@....................................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2121432
                                        Entropy (8bit):6.495534230734781
                                        Encrypted:false
                                        SSDEEP:24576:dkaUj1cbQ5aRqDoAEzWoG5zYBbSuEl9ZTvmUBlHwedEIPp3dNmKyiLxNpmwGjh6U:Bqb8lST5+UBlHweGIPpNEdUTQ
                                        MD5:8586A5A100F5CBA368B0097494AB2F35
                                        SHA1:9C902450F0DCD458B3FB3B67F5D8621FB28BF094
                                        SHA-256:72F0505C570B9BAB6E54D92B0A335D40105453EECB3C631FEF2344A867A8EA55
                                        SHA-512:E4146E7DD9310C9BDC221074E209A0CB42FB759E1858D6FE8C45DAE2501E4B142BBE8413E6579B90F691DBC4B195D79C6064A97E864D12E366613E2B217FCC85
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[.....................,...............@....@..........................P4....... ..........@...........................p..B;....0..d...........J ..............................................................z.......... ....................text............................... ..`.itext..< .......".................. ..`.data...x....@......................@....bss.....................................idata..B;...p...<..................@....didata. ...........................@....tls....<................................rdata..............................@..@.reloc..............................@..B.rsrc....d....0..d..................@..@.............P4......J .............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2164440
                                        Entropy (8bit):6.517328304440149
                                        Encrypted:false
                                        SSDEEP:24576:WtaauPx4fUV+ax/PlxBXwCBNS1xOqeW2STMZQRcl6SIjQlDfxhKrXd6TtAOut:rPafavvSv2STMZQRcn88aATtAOg
                                        MD5:2AA349075A63AA40B009625C3C36C5C9
                                        SHA1:E3EC33A7EA6FC78CE096B1F3ED223B57E4961530
                                        SHA-256:75F9B7BF768D2AD9B52C734F9C8BBA08F7360FCC00CB526DF7A56DFEE0F1759A
                                        SHA-512:36255BDF234A44145C9A06DA3A1A20BA14567B0DC73CD8EF2D35AEFC33C5FB4887CE30D69F1539DA24BCD1812241F8AED7D15BDB3C4FEE38D8399FB852E3D66C
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................j........................@...........................4.......!..........@...............................;...01............... ......0/.............................. /.............................../. ....................text....G.......H.................. ..`.itext... ...`..."...L.............. ..`.data................n..............@....bss.........0...........................idata...;.......<..................@....didata. ...../......<..............@....tls....<...../......B...................rdata....... /......B..............@..@.reloc.......0/......D..............@..B.rsrc........01......@..............@..@..............4....... .............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2230488
                                        Entropy (8bit):6.507196691314208
                                        Encrypted:false
                                        SSDEEP:24576:LP7xaFoyifoS3H/OL4NWBPSMOSfaIwwSZ07PDefPmVVDiaBYyYEiiWC/Lh2JjJLD:LMz5ZSVwSZ07PDenMDiaWyO/T3QEJ
                                        MD5:25620AF6CEB4BCD99655EB2EB5BC6362
                                        SHA1:D85F9C4B6143FD730724C2A311EC1049C3D695D6
                                        SHA-256:CD8040B346C6704EC2CC9645702F1535D4D1B9CF6B37DC9B62BEA0AC39019936
                                        SHA-512:2CA6AC5D2BCED2A54290CAA924B3146FA787480F3776E384DDEEB3E14162902D0CB50961A51D8DF0C2D02A1A702D128CCB12BF373FE08A10A66A04B01E3BE304
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[.................@..........$O.......`....@...........................5......."..........@............................/..;....2...............!.......0.............................../....................../......./. ....................text...$........................... ..`.itext... ...0..."...".............. ..`.data...\....`.......D..............@....bss.... ................................idata...;..../..<..................@....didata. ...../.....................@....tls....<...../..........................rdata......../.....................@..@.reloc........0.....................@..B.rsrc.........2......(..............@..@..............5.......!.............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1724632
                                        Entropy (8bit):6.500646018433855
                                        Encrypted:false
                                        SSDEEP:24576:N2v7p4I5zw3eOqw0ujdMLjwEBFSJlnhFS0KUjnaaeXcXgECGexDpwT5Lxg5bZ:NgyES6FXS3h1tnadXcXi9aT5L2X
                                        MD5:4348EB48837517BCD6D3C1F62AA87896
                                        SHA1:6D9F6CF08237F06FCCEC6BF81E5941A3681B9CE1
                                        SHA-256:2CA2D2B3D68D9D5FE71A927A051B355158A3C9FAC3BB0810472B06F796639825
                                        SHA-512:64B429798C4B93532F966652B74D76A34ABDB90B3F5B087220815A28301E5B9D02684713ED9FA3D2244FC5A0B6D72D8A050317D1089C0C74DE84E26B97D43DC2
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[.....................x....................@..............................................@............................(..8....*..............<.......P).p............................@).......................(...... ). ....................text.............................. ..`.itext........... .................. ..`.data...H{.......|..................@....bss.........P.......@...................idata...8....(..:...@..............@....didata. .... )......z..............@....tls....<....0)..........................rdata.......@).....................@..@.reloc..p....P).....................@..B.rsrc.........*...... ..............@..@.....................<..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1550040
                                        Entropy (8bit):6.460281125947317
                                        Encrypted:false
                                        SSDEEP:24576:vNanyO0LRZBCH6wYtQ61QkDBrSeTchSRpevKM5qC5gT+VCBpwW:vrbZXNStsevKM5pyTtBp5
                                        MD5:35C1484D5AB51E9127FFF29F1EC5E8BF
                                        SHA1:642B15CAC9E614564BEF6EC1554D271490C9DC4B
                                        SHA-256:223B5A52DB60618BE714B319C0F000E040B48E1BE6ACB9DFEDFD674844F744FC
                                        SHA-512:4D62E252A0321312FF980B7FEEDE6FBBE2B5543FBA4DEBED19D1E709847811BABC4EB4731F74B37BAE0F266EE4A8054E0ACEEE71A829CDFA5D6C54D8E7AB85E9
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[..........................................@...........................+..................@............................&.\5....(......................P'..{...........................@'.......................&.,.... '......................text...X........................... ..`.itext........... .................. ..`.data...@y.......z..................@....bss.........P.......4...................idata..\5....&..6...4..............@....didata...... '......j..............@....tls....<....0'......n...................rdata.......@'......n..............@..@.reloc...{...P'..|...p..............@..B.rsrc.........(.....................@..@..............+.....................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):578776
                                        Entropy (8bit):6.655075918317694
                                        Encrypted:false
                                        SSDEEP:12288:LAlJu8NZLfIzUipVPgJ0//B9wEi9vKpzp2ZVNF5BBceV8z5U:LADuS1ywJgCl9yppoVD5BBceV8z5U
                                        MD5:3F8FF7F25E3834DB92B0DE00621FD437
                                        SHA1:C0A94BC6C371ADCC8AB490A6A90CEF99117A6562
                                        SHA-256:CAB385455ACA791F41E01FEEC3B9DE61D2F0449E1018A075AF22219ED5D201B5
                                        SHA-512:454D6463EDE1AB92C152AF1CD68DB55A14BFFCC2E2470ABEF0B5A360D42D7F8B6A2162E2AD6C06DDA4D29E4258CC237B2C7632CA6B179070B0B5E8F6DD842BC5
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m M0)A#c)A#c)A#ctc(c(A#c.]-c2A#ctc)cJA#c)A"c`A#cK^0c,A#cvc(c.A#c.a'c(A#cRich)A#c........PE..L...l..9...........!........................ .......................................E...............................(..........<...................................................................................(................................text...z........................... ..`.rdata../.... ....... ..............@..@.data........0...P...0..............@....idata.."...........................@....reloc...*.......0..................@..B................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3017432
                                        Entropy (8bit):6.571487341115199
                                        Encrypted:false
                                        SSDEEP:49152:i9TAxIGE68oFvXexWTBQH8HHGGdnFBZHbtNsvL70VlSQhGFCbHDauRAXHWB/JABk:mTAxHKaQHyHGGdnF7BNsD70VlSQhGMXB
                                        MD5:E0B2CF5ED07CFFC970C50EAAB3451043
                                        SHA1:30A7480E8FAA8A7494F7163CD95CA0D6FE7D8D3A
                                        SHA-256:1B0F5A28F4CDC6BEF0808239DA4B7138B16166A3574276F619BA5169FF09D351
                                        SHA-512:5F91E45D2BF717ED720F4D91955EE65B82EF265725F3B8F08E01398636B542AA81A5EADBB631D3FBD2EB2A2C84310A0DA6DC2BBF5B316F7973C5C6D34B24846A
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l....................S........b........]............................b..0....b.......b.......b.......b......Rich....................PE..L....GjX...........!...... .........[.........!...............................>.....M.....@......................... =(.....8.(.|.....9.VZ............-.......;.8.....................................$.@.............!.x............................text..... ....... ................. ..`.rdata...Q....!..R.... .............@..@.data...h9...`(......<(.............@....rsrc...VZ....9..\....(.............@..@.reloc.......;......R*.............@..B................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2710232
                                        Entropy (8bit):4.449689803792709
                                        Encrypted:false
                                        SSDEEP:24576:NL50dQ1nZACUQtQ20BJ3KaUjZG44v7JyvVasNerG747HlhNh:NL5+IAbwQ2UKtIVzkv4s8rGGFhNh
                                        MD5:D858A70BFD136126C43755BADFFF7C80
                                        SHA1:EA1C9003429396AE211526E6E650A0F5B2E54856
                                        SHA-256:A6DC15E8104C7E246FD63E57BEBEB4645E2FB034743DE1E9F0EB23CA4FF5036B
                                        SHA-512:D005F3A39FF973912AA452459CDE1E3A03AC8CF63721734D0E73163D7897500CBBD165803138E36E4915A482DEF7F08D34E08CF440ADC24B5F6DC0FAC7726518
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 4%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............j..j..j......j.)...j.)...j.....j..k...j.)..X.j.)...j.)...j.)...j.Rich..j.................PE..L.....[O...........!................%q........................................*.......)...@..........................G'.X...$='.P.....)..............F).......).......................................&.@............................................text...^........................... ..`.rdata...|.......~..................@..@.data....8...P'......6'.............@....rsrc.........).......(.............@..@.reloc..R.....)......0(.............@..B........................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1004760
                                        Entropy (8bit):6.827276750755658
                                        Encrypted:false
                                        SSDEEP:24576:Rck4lJqowqlZbVFfSWLfipEJWzzauTlG7WpiH3Y92:R3sVFfnLficWSuhGKpiH3Y92
                                        MD5:AF55D432BA090E333B4115B20A0684F9
                                        SHA1:D1B0D9060B7F30FC2AB3EF5297A8341698BB638B
                                        SHA-256:31E54D819597B90FA668141204A5862D4669D696232C2D709094A4972EBBD8F5
                                        SHA-512:B100B43EA1C94F82C7B907F1458E5598C5408BE7FC1A599B718B0FE43E5E7B27D913B5E128EDC68AA41E5DE1A83DD48B0DF579D0B5F2337172C4207E4224541E
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Zy..Zy..Zy.....^y..}...fy..Zy..Yy..}...Wy..Y..Xy..}...px..Zy...y..v..Qy..}....y..}...[y..}...[y..}...[y..RichZy..........PE..L...p..K...........!.........P.........................................................................................Q............................@..........0|...................................1..@...............|............................text............................... ..`.rdata..!...........................@..@.data...............................@....rsrc...............................@..@.reloc.............................@..B........................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1337048
                                        Entropy (8bit):6.551634819186885
                                        Encrypted:false
                                        SSDEEP:24576:mdw4IDLMqHhkKfg18tEBhw6PBQSY4irrCi1ocBoM3Icij77M:mdwttBx6PSSY4iboMfijPM
                                        MD5:C28B8514752068017D0549D512A92995
                                        SHA1:BFFE081E502DBF1EFEF5F4427FDCAB0C15F76583
                                        SHA-256:5ADD3A389504588123F7FEC33D5F5615D13D5AFBF682B25E04A20DBC5F81C63A
                                        SHA-512:68F8475161F25ED41B8EC72F233B6DDA7C95752662AB6C8BD2A12694574741C1390E058F8D470ECFE21D3164083475FDF09651D7C165D428224472659864AAE6
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....8.Z............................d.............@..........................................................................p...5...p...............R..............................................................y..L............................text............................... ..`.itext..|........................... ..`.data...L:.......<..................@....bss....0T...............................idata...5...p...6..................@....didata..............0..............@....edata...............8..............@..@.reloc..............:..............@..B.rsrc........p......................@..@.....................R..............@..@................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):2128600
                                        Entropy (8bit):5.92597532283096
                                        Encrypted:false
                                        SSDEEP:12288:d1GA4AOyb8SyFXjZKJ4Sb9bnNBNSKyXSYt/R+Mt9tAFp51kSgdExIXVyk00y/Zml:dQFAZNBNSKyXSYt/R+CAzjkSPmV4+H
                                        MD5:CD32BE24426955B5141204FA035CA6B3
                                        SHA1:6AEB4836B01ED01DA3CAB689A3B8E108FE411C9A
                                        SHA-256:E5D7E21FA3ED144228D7500C5C3E41EB8F2AAFB581741854092BF3F2BAE1F937
                                        SHA-512:90884D1EE59007616B3B8783E212F61474318342B2831FA40A0400A6BD8D14846E1224CFFC285BB43ACF177EE81D544A034BBB989D2F624FED7A63C2BCFC3004
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..d....8.Z.........." ................ .........@..............................P!.......!.............................. ..........................LF.... ......`..0Y...f ..........G..................................................@................................text............................... ..`.data...P,..........................@....bss.....................................idata..LF.......H..................@....didata..............2..............@....edata...............>..............@..@.reloc...G.......H...@..............@..B.pdata..0Y...`...Z..................@..@.rsrc......... .....................@..@.............P!......f .............@..@................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):124060
                                        Entropy (8bit):7.95689673801651
                                        Encrypted:false
                                        SSDEEP:3072:h4Ht0B1105GzXyO6vvasTeprZKYQ+U1YUjJ09d:qs11IdPvCUef519d
                                        MD5:68523838F432A39A764B5FD4E4DD14CF
                                        SHA1:46F09323FECCFEFA3AA1D5940D9BF09A2A14351F
                                        SHA-256:EFB350839CBE0074F799A28EC76513C32E2CB1ADC85CEBA527859EC36B1B5FB5
                                        SHA-512:468C3AF4BC3154882217676E9EE9EB29C623F0DC4BE951175D6D93281A9449616803499D7B19A26D0C0E6F18C976D7BE32FFD4C7A50AFE0D6D72E6ADB60E383C
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZ......................@...................................D.... ..PE..L....WFZ...........!.................@.......................................P............@..........................B.......A..........@...................0.......................................................<B..H...............................................................@..@.rsrc...............................@..@......... ... .........................@petite.......@......................`..`....................................]......Y...*.z|y.....GqOn=..2Z.". ..hV..caQ...N.N.VQ..w.O5.Q..pH.=@.`....H...xi..De 06j..Z.?)*.n|.`68..8:.0..EI.X..v0.!P...t.@....Z.q5.....d(..~.&...%..&.sFl.A....H.1...g+........_B..."...SOZVLSGRCWJ.o..^F[C............1.f.......t(."0?.9W....2...P....:2...F..O...a&.J.7L,...4.../.1.....c<.Q...2.x0&..618F...Q.QPu.%...:q..........a...1m=.0..D..\./.!............B...Z....!..Q%....#...n.`..1...C(Rd...z..7....3....8;wI1.b.....,]..O..zo.QKl/.6...Y1TY....w.....(.K.N..m3.......,K
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):19396
                                        Entropy (8bit):7.541174332849443
                                        Encrypted:false
                                        SSDEEP:384:KobrFPWMgug1kD3uxnqtpJUBGWFXO1H6OGZ9k0yKfg5io/s2R9SzK0r8pD2:KovFPW7Gyp0JsXOYOGZ9k0XfgC
                                        MD5:74B6071109D2FA2B27B75BD3CC100BBB
                                        SHA1:0038A6A686EEB5BD082A4FB32413A48D4D0F1AFF
                                        SHA-256:8A3391210D0CDEBB06B0292D0DF9CEC3A2BBCBCA0B99979B65143B0568F04106
                                        SHA-512:CCEA98DA1F00A8AC159703AE13F92748DB2D323B94E91B361D6D136515D0C715D394FAAE5A52664F96F1452D4B5F820EB1B4773A37F0D82C094DAAECA1ED8E17
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZ......................@...................................D.... ..PE..L....v.V...........!.........D...............p............................................@.............................................@....................N......................................................"...H............................................@..................@..@.rsrc................B..............@..@.......................................@petite...............F..............`..`..........................................>m@.SE3..f..H4\....5b.31bo.. ..w.#&-..h.....D@....QfS......S.<..m.g..T&|h.@.J..._.(.)..D.....=#.H.0..J.F......I.Mg......B...f...k.V..........B.~.C..|..."p./...?.[..k.o[/R..2*...:Z?N...8.Z..^....."........ .h..8LQ.e..T1[.eX...'(.D..!R..o....J....+..P..9..PDC..... RZ..Q....:...J0.e:c..@.iW...2..<.&{*.5....zZ..?.D.${..:...:\L.....v.s12..{..ezU[...4a..l....#p../?m.;...|8+@Myo3...f)....z....J7..slp...5.....d...f2.i.....G.......A.+"g......z&,..=3.39j../..,h.Z...[.F..
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):24844
                                        Entropy (8bit):7.754417060273362
                                        Encrypted:false
                                        SSDEEP:768:q4r9klplrstQxDCPbUJT/tYunwvPwHP9MeO528W:q4usiv/tYCwvPUPt8W
                                        MD5:3CA82F8E39DE39A50C13474905EF2D65
                                        SHA1:57694C057C49532632113EA5E0A14C1B9023E0EA
                                        SHA-256:03507E3FB3B2DFDA8A79FBD4A745B1D401CDE8C9F939FEFD48678C42F211DCDB
                                        SHA-512:0196D3CB83F04CFA93EA0E80EF8DAB28FE7EC89E3E4D6552929B8ED8B59FA76B8E571066BAAA02665D3B45BF54E7F15B2C025AF4D313E0BCA4CD52DC3A9990C1
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZ......................@...................................D.... ..PE..L....9.Y...........!.........\............................................................@.........................P...........d.......@...................<g..........................................................8............................................X..................@..@.rsrc................Z..............@..@.......................................@petite...............^..............`..`...................................... ...F..O.L$+^..N\.m.:.5...../...?.@....<.6.u ..%.l+.c."..l.9...7R9R........&.i.......h9...`."..o...0.....i....Y.....2..F.J...I..XP,.+.l..*qP.~X.g|.D.%f..@.Pu._.s...pW'Tc.....1hP.\.L.E...63.2..4L...g..PY9.|.&|...P..-X..YA...,.....5...h.j..;..B..v.$2.%....2.W.....e...i..e.2..\..R...B.......>.x.i..<.:..$I.....>..I.....BK)..k.h..JQr||...%m.;.a..9.P!.|Y`.#.jyy.b.=..>1d...M.HM..C.\T.T.0.....jp............}...U..(n;0.j*.....]8....2...QD....H1"....w...=w.p..8.....U
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):17733
                                        Entropy (8bit):7.598626308964297
                                        Encrypted:false
                                        SSDEEP:384:OPR8697gJWJ/IAzOvfHNfd+E5hHkCwp0jcGDv6K0Ww:2Po2IA+fNfcEfHkCwqjcUlw
                                        MD5:D2177355BECCFDBC1E7B5C687DFBA290
                                        SHA1:0557F3883AA8EABEFA6A110A08CF549117FD1901
                                        SHA-256:A844247B7CDCAC1A5F61C604E4DB111B274616C0EB19A70CDFB073C8C2F3B375
                                        SHA-512:7E5CE3047E4661969A3827B225F1B88F80BFEA221549E37B406DA52D1C51F60667340BB1A074F96A516D185979AB5E298FAB76BF5789CE7EE34B399FD2BDFA3C
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZ......................@...................................D.... ..PE..L....N.W...........!....E....>...............`............................................@.....................................x.......@...................lI..........................................................@....................................p.......:..................@..@.rsrc................<..............@..@.......................................@petite..E.......E....@..............`..`.......................................`.......`...>..z...........E2.dzo..[..^..7..m..&.@...6.@...5...d`o.O.:IPx.......... !......"H(-_.L.......X....P.j.........J..7l.I3j.)...u's...3y.t.*..!W..[....1...Z1......5....C~t@`n...L..x.....5.H9.R\..c...r..1.C....(....9..S..-c....@.3..."gZ..d..j}...@lv.e!;.R].....$|e|`...%.P..IV...x.4D...h.!.>.kg.i.......... .DAC...mfz.W!K.P.k...p...h..9}..ze...2....a..g..[*y....P@.=........?.I..G.......qO...qo......m....Q....L.O....h.~4..95.".y..m4u...cBUH...y.S$i.8q
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):300248
                                        Entropy (8bit):6.398876873804225
                                        Encrypted:false
                                        SSDEEP:6144:KeiRTXptFP/h16je0F0T99C1FfEObNOiuG9mAO4iBd:fiR9/nIe0CTvC1Fx2Fd
                                        MD5:255F8B5BA8FCED381089981B95C6AB61
                                        SHA1:D20CEEC8693362C6651EDD55823B3675A8AC0AA3
                                        SHA-256:92B98D076993159D70B36C129B4508815A9C4E34532669F2B4F95D589FCC6BF6
                                        SHA-512:430E218EC8EF80A70CDF258A3A51D2EC77A5A59433C3D8476E3B9EE3023EDC59602214106330F5C65FEB5575420A2CEA8A8ABDCDED43DD8102670730F7210CF3
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................................u.......u.G.................;....u.....u......u......u.....Rich...........................PE..L....q.J...........!.........p......,................................................*......................................L........`.......................p..\*..................................x...@............................................text...>........................... ..`.rdata..............................@..@.data...d........@..................@....rsrc........`......................@..@.reloc..dY...p...`... ..............@..B................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows HtmlHelp Data
                                        Category:dropped
                                        Size (bytes):102640
                                        Entropy (8bit):7.810597006099471
                                        Encrypted:false
                                        SSDEEP:3072:gIvgrB9Fg4mqOXEBL6sZqRF7kB+F/Uq+2:gIyg4mSu6sFIB+Fsg
                                        MD5:C2D09407D88D80FEEE01A5BA49158EEF
                                        SHA1:E7B66B693EECB22232159A502F3E51C0F4D7280B
                                        SHA-256:1D101980FBB738DB9BA98901B3A46CB9FECDF174BD0981262B78F97AD9736CD4
                                        SHA-512:24E1AF4770EA46E8140FB0A1AB9F094E54454948B30BB2B9CACA9159E658BD827908BA4A073C3187177F7EABFC032665B27566221644D5E94A9DBA37621A4341
                                        Malicious:false
                                        Preview:ITSF....`.........V........|.{.......".....|.{......."..`...............x.......T......................................ITSP....T...........................................j..].!......."..T...............PMGL^................/..../#IDXHDR...|.../#ITBITS..../#STRINGS......./#SYSTEM....<./#TOPICS...|.@./#URLSTR...l.../#URLTBL...<.0./#WINDOWS...$.L./$FIftiMain...x..../$OBJINST...9.?./$WWAssociativeLinks/..../$WWAssociativeLinks/BTree...t.L./$WWAssociativeLinks/Data...@.G./$WWAssociativeLinks/Map....../$WWAssociativeLinks/Property.... ./$WWKeywordLinks/..../$WWKeywordLinks/Property...p../audio_cd.htm..4.../audio_grabber.htm..F.s./blu-ray_disc.htm...9.l./boot.htm...%.8./boot_disc.htm...].9./btn_home_h.gif.....d./btn_home_n.gif...d.X./btn_next_d.gif...<.../btn_next_h.gif...F.../btn_next_n.gif...S.5./btn_prev_d.gif.....g./btn_prev_h.gif...o.b./btn_prev_n.gif...Q.../burn.htm.....P./burn_image.htm...f.g./burnaware.hhc...B.4./burnaware_popup_html.js..../button_closedbook.gif...k.u./button_openbo
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2121432
                                        Entropy (8bit):6.495534230734781
                                        Encrypted:false
                                        SSDEEP:24576:dkaUj1cbQ5aRqDoAEzWoG5zYBbSuEl9ZTvmUBlHwedEIPp3dNmKyiLxNpmwGjh6U:Bqb8lST5+UBlHweGIPpNEdUTQ
                                        MD5:8586A5A100F5CBA368B0097494AB2F35
                                        SHA1:9C902450F0DCD458B3FB3B67F5D8621FB28BF094
                                        SHA-256:72F0505C570B9BAB6E54D92B0A335D40105453EECB3C631FEF2344A867A8EA55
                                        SHA-512:E4146E7DD9310C9BDC221074E209A0CB42FB759E1858D6FE8C45DAE2501E4B142BBE8413E6579B90F691DBC4B195D79C6064A97E864D12E366613E2B217FCC85
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[.....................,...............@....@..........................P4....... ..........@...........................p..B;....0..d...........J ..............................................................z.......... ....................text............................... ..`.itext..< .......".................. ..`.data...x....@......................@....bss.....................................idata..B;...p...<..................@....didata. ...........................@....tls....<................................rdata..............................@..@.reloc..............................@..B.rsrc....d....0..d..................@..@.............P4......J .............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2230488
                                        Entropy (8bit):6.507196691314208
                                        Encrypted:false
                                        SSDEEP:24576:LP7xaFoyifoS3H/OL4NWBPSMOSfaIwwSZ07PDefPmVVDiaBYyYEiiWC/Lh2JjJLD:LMz5ZSVwSZ07PDenMDiaWyO/T3QEJ
                                        MD5:25620AF6CEB4BCD99655EB2EB5BC6362
                                        SHA1:D85F9C4B6143FD730724C2A311EC1049C3D695D6
                                        SHA-256:CD8040B346C6704EC2CC9645702F1535D4D1B9CF6B37DC9B62BEA0AC39019936
                                        SHA-512:2CA6AC5D2BCED2A54290CAA924B3146FA787480F3776E384DDEEB3E14162902D0CB50961A51D8DF0C2D02A1A702D128CCB12BF373FE08A10A66A04B01E3BE304
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[.................@..........$O.......`....@...........................5......."..........@............................/..;....2...............!.......0.............................../....................../......./. ....................text...$........................... ..`.itext... ...0..."...".............. ..`.data...\....`.......D..............@....bss.... ................................idata...;..../..<..................@....didata. ...../.....................@....tls....<...../..........................rdata......../.....................@..@.reloc........0.....................@..B.rsrc.........2......(..............@..@..............5.......!.............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1802456
                                        Entropy (8bit):6.520785784660294
                                        Encrypted:false
                                        SSDEEP:24576:MhUTyZQFMCiQonb6M9+yBKS4pEj3TihQXahcwgwux/Xl6jGyTtKMf:4qiTsSeGahc/wuxfADTtKE
                                        MD5:9791043AE6ABEBF8179899AADCAA6235
                                        SHA1:B53C8E37444D1B7D45150261A8DFADFF081148E4
                                        SHA-256:865D2CF4B136FF4B5EC65E97F1BCA6852567D8F9887021B790332B789B32FF03
                                        SHA-512:FA9B37F90113410DEDDC68547D07D2E80963C3CD45489D9A24D64D6746E64F1EFC5DCF2E1B09E2B3CAC4F5C07E656B5C10709B4507994ED94A242A7F3AD77B07
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.........................................@..........................P/..................@............................)..8....+..p...........l.......0*.T............................ *.......................).......*. ....................text....f.......h.................. ..`.itext... ......."...l.............. ..`.data....{.......|..................@....bss.........0...........................idata...8....)..:..................@....didata. .....*......D..............@....tls....<.....*......J...................rdata....... *......J..............@..@.reloc..T....0*......L..............@..B.rsrc....p....+..p..................@..@.............P/......l..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1004760
                                        Entropy (8bit):6.827276750755658
                                        Encrypted:false
                                        SSDEEP:24576:Rck4lJqowqlZbVFfSWLfipEJWzzauTlG7WpiH3Y92:R3sVFfnLficWSuhGKpiH3Y92
                                        MD5:AF55D432BA090E333B4115B20A0684F9
                                        SHA1:D1B0D9060B7F30FC2AB3EF5297A8341698BB638B
                                        SHA-256:31E54D819597B90FA668141204A5862D4669D696232C2D709094A4972EBBD8F5
                                        SHA-512:B100B43EA1C94F82C7B907F1458E5598C5408BE7FC1A599B718B0FE43E5E7B27D913B5E128EDC68AA41E5DE1A83DD48B0DF579D0B5F2337172C4207E4224541E
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Zy..Zy..Zy.....^y..}...fy..Zy..Yy..}...Wy..Y..Xy..}...px..Zy...y..v..Qy..}....y..}...[y..}...[y..}...[y..RichZy..........PE..L...p..K...........!.........P.........................................................................................Q............................@..........0|...................................1..@...............|............................text............................... ..`.rdata..!...........................@..@.data...............................@....rsrc...............................@..@.reloc.............................@..B........................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1278181
                                        Entropy (8bit):6.457767718219793
                                        Encrypted:false
                                        SSDEEP:24576:EnbbPImgK4brDi4IxgRqzwqNb+Yz73P2EMZbG0JEt7Afjqx9z1:SHeKh4nqzF3PYdStuWz
                                        MD5:E2E897166C54B6EE47F0167221C28BD6
                                        SHA1:973EE8DEB14DBF2B52B8218FC82027BE186F1982
                                        SHA-256:C9B0BAD8C38604734F0ACAED5C6AA1A3142667E9E17D65838D964169C69C48EE
                                        SHA-512:EC0B6499C160090CAF95A1E377413DB51E7EDE6D8EB4302C5661558F56288A83AADF24FD0547538C001199A991ABB346520ADB0AFA1D2C861C492C9CA47D2348
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 4%
                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...Rm"[.............................%.......0....@.......................................@......@..............................@8...@.......................................................0.......................................................text............................... ..`.itext.............................. ..`.data....0...0...2..................@....bss.....a...p.......L...................idata..@8.......:...L..............@....tls....<.... ...........................rdata.......0......................@..@.rsrc........@......................@..@....................................@..@........................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1337048
                                        Entropy (8bit):6.551634819186885
                                        Encrypted:false
                                        SSDEEP:24576:mdw4IDLMqHhkKfg18tEBhw6PBQSY4irrCi1ocBoM3Icij77M:mdwttBx6PSSY4iboMfijPM
                                        MD5:C28B8514752068017D0549D512A92995
                                        SHA1:BFFE081E502DBF1EFEF5F4427FDCAB0C15F76583
                                        SHA-256:5ADD3A389504588123F7FEC33D5F5615D13D5AFBF682B25E04A20DBC5F81C63A
                                        SHA-512:68F8475161F25ED41B8EC72F233B6DDA7C95752662AB6C8BD2A12694574741C1390E058F8D470ECFE21D3164083475FDF09651D7C165D428224472659864AAE6
                                        Malicious:false
                                        Yara Hits:
                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\BurnAware Free\is-5QV8V.tmp, Author: Joe Security
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....8.Z............................d.............@..........................................................................p...5...p...............R..............................................................y..L............................text............................... ..`.itext..|........................... ..`.data...L:.......<..................@....bss....0T...............................idata...5...p...6..................@....didata..............0..............@....edata...............8..............@..@.reloc..............:..............@..B.rsrc........p......................@..@.....................R..............@..@................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):578776
                                        Entropy (8bit):6.655075918317694
                                        Encrypted:false
                                        SSDEEP:12288:LAlJu8NZLfIzUipVPgJ0//B9wEi9vKpzp2ZVNF5BBceV8z5U:LADuS1ywJgCl9yppoVD5BBceV8z5U
                                        MD5:3F8FF7F25E3834DB92B0DE00621FD437
                                        SHA1:C0A94BC6C371ADCC8AB490A6A90CEF99117A6562
                                        SHA-256:CAB385455ACA791F41E01FEEC3B9DE61D2F0449E1018A075AF22219ED5D201B5
                                        SHA-512:454D6463EDE1AB92C152AF1CD68DB55A14BFFCC2E2470ABEF0B5A360D42D7F8B6A2162E2AD6C06DDA4D29E4258CC237B2C7632CA6B179070B0B5E8F6DD842BC5
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m M0)A#c)A#c)A#ctc(c(A#c.]-c2A#ctc)cJA#c)A"c`A#cK^0c,A#cvc(c.A#c.a'c(A#cRich)A#c........PE..L...l..9...........!........................ .......................................E...............................(..........<...................................................................................(................................text...z........................... ..`.rdata../.... ....... ..............@..@.data........0...P...0..............@....idata.."...........................@....reloc...*.......0..................@..B................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2164440
                                        Entropy (8bit):6.517328304440149
                                        Encrypted:false
                                        SSDEEP:24576:WtaauPx4fUV+ax/PlxBXwCBNS1xOqeW2STMZQRcl6SIjQlDfxhKrXd6TtAOut:rPafavvSv2STMZQRcn88aATtAOg
                                        MD5:2AA349075A63AA40B009625C3C36C5C9
                                        SHA1:E3EC33A7EA6FC78CE096B1F3ED223B57E4961530
                                        SHA-256:75F9B7BF768D2AD9B52C734F9C8BBA08F7360FCC00CB526DF7A56DFEE0F1759A
                                        SHA-512:36255BDF234A44145C9A06DA3A1A20BA14567B0DC73CD8EF2D35AEFC33C5FB4887CE30D69F1539DA24BCD1812241F8AED7D15BDB3C4FEE38D8399FB852E3D66C
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................j........................@...........................4.......!..........@...............................;...01............... ......0/.............................. /.............................../. ....................text....G.......H.................. ..`.itext... ...`..."...L.............. ..`.data................n..............@....bss.........0...........................idata...;.......<..................@....didata. ...../......<..............@....tls....<...../......B...................rdata....... /......B..............@..@.reloc.......0/......D..............@..B.rsrc........01......@..............@..@..............4....... .............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):24844
                                        Entropy (8bit):7.754417060273362
                                        Encrypted:false
                                        SSDEEP:768:q4r9klplrstQxDCPbUJT/tYunwvPwHP9MeO528W:q4usiv/tYCwvPUPt8W
                                        MD5:3CA82F8E39DE39A50C13474905EF2D65
                                        SHA1:57694C057C49532632113EA5E0A14C1B9023E0EA
                                        SHA-256:03507E3FB3B2DFDA8A79FBD4A745B1D401CDE8C9F939FEFD48678C42F211DCDB
                                        SHA-512:0196D3CB83F04CFA93EA0E80EF8DAB28FE7EC89E3E4D6552929B8ED8B59FA76B8E571066BAAA02665D3B45BF54E7F15B2C025AF4D313E0BCA4CD52DC3A9990C1
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\BurnAware Free\is-7RQ8V.tmp, Author: Joe Security
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZ......................@...................................D.... ..PE..L....9.Y...........!.........\............................................................@.........................P...........d.......@...................<g..........................................................8............................................X..................@..@.rsrc................Z..............@..@.......................................@petite...............^..............`..`...................................... ...F..O.L$+^..N\.m.:.5...../...?.@....<.6.u ..%.l+.c."..l.9...7R9R........&.i.......h9...`."..o...0.....i....Y.....2..F.J...I..XP,.+.l..*qP.~X.g|.D.%f..@.Pu._.s...pW'Tc.....1hP.\.L.E...63.2..4L...g..PY9.|.&|...P..-X..YA...,.....5...h.j..;..B..v.$2.%....2.W.....e...i..e.2..\..R...B.......>.x.i..<.:..$I.....>..I.....BK)..k.h..JQr||...%m.;.a..9.P!.|Y`.#.jyy.b.=..>1d...M.HM..C.\T.T.0.....jp............}...U..(n;0.j*.....]8....2...QD....H1"....w...=w.p..8.....U
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1724632
                                        Entropy (8bit):6.500646018433855
                                        Encrypted:false
                                        SSDEEP:24576:N2v7p4I5zw3eOqw0ujdMLjwEBFSJlnhFS0KUjnaaeXcXgECGexDpwT5Lxg5bZ:NgyES6FXS3h1tnadXcXi9aT5L2X
                                        MD5:4348EB48837517BCD6D3C1F62AA87896
                                        SHA1:6D9F6CF08237F06FCCEC6BF81E5941A3681B9CE1
                                        SHA-256:2CA2D2B3D68D9D5FE71A927A051B355158A3C9FAC3BB0810472B06F796639825
                                        SHA-512:64B429798C4B93532F966652B74D76A34ABDB90B3F5B087220815A28301E5B9D02684713ED9FA3D2244FC5A0B6D72D8A050317D1089C0C74DE84E26B97D43DC2
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[.....................x....................@..............................................@............................(..8....*..............<.......P).p............................@).......................(...... ). ....................text.............................. ..`.itext........... .................. ..`.data...H{.......|..................@....bss.........P.......@...................idata...8....(..:...@..............@....didata. .... )......z..............@....tls....<....0)..........................rdata.......@).....................@..@.reloc..p....P).....................@..B.rsrc.........*...... ..............@..@.....................<..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 64x64, 32 bits/pixel
                                        Category:dropped
                                        Size (bytes):40426
                                        Entropy (8bit):3.8853121111300246
                                        Encrypted:false
                                        SSDEEP:384:/0xZ9ubhnD2LXMyQwNHnudJv31xtplGsUsgL:/8AxD2LXMyZsJv+L
                                        MD5:BDB8D4677CEA3AAB8A33C99BBA4A4D0A
                                        SHA1:3DCE6ABBC37FD5DE1894430D8976C1F2CE206415
                                        SHA-256:9D9BACE04F18D8E22D492DF129C3E8B762BFB35C42DDF4FB775E7D8E42AAFF3D
                                        SHA-512:CDC05588C1E3666FD6ACF835327F028808A7FC0120DC720255E9E8FF7109283307C4EDF89FDE26906A20F13C02CDAA11EA8C90B205A028AA2CF56416C72B1F0D
                                        Malicious:false
                                        Preview:............ .....f...@@.... .(B......00.... ..%...Y.. .... .....R......... ............... .h........PNG........IHDR.............\r.f....pHYs..........o.d....IDATx...}pT....I...4...."+.5.8.....@UL.d3.H.V,..n;s..2.s....v...v.Z.o..R.,.S.\V.D..1...$@.iR.."..c.HB....M..gf.!...?$..<.y......|.......IY.%........J..MU.\.W.x..u.....t......."...(u............]...........2zNU...Bv...D......S.........5...7?E0....%.]..Og.r.!N..{.i$......L..6s.. .. ...hii...2.C.=....Dv.>..8:.H..C......l.. ....4c...@.knn...D.2.,.. .......iii"....b..#...r.J......i.a..HMM.i.......5}.t.~.....0..q3f........_G...........,_..!`3..%...*,].T.9C....J*....[D.3......SSS.........0.().7........qb.P.?.>...Z....80.(.]w.uX.`.hs..A..Jz7.p....D.3..`...x.b.;W.9C@......&.=[.9C@.....n..555....:..4..|....+E.3.40.h.III..e.PUU%..C ....I)))..w.../.\t...(..4f.....n..^*..C`....i...X.b......M..C0.h.KMM..w...r.M..Q............2.M..`..8.....+W....D..`......U.V...Xt..C..@.Nzz:...QPP ...!...q)++..W...^(...!..
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2710232
                                        Entropy (8bit):4.449689803792709
                                        Encrypted:false
                                        SSDEEP:24576:NL50dQ1nZACUQtQ20BJ3KaUjZG44v7JyvVasNerG747HlhNh:NL5+IAbwQ2UKtIVzkv4s8rGGFhNh
                                        MD5:D858A70BFD136126C43755BADFFF7C80
                                        SHA1:EA1C9003429396AE211526E6E650A0F5B2E54856
                                        SHA-256:A6DC15E8104C7E246FD63E57BEBEB4645E2FB034743DE1E9F0EB23CA4FF5036B
                                        SHA-512:D005F3A39FF973912AA452459CDE1E3A03AC8CF63721734D0E73163D7897500CBBD165803138E36E4915A482DEF7F08D34E08CF440ADC24B5F6DC0FAC7726518
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 4%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............j..j..j......j.)...j.)...j.....j..k...j.)..X.j.)...j.)...j.)...j.Rich..j.................PE..L.....[O...........!................%q........................................*.......)...@..........................G'.X...$='.P.....)..............F).......).......................................&.@............................................text...^........................... ..`.rdata...|.......~..................@..@.data....8...P'......6'.............@....rsrc.........).......(.............@..@.reloc..R.....)......0(.............@..B........................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):300248
                                        Entropy (8bit):6.398876873804225
                                        Encrypted:false
                                        SSDEEP:6144:KeiRTXptFP/h16je0F0T99C1FfEObNOiuG9mAO4iBd:fiR9/nIe0CTvC1Fx2Fd
                                        MD5:255F8B5BA8FCED381089981B95C6AB61
                                        SHA1:D20CEEC8693362C6651EDD55823B3675A8AC0AA3
                                        SHA-256:92B98D076993159D70B36C129B4508815A9C4E34532669F2B4F95D589FCC6BF6
                                        SHA-512:430E218EC8EF80A70CDF258A3A51D2EC77A5A59433C3D8476E3B9EE3023EDC59602214106330F5C65FEB5575420A2CEA8A8ABDCDED43DD8102670730F7210CF3
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................................u.......u.G.................;....u.....u......u......u.....Rich...........................PE..L....q.J...........!.........p......,................................................*......................................L........`.......................p..\*..................................x...@............................................text...>........................... ..`.rdata..............................@..@.data...d........@..................@....rsrc........`......................@..@.reloc..dY...p...`... ..............@..B................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):17733
                                        Entropy (8bit):7.598626308964297
                                        Encrypted:false
                                        SSDEEP:384:OPR8697gJWJ/IAzOvfHNfd+E5hHkCwp0jcGDv6K0Ww:2Po2IA+fNfcEfHkCwqjcUlw
                                        MD5:D2177355BECCFDBC1E7B5C687DFBA290
                                        SHA1:0557F3883AA8EABEFA6A110A08CF549117FD1901
                                        SHA-256:A844247B7CDCAC1A5F61C604E4DB111B274616C0EB19A70CDFB073C8C2F3B375
                                        SHA-512:7E5CE3047E4661969A3827B225F1B88F80BFEA221549E37B406DA52D1C51F60667340BB1A074F96A516D185979AB5E298FAB76BF5789CE7EE34B399FD2BDFA3C
                                        Malicious:false
                                        Yara Hits:
                                        • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\BurnAware Free\is-BSUHA.tmp, Author: Joe Security
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZ......................@...................................D.... ..PE..L....N.W...........!....E....>...............`............................................@.....................................x.......@...................lI..........................................................@....................................p.......:..................@..@.rsrc................<..............@..@.......................................@petite..E.......E....@..............`..`.......................................`.......`...>..z...........E2.dzo..[..^..7..m..&.@...6.@...5...d`o.O.:IPx.......... !......"H(-_.L.......X....P.j.........J..7l.I3j.)...u's...3y.t.*..!W..[....1...Z1......5....C~t@`n...L..x.....5.H9.R\..c...r..1.C....(....9..S..-c....@.3..."gZ..d..j}...@lv.e!;.R].....$|e|`...%.P..IV...x.4D...h.!.>.kg.i.......... .DAC...mfz.W!K.P.k...p...h..9}..ze...2....a..g..[*y....P@.=........?.I..G.......qO...qo......m....Q....L.O....h.~4..95.".y..m4u...cBUH...y.S$i.8q
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1227992
                                        Entropy (8bit):6.429619289168852
                                        Encrypted:false
                                        SSDEEP:24576:Z7xQFeOBnPU4ObAztEBrS5+cJg2g9hB6QCP11/TvtGoh:9DAy9ST29hB6QCP/Tvx
                                        MD5:2573FA5EA27B5BFC5EE3EE6CFE9A2EB9
                                        SHA1:96C74694EA78A9F24958C6B54342532C0F031831
                                        SHA-256:06B8CA60A33AAFF9F35535AC335559CE452CCDCBB79BF8125A7261BCB583D0AE
                                        SHA-512:FF48BC9DF0D39B24CE13A7FB32A333A5E50229DD9DD854732D6AE2272C75F7953D5CCB89C589A911B735667B9425D84FE30E21C69AE914863BD3C009FE848741
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................x...,....................@..............................................@...............................0...0...N......................4<......................................................t............................text....g.......h.................. ..`.itext...............l.............. ..`.data....f.......h...|..............@....bss.....{...............................idata...0.......2..................@....didata.............................@....tls....<................................rdata..............................@..@.reloc..4<.......>..................@..B.rsrc....N...0...N...Z..............@..@....................................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1350360
                                        Entropy (8bit):6.642861347345999
                                        Encrypted:false
                                        SSDEEP:24576:ye08zSJMzUJ5I4VSwq2BdS/7IF3B9G4J+gPOiIsTAA7ZUWkUNmN:lkvS0395J+gPOYTAPamN
                                        MD5:08E8163EBA464CB7AE6F2B3A0BE3B291
                                        SHA1:5AC0076EC87BD3D06772CEFCAE11148021121046
                                        SHA-256:6E185E0ADF5B486AD1076F1C374196BA98651065934A7530D5110891BEEB0C2E
                                        SHA-512:513846CFF37BC120CDF5F39F2D6966EBB983A6C3EA89B324BF0865A0CF38BF14EBE33B26ACCE95133FAD4C441C660166D049C199002ABAC98086973CFBCA7F50
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................v..........X.............@..........................`.......z...........@..............................Z2... ...@......................8*..................................................8................................text....e.......f.................. ..`.itext...............j.............. ..`.data....e.......f...z..............@....bss.....y...............................idata..Z2.......4..................@....didata.............................@....tls....<................................rdata..............................@..@.reloc..8*.......,..................@..B.rsrc....@... ...@...F..............@..@.............`......................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1439960
                                        Entropy (8bit):6.459374732571663
                                        Encrypted:false
                                        SSDEEP:24576:g1Y2Zf4AVKcuPVmsmgreaBtSLNomKP5WzSe3yjvTGK/k:af4Ag/SYP5WzSe3OTGK8
                                        MD5:D636263A0C8B6D3E1E09A3C6F512DD07
                                        SHA1:9D15830E18D428DBCFB098DB8781BDF8269CD14C
                                        SHA-256:8E19C44FFB6C9F2990EC70D0C3793AC2DBC0D4D054FC451FC9CD4A39C5F1DF82
                                        SHA-512:07BA604C7CCA094B512CDF746BC943F3546501C044E3FD2CABFA3B9D92454476306C0AF555342ACF045DA7083F40659CA81E168079353432DFD8112AF6F28BAF
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................~...b......t.............@.................................;d...........@..............................j0...`...T.......................j.....................................................t............................text...$o.......p.................. ..`.itext...............t.............. ..`.data...<h.......j..................@....bss.....{...............................idata..j0.......2..................@....didata.............................@....tls....<............"...................rdata..............."..............@..@.reloc...j.......l...$..............@..B.rsrc....T...`...T..................@..@....................................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3017432
                                        Entropy (8bit):6.571487341115199
                                        Encrypted:false
                                        SSDEEP:49152:i9TAxIGE68oFvXexWTBQH8HHGGdnFBZHbtNsvL70VlSQhGFCbHDauRAXHWB/JABk:mTAxHKaQHyHGGdnF7BNsD70VlSQhGMXB
                                        MD5:E0B2CF5ED07CFFC970C50EAAB3451043
                                        SHA1:30A7480E8FAA8A7494F7163CD95CA0D6FE7D8D3A
                                        SHA-256:1B0F5A28F4CDC6BEF0808239DA4B7138B16166A3574276F619BA5169FF09D351
                                        SHA-512:5F91E45D2BF717ED720F4D91955EE65B82EF265725F3B8F08E01398636B542AA81A5EADBB631D3FBD2EB2A2C84310A0DA6DC2BBF5B316F7973C5C6D34B24846A
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l....................S........b........]............................b..0....b.......b.......b.......b......Rich....................PE..L....GjX...........!...... .........[.........!...............................>.....M.....@......................... =(.....8.(.|.....9.VZ............-.......;.8.....................................$.@.............!.x............................text..... ....... ................. ..`.rdata...Q....!..R.... .............@..@.data...h9...`(......<(.............@....rsrc...VZ....9..\....(.............@..@.reloc.......;......R*.............@..B................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1538264
                                        Entropy (8bit):6.488992484377018
                                        Encrypted:false
                                        SSDEEP:24576:NXOpC0NNHAxRVJG0WdKM6BHS2xVDkGcM3qBSsEXmgTm8ELlOR:Njyo5SUu/M3qBSsEFTCLl4
                                        MD5:3B9CA55AAA6C2F1089F04317A1D0ED5C
                                        SHA1:D263CC81CDBE420F45B26BB46FBE367E0DBC5AAC
                                        SHA-256:6615AFC9218EC2AC5A9FC52C3195316BF2C7F3D1F015EEB505082A3541DF5451
                                        SHA-512:202EF63DE215AB5A9B94B753855276971782F617C8CECA8B92803D0DEAAE53BF222A20C6BD565CC0AB5E5B3515BDD6134F7F76BB2F91CA543504F9CE67FFA809
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................`...........n.......p....@..........................0.......S...........@...........................`..:5...`...............d..........8....................................................i..,....... ....................text...,N.......P.................. ..`.itext.......`.......T.............. ..`.data...pj...p...l...d..............@....bss....t|...............................idata..:5...`...6..................@....didata. ...........................@....tls....<................................rdata..............................@..@.reloc..8...........................@..B.rsrc........`......................@..@.............0.......d..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):124060
                                        Entropy (8bit):7.95689673801651
                                        Encrypted:false
                                        SSDEEP:3072:h4Ht0B1105GzXyO6vvasTeprZKYQ+U1YUjJ09d:qs11IdPvCUef519d
                                        MD5:68523838F432A39A764B5FD4E4DD14CF
                                        SHA1:46F09323FECCFEFA3AA1D5940D9BF09A2A14351F
                                        SHA-256:EFB350839CBE0074F799A28EC76513C32E2CB1ADC85CEBA527859EC36B1B5FB5
                                        SHA-512:468C3AF4BC3154882217676E9EE9EB29C623F0DC4BE951175D6D93281A9449616803499D7B19A26D0C0E6F18C976D7BE32FFD4C7A50AFE0D6D72E6ADB60E383C
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\BurnAware Free\is-KTHJV.tmp, Author: Joe Security
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZ......................@...................................D.... ..PE..L....WFZ...........!.................@.......................................P............@..........................B.......A..........@...................0.......................................................<B..H...............................................................@..@.rsrc...............................@..@......... ... .........................@petite.......@......................`..`....................................]......Y...*.z|y.....GqOn=..2Z.". ..hV..caQ...N.N.VQ..w.O5.Q..pH.=@.`....H...xi..De 06j..Z.?)*.n|.`68..8:.0..EI.X..v0.!P...t.@....Z.q5.....d(..~.&...%..&.sFl.A....H.1...g+........_B..."...SOZVLSGRCWJ.o..^F[C............1.f.......t(."0?.9W....2...P....:2...F..O...a&.J.7L,...4.../.1.....c<.Q...2.x0&..618F...Q.QPu.%...:q..........a...1m=.0..D..\./.!............B...Z....!..Q%....#...n.`..1...C(Rd...z..7....3....8;wI1.b.....,]..O..zo.QKl/.6...Y1TY....w.....(.K.N..m3.......,K
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1550040
                                        Entropy (8bit):6.460281125947317
                                        Encrypted:false
                                        SSDEEP:24576:vNanyO0LRZBCH6wYtQ61QkDBrSeTchSRpevKM5qC5gT+VCBpwW:vrbZXNStsevKM5pyTtBp5
                                        MD5:35C1484D5AB51E9127FFF29F1EC5E8BF
                                        SHA1:642B15CAC9E614564BEF6EC1554D271490C9DC4B
                                        SHA-256:223B5A52DB60618BE714B319C0F000E040B48E1BE6ACB9DFEDFD674844F744FC
                                        SHA-512:4D62E252A0321312FF980B7FEEDE6FBBE2B5543FBA4DEBED19D1E709847811BABC4EB4731F74B37BAE0F266EE4A8054E0ACEEE71A829CDFA5D6C54D8E7AB85E9
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....2[..........................................@...........................+..................@............................&.\5....(......................P'..{...........................@'.......................&.,.... '......................text...X........................... ..`.itext........... .................. ..`.data...@y.......z..................@....bss.........P.......4...................idata..\5....&..6...4..............@....didata...... '......j..............@....tls....<....0'......n...................rdata.......@'......n..............@..@.reloc...{...P'..|...p..............@..B.rsrc.........(.....................@..@..............+.....................@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows HtmlHelp Data
                                        Category:dropped
                                        Size (bytes):102640
                                        Entropy (8bit):7.810597006099471
                                        Encrypted:false
                                        SSDEEP:3072:gIvgrB9Fg4mqOXEBL6sZqRF7kB+F/Uq+2:gIyg4mSu6sFIB+Fsg
                                        MD5:C2D09407D88D80FEEE01A5BA49158EEF
                                        SHA1:E7B66B693EECB22232159A502F3E51C0F4D7280B
                                        SHA-256:1D101980FBB738DB9BA98901B3A46CB9FECDF174BD0981262B78F97AD9736CD4
                                        SHA-512:24E1AF4770EA46E8140FB0A1AB9F094E54454948B30BB2B9CACA9159E658BD827908BA4A073C3187177F7EABFC032665B27566221644D5E94A9DBA37621A4341
                                        Malicious:false
                                        Preview:ITSF....`.........V........|.{.......".....|.{......."..`...............x.......T......................................ITSP....T...........................................j..].!......."..T...............PMGL^................/..../#IDXHDR...|.../#ITBITS..../#STRINGS......./#SYSTEM....<./#TOPICS...|.@./#URLSTR...l.../#URLTBL...<.0./#WINDOWS...$.L./$FIftiMain...x..../$OBJINST...9.?./$WWAssociativeLinks/..../$WWAssociativeLinks/BTree...t.L./$WWAssociativeLinks/Data...@.G./$WWAssociativeLinks/Map....../$WWAssociativeLinks/Property.... ./$WWKeywordLinks/..../$WWKeywordLinks/Property...p../audio_cd.htm..4.../audio_grabber.htm..F.s./blu-ray_disc.htm...9.l./boot.htm...%.8./boot_disc.htm...].9./btn_home_h.gif.....d./btn_home_n.gif...d.X./btn_next_d.gif...<.../btn_next_h.gif...F.../btn_next_n.gif...S.5./btn_prev_d.gif.....g./btn_prev_h.gif...o.b./btn_prev_n.gif...Q.../burn.htm.....P./burn_image.htm...f.g./burnaware.hhc...B.4./burnaware_popup_html.js..../button_closedbook.gif...k.u./button_openbo
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):2128600
                                        Entropy (8bit):5.92597532283096
                                        Encrypted:false
                                        SSDEEP:12288:d1GA4AOyb8SyFXjZKJ4Sb9bnNBNSKyXSYt/R+Mt9tAFp51kSgdExIXVyk00y/Zml:dQFAZNBNSKyXSYt/R+CAzjkSPmV4+H
                                        MD5:CD32BE24426955B5141204FA035CA6B3
                                        SHA1:6AEB4836B01ED01DA3CAB689A3B8E108FE411C9A
                                        SHA-256:E5D7E21FA3ED144228D7500C5C3E41EB8F2AAFB581741854092BF3F2BAE1F937
                                        SHA-512:90884D1EE59007616B3B8783E212F61474318342B2831FA40A0400A6BD8D14846E1224CFFC285BB43ACF177EE81D544A034BBB989D2F624FED7A63C2BCFC3004
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 3%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..d....8.Z.........." ................ .........@..............................P!.......!.............................. ..........................LF.... ......`..0Y...f ..........G..................................................@................................text............................... ..`.data...P,..........................@....bss.....................................idata..LF.......H..................@....didata..............2..............@....edata...............>..............@..@.reloc...G.......H...@..............@..B.pdata..0Y...`...Z..................@..@.rsrc......... .....................@..@.............P!......f .............@..@................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):19396
                                        Entropy (8bit):7.541174332849443
                                        Encrypted:false
                                        SSDEEP:384:KobrFPWMgug1kD3uxnqtpJUBGWFXO1H6OGZ9k0yKfg5io/s2R9SzK0r8pD2:KovFPW7Gyp0JsXOYOGZ9k0XfgC
                                        MD5:74B6071109D2FA2B27B75BD3CC100BBB
                                        SHA1:0038A6A686EEB5BD082A4FB32413A48D4D0F1AFF
                                        SHA-256:8A3391210D0CDEBB06B0292D0DF9CEC3A2BBCBCA0B99979B65143B0568F04106
                                        SHA-512:CCEA98DA1F00A8AC159703AE13F92748DB2D323B94E91B361D6D136515D0C715D394FAAE5A52664F96F1452D4B5F820EB1B4773A37F0D82C094DAAECA1ED8E17
                                        Malicious:false
                                        Yara Hits:
                                        • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\BurnAware Free\is-PBHEO.tmp, Author: Joe Security
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZ......................@...................................D.... ..PE..L....v.V...........!.........D...............p............................................@.............................................@....................N......................................................"...H............................................@..................@..@.rsrc................B..............@..@.......................................@petite...............F..............`..`..........................................>m@.SE3..f..H4\....5b.31bo.. ..w.#&-..h.....D@....QfS......S.<..m.g..T&|h.@.J..._.(.)..D.....=#.H.0..J.F......I.Mg......B...f...k.V..........B.~.C..|..."p./...?.[..k.o[/R..2*...:Z?N...8.Z..^....."........ .h..8LQ.e..T1[.eX...'(.D..!R..o....J....+..P..9..PDC..... RZ..Q....:...J0.e:c..@.iW...2..<.&{*.5....zZ..?.D.${..:...:\L.....v.s12..{..ezU[...4a..l....#p../?m.;...|8+@Myo3...f)....z....J7..slp...5.....d...f2.i.....G.......A.+"g......z&,..=3.39j../..,h.Z...[.F..
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2048216
                                        Entropy (8bit):6.523206686484186
                                        Encrypted:false
                                        SSDEEP:24576:j1H4xy4kR3za8sVPggUuBFzmBLSFRBNTvgADqjuOr75S6UMDmc9rO3T4JkQjy:jou9SzDiFr75S65Dbx6T4iX
                                        MD5:E5D98861DD116EDA1908CF22D466CD45
                                        SHA1:A689C7B7ED7C0E4346E1BA7FBEE00997F0B70F08
                                        SHA-256:0CD6431FA27A99E40FEE93B5741A3CED349F56609A9E9A75EF10859AF3DDF674
                                        SHA-512:6715E64D594401D60AC144DBC799C4F2E0EA99F5DE2FD46DC8BE111BCFFDEE0F27C246961B0561166389EBD7A569F29680AA48B328894F8C9F227E3428DC6FCA
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.....................P....................@.......................... 3......< ..........@............................-..>...p/..............,........-..............................p-.......................-.|....P-. ....................text............................... ..`.itext..< .......".................. ..`.data...............................@....bss.................\...................idata...>....-..@...\..............@....didata. ....P-.....................@....tls....<....`-..........................rdata.......p-.....................@..@.reloc........-.....................@..B.rsrc........p/.....................@..@............. 3......,..............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):14324
                                        Entropy (8bit):7.652105290311656
                                        Encrypted:false
                                        SSDEEP:384:uJsyVJWQTkvwm96zI7QvGIdfjMrE12S6zt+q9JVeJSwrWK0C:uNVkgvm9QIYfAYVotthvw5
                                        MD5:6F26A1A5D165272BA48F45BC0B79750E
                                        SHA1:01E410C26CDDB4D413609D867ED0B9B9E524C1C0
                                        SHA-256:5B97117B37D3CF1EDA8AFA90D872E4D2A74C5E59FC925E637AD1290865F582E5
                                        SHA-512:A7570ED8AE48574E44CB7EA04A796295657876B7A0F9B8F67D16CFAC0FEDDA1D02A4631F711195CD070AECCC8C7CA2AC2F23D28BF9DA8FA06BF2A101C53AB60F
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\BurnAware Free\is-QUKL7.tmp, Author: Joe Security
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...................................D.... ..PE..L...2h.V...........!.........2...............P............................................@.....................................x............................?..........................................H...............@....................................p.......0..................@..@.rsrc................2..............@..@.......................................@petite...............4..............`..`.........................................c.l.`#..j.Z........ b.E.!N...I.........K.|....fv...ZF.1G...".w-.^f$..H..,\..U..D:.......I...n...HXg.....0.....Q.0 .8...|..,.;.PY..RU.".....l.1...E6^..4P.K8..K.@.1.W(R..)..k.y.a._..t.t6.3qD...P../..m...m..T...P.R.\.......O....g........6..QL6.z..Y...........*f.d..+..7B....k.........<.}z0.Kmj..{%".Fg?.).Q...E.>.Y...P.t.........Eg..w..R..P.4...T.CZ.._.U..T...zt4........p. ............?.........X..,+...@..=....!{..rs=..QzY..~..0.y.D....D........Y<^...-C....$.T...
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:DOS/MBR boot sector, code offset 0x3c+2, OEM-ID ")TNQ9IHC" cached by Windows 9M, root entries 224, sectors 2880 (volumes <=32 MB), sectors/FAT 9, sectors/track 18, serial number 0x350518e3, label: "BOOT622 ", FAT (12 bit), followed by FAT
                                        Category:dropped
                                        Size (bytes):1474560
                                        Entropy (8bit):6.99474059909904
                                        Encrypted:false
                                        SSDEEP:24576:A1o795/aeZ9NJ6P+TqpVj9jyJYNQKj43FuI97CwiQqddnr5O9aH41SflbEkj3eSa:A1EU+TqpVjOYNnPnrw9arIkjuSgog
                                        MD5:A4A096CAB6079C2CFA88A8BDE0EAC3AA
                                        SHA1:14F2A0E33B11F047D16DE56E92567C5FAA6C5668
                                        SHA-256:1AB300A0A54B8F384CC457424EA0D2F3F46BEF11C0172429C6B207B2EC539E6E
                                        SHA-512:415F5EE18500D442824546002C8B21FC96EAC883BD5844862767381EF05803440115FBD7ACB569A68862FD89E6C11C6B63465895134020520E2070429FD6BFB7
                                        Malicious:false
                                        Preview:.<.)TNQ9IHC........@..................)...5BOOT622 FAT12 .3....|...x.6.7.V.S.>|........E.....|.M..G...>|...ry3.9..|t....|.. |..|.&.|...|...|...|....P|..R|.I|..K|. ..&.|...|..H....I|..K|......R|.P|..r.....r........}.u... ....t...}._.3...^....D...XXX..G.HH...|2.....I|..K|......PRQ.:.r...T.YZXr..........|....|..$|..I|.K|...p....t).........;..|s..6.|...O|3..6.|..%|.M|.......M|.....6O|....$|.6%|.....Non-System disk or disk error..Replace and press any key when ready...IO SYSMSDOS SYS..U.....@..`................. ..@..`................! .#@.%`.'..)..+..-../..1 .3@.5`.7..9..;..=..?..A .C@.E`.G..I..K..M..O..Q..S@.U`.W..Y..[..].._..a .c@.e`.g..i..k..m..o..q .s@.u`.w..y..{..}...... ..@..`................. ..@..`................. ..@..`................. ..@..`................. ..@..`............... ..@..`............... ..@..`............... ..@..`.................!..A..a.................!..A..a................!!.#A.%a.'..)..+..-../.../.3A.5a.7..9..;..=..?..A!.CA.Ea
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2240216
                                        Entropy (8bit):6.515674271457544
                                        Encrypted:false
                                        SSDEEP:24576:9YQlxYiPt1wRr3AJId1qBHSMi2UiHQho+3HxDfzFxPK05M9NyKIbTvhTjQF:+8/5ScHL+3HxDfRxCcTvhTu
                                        MD5:5BCD29D045C4346F0DC4DC16712608A4
                                        SHA1:05F58AD366145F9135C583A262C51C558CF48452
                                        SHA-256:6AE136A1B4ED9E5C1187F466FB304A0A1F42E6E92BD73FBD9C79904D1621E88B
                                        SHA-512:493718D696513C378139E50ECCF2A69041A37520EAF1F3060E25E6E9C83302FDBA24B3C2744698FEFA8D5D18CBAE6FB8F6B82259A904BCFFFFFC9ACF4400AD4E
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....2[.................J..........._.......p....@...........................6......."..........@............................/..;... 2...............".......0.L.............................0......................./......./. ....................text....'.......(.................. ..`.itext... ...@..."...,.............. ..`.data...p....p.......N..............@....bss.....................................idata...;..../..<..................@....didata. ...../.....................@....tls....<...../......$...................rdata........0......$..............@..@.reloc..L.....0......&..............@..B.rsrc........ 2......4..............@..@..............6.......".............@..@........................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 64x64, 32 bits/pixel
                                        Category:dropped
                                        Size (bytes):40426
                                        Entropy (8bit):3.8853121111300246
                                        Encrypted:false
                                        SSDEEP:384:/0xZ9ubhnD2LXMyQwNHnudJv31xtplGsUsgL:/8AxD2LXMyZsJv+L
                                        MD5:BDB8D4677CEA3AAB8A33C99BBA4A4D0A
                                        SHA1:3DCE6ABBC37FD5DE1894430D8976C1F2CE206415
                                        SHA-256:9D9BACE04F18D8E22D492DF129C3E8B762BFB35C42DDF4FB775E7D8E42AAFF3D
                                        SHA-512:CDC05588C1E3666FD6ACF835327F028808A7FC0120DC720255E9E8FF7109283307C4EDF89FDE26906A20F13C02CDAA11EA8C90B205A028AA2CF56416C72B1F0D
                                        Malicious:false
                                        Preview:............ .....f...@@.... .(B......00.... ..%...Y.. .... .....R......... ............... .h........PNG........IHDR.............\r.f....pHYs..........o.d....IDATx...}pT....I...4...."+.5.8.....@UL.d3.H.V,..n;s..2.s....v...v.Z.o..R.,.S.\V.D..1...$@.iR.."..c.HB....M..gf.!...?$..<.y......|.......IY.%........J..MU.\.W.x..u.....t......."...(u............]...........2zNU...Bv...D......S.........5...7?E0....%.]..Og.r.!N..{.i$......L..6s.. .. ...hii...2.C.=....Dv.>..8:.H..C......l.. ....4c...@.knn...D.2.,.. .......iii"....b..#...r.J......i.a..HMM.i.......5}.t.~.....0..q3f........_G...........,_..!`3..%...*,].T.9C....J*....[D.3......SSS.........0.().7........qb.P.?.>...Z....80.(.]w.uX.`.hs..A..Jz7.p....D.3..`...x.b.;W.9C@......&.=[.9C@.....n..555....:..4..|....+E.3.40.h.III..e.PUU%..C ....I)))..w.../.\t...(..4f.....n..^*..C`....i...X.b......M..C0.h.KMM..w...r.M..Q............2.M..`..8.....+W....D..`......U.V...Xt..C..@.Nzz:...QPP ...!...q)++..W...^(...!..
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):14324
                                        Entropy (8bit):7.652105290311656
                                        Encrypted:false
                                        SSDEEP:384:uJsyVJWQTkvwm96zI7QvGIdfjMrE12S6zt+q9JVeJSwrWK0C:uNVkgvm9QIYfAYVotthvw5
                                        MD5:6F26A1A5D165272BA48F45BC0B79750E
                                        SHA1:01E410C26CDDB4D413609D867ED0B9B9E524C1C0
                                        SHA-256:5B97117B37D3CF1EDA8AFA90D872E4D2A74C5E59FC925E637AD1290865F582E5
                                        SHA-512:A7570ED8AE48574E44CB7EA04A796295657876B7A0F9B8F67D16CFAC0FEDDA1D02A4631F711195CD070AECCC8C7CA2AC2F23D28BF9DA8FA06BF2A101C53AB60F
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...................................D.... ..PE..L...2h.V...........!.........2...............P............................................@.....................................x............................?..........................................H...............@....................................p.......0..................@..@.rsrc................2..............@..@.......................................@petite...............4..............`..`.........................................c.l.`#..j.Z........ b.E.!N...I.........K.|....fv...ZF.1G...".w-.^f$..H..,\..U..D:.......I...n...HXg.....0.....Q.0 .8...|..,.;.PY..RU.".....l.1...E6^..4P.K8..K.@.1.W(R..)..k.y.a._..t.t6.3qD...P../..m...m..T...P.R.\.......O....g........6..QL6.z..Y...........*f.d..+..7B....k.........<.}z0.Kmj..{%".Fg?.).Q...E.>.Y...P.t.........Eg..w..R..P.4...T.CZ.._.U..T...zt4........p. ............?.........X..,+...@..=....!{..rs=..QzY..~..0.y.D....D........Y<^...-C....$.T...
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:InnoSetup Log BurnAware Free, version 0x418, 11990 bytes, 992547\37\user\, C:\Program Files (x86)\BurnAware Free\376\
                                        Category:dropped
                                        Size (bytes):11990
                                        Entropy (8bit):3.794125503819784
                                        Encrypted:false
                                        SSDEEP:96:eO5Dn8AZv/I/MAbCmbcuJlEDA4MZAe2LVu0EtUC1CRCS9ClCnCM9C7C9kClCQhqZ:55wg6bP4DSmc104+sJjzCig95dHm
                                        MD5:ACA87C5B6DD2EB0AFD4751BCB1FB2819
                                        SHA1:3EBBB20496A5FDF7BC7F8EB492DA80633805E81F
                                        SHA-256:B7B8D405A6F6C888803C6BD8981E4216F3F38DEA1E8FD817DE2A927F366E84E0
                                        SHA-512:1F550AF4E9302E32B81650B44D5DE9DCDE4E9A9E5D65BE92BEB114099FE2E246943ECF1F84572DBD6E855D46AC97396BEA1A370AD6F2BE7B081DC4E5A4DACE6B
                                        Malicious:false
                                        Preview:Inno Setup Uninstall Log (b)....................................BurnAware Free..................................................................................................................BurnAware Free......................................................................................................................<.......%...........................................................................................................................fT................9.9.2.5.4.7......e.n.g.i.n.e.e.r......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e................2...v.. ..............IFPS...."...............................................................................................................................................................BOOLEAN..............TSETUPSTEP.........TWIZARDFORM....TWIZARDFORM.........TEXECWAIT.........TNEWSTATICTEXT....TNEWSTATICTEXT.........TSETUPMESSAGEID.................!MAIN....-1.....6.......CURSTEPCHANGED....
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1278181
                                        Entropy (8bit):6.457767718219793
                                        Encrypted:false
                                        SSDEEP:24576:EnbbPImgK4brDi4IxgRqzwqNb+Yz73P2EMZbG0JEt7Afjqx9z1:SHeKh4nqzF3PYdStuWz
                                        MD5:E2E897166C54B6EE47F0167221C28BD6
                                        SHA1:973EE8DEB14DBF2B52B8218FC82027BE186F1982
                                        SHA-256:C9B0BAD8C38604734F0ACAED5C6AA1A3142667E9E17D65838D964169C69C48EE
                                        SHA-512:EC0B6499C160090CAF95A1E377413DB51E7EDE6D8EB4302C5661558F56288A83AADF24FD0547538C001199A991ABB346520ADB0AFA1D2C861C492C9CA47D2348
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 4%
                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...Rm"[.............................%.......0....@.......................................@......@..............................@8...@.......................................................0.......................................................text............................... ..`.itext.............................. ..`.data....0...0...2..................@....bss.....a...p.......L...................idata..@8.......:...L..............@....tls....<.... ...........................rdata.......0......................@..@.rsrc........@......................@..@....................................@..@........................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows 95 Internet shortcut text (URL=<http://www.burnaware.com/>), ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):51
                                        Entropy (8bit):4.461161861367234
                                        Encrypted:false
                                        SSDEEP:3:HRAbABGQYm/0S4wUQLdYvn:HRYFVm/r4wUeOvn
                                        MD5:CFE219C7B0A6EDC037F6DBE7D18F8186
                                        SHA1:21E056119F133A5902A5545E32111B3A36FC7AEB
                                        SHA-256:F00E15A8922D6BDECF8A113EA78818C33647D4BBDAD83E924CFAEBFA8DA3A848
                                        SHA-512:67669E713BB707AA46C767FD2DE584D32DAF658C046DFEDE403D15F3C89789B98F09597930C2C339F2517205BA2D7BB7191588F68F2F539831AA0A833B981FA7
                                        Malicious:false
                                        Preview:[InternetShortcut]..URL=http://www.burnaware.com/..
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 11 16:50:13 2024, mtime=Thu Jul 11 16:50:13 2024, atime=Wed Jun 27 00:12:10 2018, length=1350360, window=hide
                                        Category:dropped
                                        Size (bytes):1145
                                        Entropy (8bit):4.650774732002969
                                        Encrypted:false
                                        SSDEEP:24:8mU/Ft2EeikdOEzcCzAgfQdPc4dPcwoUUkjqygm:8mgZNkdOWcLgfQdPc4dPcw94yg
                                        MD5:7A472AAA77E0C61510C5A6CC1CB9D78E
                                        SHA1:3CE0210296B0C42E25550C1B88A16AF92961DDAB
                                        SHA-256:D07ED0C3FF967FAEA97221BFC38791A3AAA130BE41A50F3DA8042776216ED15B
                                        SHA-512:3187809E692B9ADE52B126267514B05FD77F6CCB9E5A7DB3F1584D17556B949F551E4F4A634F254C55F1846D1D1F844AEEE62B9A00E4B99D5F01E4E57BDCF1EB
                                        Malicious:false
                                        Preview:L..................F.... ..........y........v................................P.O. .:i.....+00.../C:\.....................1......X3...PROGRA~2.........O.I.X3.....................V.....\.e.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1......XH...BURNAW~1..N.......XG..XH.....D.........................B.u.r.n.A.w.a.r.e. .F.r.e.e.....h.2.....L.. .BURNAW~1.EXE..L.......XG..XG.....X.........................B.u.r.n.A.w.a.r.e...e.x.e.......b...............-.......a....................C:\Program Files (x86)\BurnAware Free\BurnAware.exe..B.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.\.B.u.r.n.A.w.a.r.e...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.........*................@Z|...K.J.........`.......X.......992547...........hT..CrF.f4... .....Jc...-...-$..hT..CrF.f4... .....Jc...-...-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 11 16:50:13 2024, mtime=Thu Jul 11 16:50:13 2024, atime=Fri May 18 16:57:50 2018, length=102640, window=hide
                                        Category:dropped
                                        Size (bytes):1145
                                        Entropy (8bit):4.6590926209308625
                                        Encrypted:false
                                        SSDEEP:24:8mjY/LEodOEzccAgfedPcmdPcwoUUkfqygm:8mjEoodOWcbgfedPcmdPcw9Uyg
                                        MD5:FE388676B70A40E567C871C2B18FC587
                                        SHA1:5326FFA6A07BF99AF4EE8C504942B453C7DD9E5A
                                        SHA-256:F73E8B845BB48E01F151E10B839E90DDC60D7D68EDC975465ACBFE9681B5F26D
                                        SHA-512:5495A1A3E7310E4EBE01EC9EFF6A2A5CDED80FDD53CAF9BF0AB83DBF9BD8A62A43FC8231C60619EA3AF0D73FE1C767DBF14FC6C8D1E3670677D42221C95475DF
                                        Malicious:false
                                        Preview:L..................F.... .....G......G.....#b.................................P.O. .:i.....+00.../C:\.....................1......XG...PROGRA~2.........O.I.XH.....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1......XH...BURNAW~1..N.......XG..XH.....D.........................B.u.r.n.A.w.a.r.e. .F.r.e.e.....h.2.....L9. .BURNAW~1.CHM..L.......XG..XG.....I.........................b.u.r.n.a.w.a.r.e...c.h.m.......b...............-.......a....................C:\Program Files (x86)\BurnAware Free\burnaware.chm..B.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.\.b.u.r.n.a.w.a.r.e...c.h.m.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.........*................@Z|...K.J.........`.......X.......992547...........hT..CrF.f4... .....Jc...-...-$..hT..CrF.f4... .....Jc...-...-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 11 16:50:12 2024, mtime=Thu Jul 11 16:50:12 2024, atime=Thu Jul 11 16:49:42 2024, length=1278181, window=hide
                                        Category:dropped
                                        Size (bytes):1140
                                        Entropy (8bit):4.640499697151714
                                        Encrypted:false
                                        SSDEEP:24:8mxHQLEodOEzcB0IQA3fxdPcTgdPcwoUUk7qygm:8mxHQoodOWcB043fxdPcTgdPcw9oyg
                                        MD5:D061313BF69BA9A675A8D416CCC0C58E
                                        SHA1:29A29FD2AC8BD01D10E2084C6AFBB5166A4767B5
                                        SHA-256:C45D62A895F76C94879EB8B6FF69EA60E6AFBC36527EB6836F915EC229FBC667
                                        SHA-512:7A78A6AEAC6C0540A007A7F94885CB170FE26E93AD9776A60E1BACBC6681C8A234B38B6B328647B56DA0048D02613755C8DB1B02F131076314DAF8214B1191C1
                                        Malicious:false
                                        Preview:L..................F.... .............o.P.................................P.O. .:i.....+00.../C:\.....................1......XG...PROGRA~2.........O.I.XH.....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1......XH...BURNAW~1..N.......XG..XH.....D.........................B.u.r.n.A.w.a.r.e. .F.r.e.e.....f.2.....X6. .unins000.exe..J.......XG..XG...............................u.n.i.n.s.0.0.0...e.x.e.......a...............-.......`....................C:\Program Files (x86)\BurnAware Free\unins000.exe..A.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.\.u.n.i.n.s.0.0.0...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.........*................@Z|...K.J.........`.......X.......992547...........hT..CrF.f4... .....Jc...-...-$..hT..CrF.f4... .....Jc...-...-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 11 16:50:13 2024, mtime=Thu Jul 11 16:50:14 2024, atime=Wed Jun 27 00:12:10 2018, length=1350360, window=hide
                                        Category:dropped
                                        Size (bytes):1127
                                        Entropy (8bit):4.675660773567332
                                        Encrypted:false
                                        SSDEEP:24:8mi/LEodOEzcCzAgfndPc4dPcwoUUkjqygm:8mOoodOWcLgfndPc4dPcw94yg
                                        MD5:53A261E85FB1C16504FCB4222EE762FE
                                        SHA1:416D2E9E33854296E13A5453996227ACCA4075E8
                                        SHA-256:40097F61AAEE11EE4FA2974EBF8A3BBB461A7FAD679A64B9DD46596B538122A2
                                        SHA-512:AA4F46365404D9780D09738C703970A19325EE94180444E7C7A46FA53138707B92521B9C51408FCAF8B1BD636070619A46F058EEE1A0F40FC7E90DBCD03C0717
                                        Malicious:false
                                        Preview:L..................F.... ...................v................................P.O. .:i.....+00.../C:\.....................1......XG...PROGRA~2.........O.I.XH.....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1......XH...BURNAW~1..N.......XG..XH.....D.........................B.u.r.n.A.w.a.r.e. .F.r.e.e.....h.2.....L.. .BURNAW~1.EXE..L.......XG..XG.....X.........................B.u.r.n.A.w.a.r.e...e.x.e.......b...............-.......a....................C:\Program Files (x86)\BurnAware Free\BurnAware.exe..9.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.\.B.u.r.n.A.w.a.r.e...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.u.r.n.A.w.a.r.e. .F.r.e.e.........*................@Z|...K.J.........`.......X.......992547...........hT..CrF.f4... .....Jc...-...-$..hT..CrF.f4... .....Jc...-...-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.
                                        Process:C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        File Type:CSV text
                                        Category:dropped
                                        Size (bytes):1740
                                        Entropy (8bit):5.36827240602657
                                        Encrypted:false
                                        SSDEEP:48:MxHKQ71qHGIs0HKGAHKKkKYHKGSI6oPtHTH0HNpaHKlT4x:iq+wmj0qxqKkKYqGSI6oPtzH0tpaqZ4x
                                        MD5:0953036116DB18A3DBA50A95249AA09D
                                        SHA1:B0C95E1A76B13F979FA7FF6671473E983E13869B
                                        SHA-256:21B609D6C67BE1A72318549C614FFED1E4D09D90125217AA758DB759CB622231
                                        SHA-512:9A9D7AA570410A253A4DBDBFED162C3537C040425CFD7C8A9F70CA0BB7BCE4824AD959BECAF60A2FA4D090CF06328EE3A03BAC65E30209339ECA06679106166B
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\3
                                        Process:C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exe
                                        File Type:JSON data
                                        Category:modified
                                        Size (bytes):3577
                                        Entropy (8bit):5.3067262976435
                                        Encrypted:false
                                        SSDEEP:48:J3GwCR6lILzETSo1eKV/EgKlEEgciio1CZZaB2kK+xiswtpdkNo1CZZCHBNswt9c:ltCEtZyaB2kRLayEgUfs
                                        MD5:BCA658656108FB3CE1A6047A26969E08
                                        SHA1:DCABA6D48CD41885887D3048F337AB437590E2D6
                                        SHA-256:BF4B3030B809F1F0244E76195DB8326F233D82EE20FC5299A66C728B4A87BCEF
                                        SHA-512:EB9B4238D5816DBE0AB85F7FB4A20A208BA6B0853983E87797424FC91693F787B2D640DBC0D899212F94569E499CAFAC9CAB0D715EFB895A33CBD43C361EED29
                                        Malicious:false
                                        Preview:[1][debug][2024-07-11 13:50:15.338184][00:00:00][0x00000d18][0x00001998][installer][wWinMain][429]: install id=da0b6bd0-68bb-45f6-81ab-fe5aa06695ca..[2][debug][2024-07-11 13:50:15.338184][00:00:00][0x00000d18][0x00001998][installer][wWinMain][432]: generic setup config file path="C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe.config"..[3][debug][2024-07-11 13:50:15.338184][00:00:00][0x00000d18][0x00001998][installer][wWinMain][448]: event service url=https://flow.lavasoft.com..[4][debug][2024-07-11 13:50:15.338184][00:00:00][0x00000d18][0x00001998][installer][wWinMain][460]: bundle config file path="C:\Users\user\AppData\Local\Temp\7zSC9543C70\BundleConfig.xml"..[5][debug][2024-07-11 13:50:15.338184][00:00:00][0x00000d18][0x00001998][installer][wWinMain][471]: BundleId=BA002..[6][debug][2024-07-11 13:50:15.338184][00:00:00][0x00000d18][0x00001998][installer][ReadUACSetting][93]: No such node (<xmlattr>.UACSetting)..[7][debug][2024-07-11 13:50:15.338184][00:00:00]
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:ASCII text, with very long lines (2281), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4015
                                        Entropy (8bit):5.880446206753272
                                        Encrypted:false
                                        SSDEEP:96:toAdVKjRCQRJ6mrwMSEIZDvVsLAbxAJYpukte/70IO1:toFULD68kMukt/
                                        MD5:1772E6A673818E7A5FDA40769644B517
                                        SHA1:87A08A8D16DA1F9C5F69DDF1A49F6995F8D382F9
                                        SHA-256:0E395AA80EF68FD68DF39AEB52904F6A0800D7F13BCF2F5E2B84CD6AD2105CAC
                                        SHA-512:1F53A5A60CAC0AD933DC618EA6F7CCE9DB3AA5B6A963E40FCCC9DD41A955DD40D18EE493102B09DACDCFAC47AA965EF310969AC5BFCA77C656F82306BCAE421E
                                        Malicious:false
                                        Preview:<BundleConfig BundleId="BA002" AppName="BurnAware Free" OfferPageIndex="0" SignBundle="false" RequireAdminAccessRights="false" UseOfferInstaller="true" PartnerName="BA002">.. <Carrier CompanyName="BurnAware" ProductName="BurnAware Free" SoftwareVersion="10.3.0.0" OriginalFilename="BurnAwareFree.exe" LegalCopyright="" FileDescription="BurnAware Free Installation" AppFileName="BA002" />.. <Form Text="Setup - BurnAware Free" Width="497" Height="360" FormBorderStyle="FixedDialog">.. <Element Name="pnlHeader" BackColor="White" Height="60" Width="497">.. <Element Name="Icon" Visible="false" />.. <Element Name="Header1" Left="23" Top="12" Font="Tahoma, 8pt, style=Bold" ForeColor="Black" AutoSize="true" />.. <Element Name="Header2" Left="41" Top="28" Font="Tahoma, 8pt" ForeColor="Black" AutoSize="true" />.. <Element Name="Separator1" Visible="true" Top="59" />.. </Element>.. <Element Name="pnlContent" Height="249" Width="497">.. <Element Name="Line1" Font="T
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):314104
                                        Entropy (8bit):6.21181274464366
                                        Encrypted:false
                                        SSDEEP:6144:xIM/N4R1UOv0ul9YZmOiI6LXGGDZBXbroL3YekZe:j7OvvGFd6VZqL3Yle
                                        MD5:30B280C144899FB2FE8E87DB11086E79
                                        SHA1:A417A70554C0A13CAD46E61ED2B9AB9DC1AA9CED
                                        SHA-256:380A96A13CDF34B3A3F695B32C6F096CEA2BAAAB6A800158C64CE97E679E6B83
                                        SHA-512:7E2232002C1D9ADD7CAACE8E18DB01B5A695DF5134E296433C4F32A97767BAE0AD81CD892D34E31F934DB046022904D3135B55F9D34D2CA8446AF540E5D30DA2
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 5%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Np Z.........." ..0.................. ........... ....................... ............@.....................................O...................................|................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......`...............,...P.............................................{$...*..{%...*..{&...*..{'...*..{(...*..{)...*..(*.....}$.....}%.....}&......}'......}(......})...*....0...........u......9....(+....{$....{$...o,...,w(-....{%....{%...o....,_(/....{&....{&...o0...,G(1....{'....{'...o2...,/(3....{(....{(...o4...,.(5....{)....{)...o6...*.*...0.......... .... )UU.Z(+....{$...o7...X )UU.Z(-....{%...o8...X )UU.Z(/....{&...o9...X )UU.Z(1....{'...o:...X )UU.Z(3....{(...o;...X
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):46840
                                        Entropy (8bit):5.786090821557103
                                        Encrypted:false
                                        SSDEEP:768:VAE+/58U13Bwtrw5MzQUiAU9tYcFroo6K1D+0/6h:VAV/582/McUiBVrool1V6
                                        MD5:1F4C6E7D827B980005B2C9C057018BD0
                                        SHA1:C83ACECC2AA11EAA585FFA6512752EF96F826828
                                        SHA-256:43D8917BBC213AD1DD20088C782CED72AF1AD9A2BB0C4F60216BEFE433529533
                                        SHA-512:70406763FC98565BFBF420A1288893F5553DAD414158E5A84044742953267BF5751F0F52F7B8CA88A7FEDE2F320CB70BADFE41C8FDD26F24D6A00E98C705D8B2
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 2%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]p Z.........."...0..`...>.......~... ........@.. ....................................@.................................|~..O.......':........................................................................... ............... ..H............text....^... ...`.................. ..`.rsrc...':.......<...b..............@..@.reloc..............................@..B.................~......H........8.. E...........}...............................................0...........(.....(.......s....}..... .(...(.....(....o....(....(.....o.....3.*.s......o....:.......{....s....%.o......o....,j.o....o.....+>.o....t........o ...r...po!...o"........(#...o$...(%...,.......o&...-....u........,...o'.....{.......o(....{.....o)...*........J.........{....*.0..^........{....o*....(+....3I..(,....(-...o.......(/....(0...Y.[(1....(-...o.......(2....(3...Y.[(4...*...0...........{..
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1537
                                        Entropy (8bit):5.174552899889409
                                        Encrypted:false
                                        SSDEEP:48:cP02EekibQtMbP+KI4YHJyIcsJcJ4YHKJyI+:l2/kPaP+KI4YpytsJcJ4YqJyt
                                        MD5:049B9D921F91D1E80CBF81661862AB4B
                                        SHA1:A6A6BF15EFD8E2584C69306231796AFC07F52AB2
                                        SHA-256:4846A33382A7667E206A754C47F3078054B739E2D8411A7466121145B1E78E80
                                        SHA-512:A61753A699611A6F95892D4A509E85506B7033E8D484D2398A1D057C7E230F4224A1751E1F8143A7626C968F6204DD8C49418D4EB2D8C519185A7C86E6F3E862
                                        Malicious:true
                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>..... .. .. .. .....<runtime>...... .. ....<NetFx40_LegacySecurityPolicy enabled="true"/>...</runtime>...<startup useLegacyV2RuntimeActivationPolicy="true">...... .. .. ....<supportedRuntime version="v4.0"/>....<supportedRuntime version="v2.0.50727"/>...</startup>...<appSettings>...... .. .. .. .. ....<add key="OfferServiceHostUrl" value="https://sos.adaware.com"/>....<add key="EventServiceUrl" value="https://flow.lavasoft.com"/>....<add key="ClientSettingsProvider.ServiceUri" value=""/>....<add key="InstallId" value="da0b6bd0-68bb-45f6-81ab-fe5aa06695ca"/>...</appSettings>...<system.web>...... .. .. ....<membership defaultProvider="ClientAuthenticationMembershipProvider">....... .. .....<providers>........ .. ......<add name="ClientAuthenticationMembershipProvider" type="System.Web.ClientServices.Providers.ClientFormsAuthenticationMembershipProvider, System.Web.Extensions, Ver
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):303352
                                        Entropy (8bit):6.146428936546734
                                        Encrypted:false
                                        SSDEEP:6144:5G07E8NW93vlxjYULsxwwnpfmEtXqMDYr5vnA+19afZt:BE73vPYULsxwwnpfmEtXqMuvFkf/
                                        MD5:5B13DE19962A1F69B6ED29ABCAD1E901
                                        SHA1:E22DA90A8656C2731379CF3EC792ACCDC0B950CD
                                        SHA-256:26D14050598608F14D8EE65CB3446A5C57B86EE7A429C1C10B6D3FE5DC321353
                                        SHA-512:6B5F459C2BD6CE3394DE08A0FD96657E85F879A3668C75901624038A23AEA87A2C8CDCF613EECC70A2331A9C958809526C4C284DA705486E013DBC7C65EFA101
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.RY.........." ..0................. ........... ...................................@.....................................O.......0...........................`................................................ ............... ..H............text...@.... ...................... ..`.rsrc...0...........................@..@.reloc..............................@..B.......................H........y..$............E...W............................................{....*..{....*V.(......}......}....*...0..;........u,.....,/(.....{.....{....o....,.(.....{.....{....o....*.*. .F*. )UU.Z(.....{....o....X )UU.Z(.....{....o....X*.0...........r...p......%..{.........../...../...-.q/......../...-.&.+.../...o.....%..{...........0.....0...-.q0........0...-.&.+...0...o.....(....*..{....*..{....*..{....*r.(......}......}......}....*....0..S........u1.....,G(.....{.....{....o
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):25848
                                        Entropy (8bit):5.572877039684841
                                        Encrypted:false
                                        SSDEEP:384:M+4mFeZm7y5dOSxzHwU18Q7/mA83ptYcF0Kc03Ks8n+YPLbY+lzL:M/o7y5dOMzQUiA8ZtYcF0Kc6Ks8+0/lv
                                        MD5:B4744A5699F0F78C231D1505D21AFB0A
                                        SHA1:230A6C84A6535102A7BC86512EEF9C084E277AEC
                                        SHA-256:66FBB836C78A4B025036A76E0F352582740948072D9D591043D308117C5D6B92
                                        SHA-512:1BBFC7A142AD7310E91F915C2B8A3CA57163C51C08F2E12E668CD3EAE498457881585B5B5DA345658FA7E93070EACA81597E258B394AE02E199FE6661D75F100
                                        Malicious:false
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\p Z.........."...0......:.......0... ...@....@.. ....................................@..................................0..O....@...6...........N..............l/............................................... ............... ..H............text........ ...................... ..`.rsrc....6...@...8..................@..@.reloc...............L..............@..B.................0......H........"...............................................................0..P.......(...........s....o......r...pr...p.s......s......o.....o....%(....(...+..o......r+..p..(....(....(.....o.......,..o........,..o......o....(....-..o....r7..p(....+.rW..p.(...........o....o ....ru..p..$...(!...(.....o"...(#...($....o....o%...&.(&....L..(......o'...r...p..o(...()...(......(*.....(....r...p(+...(,...r...p(+.... ....(-...*Ad......0...>...n...............)...Q...z...................
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1093
                                        Entropy (8bit):5.091088372767926
                                        Encrypted:false
                                        SSDEEP:24:JduG/mh9jnk3Jc3J4YH33Jy34OqsJ+J4YHKJy34OOT:30nnKS4YHJyILsJ+J4YHKJyIvT
                                        MD5:DD39824ADEB4FF5BCDA330F48A1777B9
                                        SHA1:EE46838177B0CD7E17C77F1FADB2A516A960AF12
                                        SHA-256:D31388110FFDEF2AC150BDF02E69EBF81895D2B0EC8400558601A9E498E05DFC
                                        SHA-512:79BA2C8605C359BC4E4FA10550F4771C3DF77EF395CB1D9F4014925FC885225331E9F2915AEF071D4394845D79126166719AD82AFD51116FD796F55D46101BBB
                                        Malicious:false
                                        Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <NetFx40_LegacySecurityPolicy enabled="true" />.. </runtime>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <system.web>.. <membership defaultProvider="ClientAuthenticationMembershipProvider">.. <providers>.. <add name="ClientAuthenticationMembershipProvider" type="System.Web.ClientServices.Providers.ClientFormsAuthenticationMembershipProvider, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" serviceUri="" />.. </providers>.. </membership>.. <roleManager defaultProvider="ClientRoleProvider" enabled="true">.. <providers>.. <add name="ClientRoleProvider" type="System.Web.ClientServices.Providers.ClientRoleProvider, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" serviceUri="" cache
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):58104
                                        Entropy (8bit):5.574131051536826
                                        Encrypted:false
                                        SSDEEP:768:6qctE6OVHn3bDkdC+Ya/uMloameNmNDYz+0/02:6qcOVPklpqadyDYl82
                                        MD5:25F08F3D68A79554CCF75EC08D1D8820
                                        SHA1:2C0BCC8C215D4CA15E1EAE33D1BF372C2B0C8C8B
                                        SHA-256:AB14AC1D6645CC1470C4177E6E838F2475D7C1DAAC375DD25DD49D1D29D249ED
                                        SHA-512:0186E8EC44E5BBB4327B51ADD76EC8AA3D0529AEA0BBB8545EAE1F6355F2E02F06126C0C54465A82190942EC87BB95B4A7C92B8A4F6540763EF219ACE923DA4A
                                        Malicious:false
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Op Z.........." ..0.................. ........... .......................@......p.....@.....................................O............................ ......T................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H........}...[..........................................................>...(.....(....*..(....o....,..(....o....o.......*.*.0...........{....o....,/.{....o....,".(....o....,..(....o....r...po.....{....o....,F.{....o....,9.(....o....,,.(....o....o....(....-..(....o....o....(....(....o.....(....*z.,..{....,..{....o......(....*..0...........s....}.....s....}.....s....}.....s....}.....{ ...o!....{"...o!....{#...o!....{$...o%....(!....{"...o&....{....o'....{"...o&....{....o'....{
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):4096
                                        Entropy (8bit):3.450102420013877
                                        Encrypted:false
                                        SSDEEP:48:6wQau9KYa5QHb/bmlR40PQWqb7BpS7LSkjnpAkdznwUJ0LcOc:wEQjSlRj+RaZdzwU2Iz
                                        MD5:9C30F5969E8C131EDD9C14870748AB67
                                        SHA1:FD372AA55B56077CC48932A1E48B262A549AA336
                                        SHA-256:8F2ACD179C0A9A52F01B7FD4E1D2A5422EEEC46F97DAEA59BD55AFF8E75EC77E
                                        SHA-512:DB862DAAD8C618EFC356F6CA3E452EFEFAF1F59D3570CD668EA9D1B68D8CE12C5D3E16DDB5EC18627516DEA012035361B9ED8E8A754C699CB14875329C95BA2B
                                        Malicious:false
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Np Z...........!.................&... ...@....@.. ....................................@.................................L&..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H........#..H...........P .............................................................lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPf.......p...].ec..................L........C.a.n.c.e.l.M.e.s.s.a.g.e.....(C.a.n.c.e.l.M.e.s.s.a.g.e.C.a.p.t.i.o.n./...@C.a.n.c.e.l.M.e.s.s.a.g.e.L.a.s.t.S.c.r.e.e.n.O.f.f.e.r.P.a.g.e.8....C.o.u.l.d.N.o.t.D.o.w.n.l.o.a.d.M.e.s.
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):4096
                                        Entropy (8bit):3.40565817824893
                                        Encrypted:false
                                        SSDEEP:48:6wQqyC9KYag3vLV/SumlR40PI8qb7BBS7LSkjnpAkdznwUJ0LcOc:icV3vLV/alRJ+5aZdzwU2Iz
                                        MD5:9B2C1B850E4A0CA8BDBC5BC7DCAD72C7
                                        SHA1:717C2294FED24006C1B00B5BF21F4C117411EECD
                                        SHA-256:80E61A5769A0D2645CEC809567C0408DC97A42754E1083AC90C644DD9CF6B3E6
                                        SHA-512:991EFFCBF2A42968C176314645515A727DCAB2CD440015EDB75E933F2EEF487F0DF8880CC990A2111917C2E03E475EB49B7F411695F418FC77FC16563AF016D0
                                        Malicious:false
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Np Z...........!.................&... ...@....@.. ....................................@.................................4&..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................p&......H........"..H...........P .............................................................lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPf.......p...].ec..................L........C.a.n.c.e.l.M.e.s.s.a.g.e.....(C.a.n.c.e.l.M.e.s.s.a.g.e.C.a.p.t.i.o.n."...@C.a.n.c.e.l.M.e.s.s.a.g.e.L.a.s.t.S.c.r.e.e.n.O.f.f.e.r.P.a.g.e.+....C.o.u.l.d.N.o.t.D.o.w.n.l.o.a.d.M.e.s.
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):4096
                                        Entropy (8bit):3.409634995101771
                                        Encrypted:false
                                        SSDEEP:48:6wQqyC9KYag3vye5SumlR40PFcqb7BBS7LSkjnpAkdznwUJ0LcOc:icV3vye5alRq+5aZdzwU2Iz
                                        MD5:3875A76EBDD113524E5DC3B4276FEC67
                                        SHA1:A606A0AF593B918DC5DC05AFFA154EB22B7A551E
                                        SHA-256:562C2B0800CDC27B6EE52DF8B068A2BD4B41C8D8FB5133B3DBB76B3E5EA50B76
                                        SHA-512:722B410BD815B58FD8D9D3FB7B62BCD6BE75B50A2B7AD2673E3475F6B58919607A0D733744899EB9C72E2EF72207EA4BC070A4E24181A517CDB312AFD6B19F7B
                                        Malicious:false
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Np Z...........!.................&... ...@....@.. ....................................@.................................4&..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................p&......H........"..H...........P .............................................................lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPf.......p...].ec..................L........C.a.n.c.e.l.M.e.s.s.a.g.e.....(C.a.n.c.e.l.M.e.s.s.a.g.e.C.a.p.t.i.o.n."...@C.a.n.c.e.l.M.e.s.s.a.g.e.L.a.s.t.S.c.r.e.e.n.O.f.f.e.r.P.a.g.e.+....C.o.u.l.d.N.o.t.D.o.w.n.l.o.a.d.M.e.s.
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):4096
                                        Entropy (8bit):3.492003999715567
                                        Encrypted:false
                                        SSDEEP:48:6wQK69KYaj20icbIVJNmlR40PJQgqb7B5S7LSkjnpAkdznwUJ0LcOc:Um2WKJIlRWg+BaZdzwU2Iz
                                        MD5:03F7047A3B237E021FC335656709D598
                                        SHA1:CA0257B4D7445F48C1F3AD676372107B9DFEA8B5
                                        SHA-256:18E38B17A644F0334C0B2E90E31DBB16EEC690EBFEBEB2FECBEA83DC4F4EEE35
                                        SHA-512:010C4F47B01CC2CD2E1B9B5821BA5EA051B02F1F09EB003207D3576614F3D8421065B23AD023CE5DCA3D9856EC80901178B7E90C42137346E854D60DF0AC5294
                                        Malicious:false
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Np Z...........!.................&... ...@....@.. ....................................@.................................\&..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H........#..H...........P .............................................................lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPf.......p...].ec..................L........C.a.n.c.e.l.M.e.s.s.a.g.e.....(C.a.n.c.e.l.M.e.s.s.a.g.e.C.a.p.t.i.o.n.%...@C.a.n.c.e.l.M.e.s.s.a.g.e.L.a.s.t.S.c.r.e.e.n.O.f.f.e.r.P.a.g.e.0....C.o.u.l.d.N.o.t.D.o.w.n.l.o.a.d.M.e.s.
                                        Process:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1626360
                                        Entropy (8bit):6.54106210872876
                                        Encrypted:false
                                        SSDEEP:49152:4cyczrbk6H/TNifx4KZsv6nAKF6YmmHgBl5cwZZJvHyi+E+6TTY:4c5/vh2NmmAL5HJvC
                                        MD5:4D66DE397B5BF1F085AA7046A578A34C
                                        SHA1:F0C58079D03C27E0E2108204DCAF463CAFA32A9C
                                        SHA-256:DA927CC761D621255F0FB6F51BCD240AF3220B6F8B1E53ECA54D25676AAFCE2E
                                        SHA-512:55612FFA8F2EC2CB2D18D238F2B6FA31E529D9AA25AD4CB6916C89C8A9D86D517C28C5BAC8C13665E7A4F3BB61CD6A8660FA6737BCA97A5325FC072FB92CC6B4
                                        Malicious:true
                                        Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.........X...6...6...6.It...6.It.I.6.It...6.cH...6..5...6.......6.j.3...6...3...6..3...6..2...6.......6.j.2...6.....6...7...6.h.?...6.o....6.....6.h.4...6.Rich..6.........PE..L...gp Z............................6.............@.......................... ......:.....@..............................................0......................,...p...p...................<...........@...............(............................text...v........................... ..`.rdata..:...........................@..@.data..............................@....gfids...............j..............@..@.tls.................t..............@....rsrc....0.......2...v..............@..@.reloc..,...........................@..B........................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        File Type:ASCII text, with very long lines (3016), with CRLF, LF line terminators
                                        Category:dropped
                                        Size (bytes):8312
                                        Entropy (8bit):5.5172336388270855
                                        Encrypted:false
                                        SSDEEP:96:OoPEiQ5GrKSHSdpmEzN6izDN6yvKlOK+WKSHSdU8+RKKRgDjRZpzi9V50Nfgl:OosiSglT+rJill
                                        MD5:D03FFBC45F3CA53C745BDC97F79956A5
                                        SHA1:FC5AF15E666B4B2441C74EDA7630DEAFB058603B
                                        SHA-256:2557C6A95D6D29C939E7939F9BBF620F606DF652A05A7057882FBCD814FE0FD9
                                        SHA-512:D8F2F1EFCE553CAAD19B59DA971A0E616CC326C17AB0177A5157BF99B7B26486FE9E79213EB8B000F2DDB7E6755268F2D71CA5FE5AB674DDE25E837FEA560BC5
                                        Malicious:false
                                        Preview:2024-07-11 13:50:16,067 [INFO] ========================= LogWriter initialized ==========================================================..2024-07-11 13:50:16,082 [INFO] Command line arguments: ..2024-07-11 13:50:16,098 [INFO] admin access right =True..2024-07-11 13:50:16,098 [INFO] admin access right =True..2024-07-11 13:50:16,192 [ERROR] System.IO.FileNotFoundException:C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe. at System.Diagnostics.FileVersionInfo.GetVersionInfo(String fileName).. at DevLib.Service.SystemService.GetBrowserVersion(String filePath, String registryKey, Boolean isIE)...2024-07-11 13:50:16,582 [INFO] add send event to queue : BundleInstallStart..2024-07-11 13:50:17,254 [INFO] About to send WebRequest(list) bundleId=BA002..2024-07-11 13:50:18,363 [INFO] SendEvent Request ProductID:IS, Type:BundleInstallStart, EventServiceUri:https://flow.lavasoft.com, RequestData:[{"InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","MachineId":"3d40
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):894336
                                        Entropy (8bit):7.866668144054505
                                        Encrypted:false
                                        SSDEEP:24576:fG50ZfFK0lyhTtemSv0TOqMOyiBuO4N7lXfk9/ljhhJT:fG5Ufg0U4dO/BuVN7tMhpJT
                                        MD5:9AA0F5A7FBC6F7A2E6FEAF78F8E6B7D7
                                        SHA1:AA6D766912112809FD0849DBE6171D5BD4975B17
                                        SHA-256:234E86126EADCD7519D481BE72BA486DDCB5C03361A85512120ACAA540221C94
                                        SHA-512:A1A7DD19F29815C9D42BAC3C970490950BD5BAE5FF083614011A4B367282B3BE09405C83B9269101701280F403F76856DF6970C0612A8FE5F3A59B8F7C3CD817
                                        Malicious:true
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s..c}...s..Yy...s..w,...s...r./.s..w....s..Yx...s.......s.......s.Zyu...s.Rich..s.................PE..L.....M........../..................H............@.............................................................................d....p..h7...........................................................................................................text............................... ..`.rdata...D.......F..................@..@.data...hZ.......2..................@....sxdata......`......................@....rsrc...h7...p...8..................@..@........................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):6144
                                        Entropy (8bit):4.720366600008286
                                        Encrypted:false
                                        SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                        MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                        SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                        SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                        SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                        Malicious:false
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1255424
                                        Entropy (8bit):6.4851648915335725
                                        Encrypted:false
                                        SSDEEP:24576:cnbbPImgK4brDi4IxgRqzwqNb+Yz73P2EMZbG0JEt7Afjqx9zq:KHeKh4nqzF3PYdStuW4
                                        MD5:B3937B0F947BBEB9F93859803C6FD14E
                                        SHA1:3FE9D0FC391A4654CEEC11DC549EBE979833D2B4
                                        SHA-256:0797FB9E4B8B19AF03DDE10BCF2498A605BF31CFC0E7E92BC775177EBB64A070
                                        SHA-512:58C66270D6662C1E8F5D2992E863D7D088D118550CB7AA706F8641EA26530674BB034BA1637378004CDFADC89F27970E10EBF68C1BF07D4E4497B1571AC4913D
                                        Malicious:false
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...Rm"[.............................%.......0....@.......................................@......@..............................@8...@.......................................................0.......................................................text............................... ..`.itext.............................. ..`.data....0...0...2..................@....bss.....a...p.......L...................idata..@8.......:...L..............@....tls....<.... ...........................rdata.......0......................@..@.rsrc........@......................@..@....................................@..@........................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):7.996276806312489
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.94%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
                                        File size:8'728'608 bytes
                                        MD5:a6d83330743edcff48a85dfa1013fdab
                                        SHA1:0aa8362a86274edcba3c111e8d729b1e0198a92b
                                        SHA256:03c769a2c069d127c2d9a5103853218a8f108074f0012776ff871dadf346c39e
                                        SHA512:2144b8b84a9769eb1257b856bf62fadfff58f715e344ee6c4021190da326bba32336b99b1086cd6ed9d1eb4b248d52130ec232cf65a7c17e92742adc35a8f302
                                        SSDEEP:196608:qVWJWqgbeuM2NS+JYkeC5gkdCj2HAFDEv0AIYCTNp:qVWJpGjNbjeCVsqacDbChp
                                        TLSH:A5963392E38B41B4FA655631949AD8303C533EEA1AD081066DFFFE1C763AA806DF7171
                                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                        Icon Hash:1c48490d1d1d992f
                                        Entrypoint:0x41181c
                                        Entrypoint Section:.itext
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x5B226D52 [Thu Jun 14 13:27:46 2018 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:0
                                        File Version Major:5
                                        File Version Minor:0
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:0
                                        Import Hash:20dd26497880c05caed9305b3c8b9109
                                        Signature Valid:true
                                        Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                        Signature Validation Error:The operation completed successfully
                                        Error Number:0
                                        Not Before, Not After
                                        • 05/11/2014 01:00:00 06/11/2019 00:59:59
                                        Subject Chain
                                        • CN=Burnaware, O=Burnaware, STREET=Krylatskie Kholmy 39-2, L=Moscow, S=Moscow, PostalCode=121614, C=RU
                                        Version:3
                                        Thumbprint MD5:E892014EF40D1CEAAA8E35FBF8E4CA54
                                        Thumbprint SHA-1:CD1DFF866CFBCBC9593B2D5AF7B7A621A4C048FF
                                        Thumbprint SHA-256:AE3E817C15946BB94DD8C21DBD9C88D3DF75BBAABA12F6950BF102B2EFBD0B16
                                        Serial:34A57A0F0BF4B55CCD6F48728FA63980
                                        Instruction
                                        push ebp
                                        mov ebp, esp
                                        add esp, FFFFFFA4h
                                        push ebx
                                        push esi
                                        push edi
                                        xor eax, eax
                                        mov dword ptr [ebp-3Ch], eax
                                        mov dword ptr [ebp-40h], eax
                                        mov dword ptr [ebp-5Ch], eax
                                        mov dword ptr [ebp-30h], eax
                                        mov dword ptr [ebp-38h], eax
                                        mov dword ptr [ebp-34h], eax
                                        mov dword ptr [ebp-2Ch], eax
                                        mov dword ptr [ebp-28h], eax
                                        mov dword ptr [ebp-14h], eax
                                        mov eax, 0041015Ch
                                        call 00007F3208BF515Dh
                                        xor eax, eax
                                        push ebp
                                        push 00411EFEh
                                        push dword ptr fs:[eax]
                                        mov dword ptr fs:[eax], esp
                                        xor edx, edx
                                        push ebp
                                        push 00411EBAh
                                        push dword ptr fs:[edx]
                                        mov dword ptr fs:[edx], esp
                                        mov eax, dword ptr [00415B48h]
                                        call 00007F3208BFD8BBh
                                        call 00007F3208BFD40Ah
                                        cmp byte ptr [00412AE0h], 00000000h
                                        je 00007F3208C003DEh
                                        call 00007F3208BFD9D0h
                                        xor eax, eax
                                        call 00007F3208BF31F5h
                                        lea edx, dword ptr [ebp-14h]
                                        xor eax, eax
                                        call 00007F3208BFA43Bh
                                        mov edx, dword ptr [ebp-14h]
                                        mov eax, 00418658h
                                        call 00007F3208BF37CAh
                                        push 00000002h
                                        push 00000000h
                                        push 00000001h
                                        mov ecx, dword ptr [00418658h]
                                        mov dl, 01h
                                        mov eax, dword ptr [0040C04Ch]
                                        call 00007F3208BFAD52h
                                        mov dword ptr [0041865Ch], eax
                                        xor edx, edx
                                        push ebp
                                        push 00411E66h
                                        push dword ptr fs:[edx]
                                        mov dword ptr fs:[edx], esp
                                        call 00007F3208BFD92Eh
                                        mov dword ptr [00418664h], eax
                                        mov eax, dword ptr [00418664h]
                                        cmp dword ptr [eax+0Ch], 01h
                                        jne 00007F3208C0041Ah
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x190000xe04.idata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x1bca4.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x851b480x14d8
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x1b0000x18.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x193040x214.idata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000xf25c0xf4000da5d73ffbc41792fa65a09058a91476False0.5482197745901639data6.375879013420213IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .itext0x110000xfa40x10002eb275566563c3f1d0099a0da7345b74False0.563720703125data5.778765357049134IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .data0x120000xc8c0xe0073b859e23f5fd17e00c08db2e0e73dfeFalse0.25362723214285715data2.3028287433175367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .bss0x130000x56bc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .idata0x190000xe040x1000e9b9c0328fd9628ad4d6ab8283dcb20eFalse0.321533203125data4.597812557707959IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .tls0x1a0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rdata0x1b0000x180x2003dffc444ccc131c9dcee18db49ee6403False0.05078125data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x1c0000x1bca40x1be00dc24f890fb65625d20e3bc2a39bfbfc1False0.5723532090807175data6.487924190434178IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0x1c4dc0x2c46PNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.957473089818246
                                        RT_ICON0x1f1240xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.2998400852878465
                                        RT_ICON0x1ffcc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.32084837545126355
                                        RT_ICON0x208740x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.38078034682080925
                                        RT_ICON0x20ddc0x9996PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9952947759295997
                                        RT_ICON0x2a7740x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.3955394190871369
                                        RT_ICON0x2cd1c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.4969512195121951
                                        RT_ICON0x2ddc40x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6551418439716312
                                        RT_STRING0x2e22c0x68data0.6538461538461539
                                        RT_STRING0x2e2940xd4data0.5283018867924528
                                        RT_STRING0x2e3680xa4data0.6524390243902439
                                        RT_STRING0x2e40c0x2acdata0.45614035087719296
                                        RT_STRING0x2e6b80x34cdata0.4218009478672986
                                        RT_STRING0x2ea040x294data0.4106060606060606
                                        RT_RCDATA0x2ec980x82e8dataEnglishUnited States0.11261637622344235
                                        RT_RCDATA0x36f800x10data1.5
                                        RT_RCDATA0x36f900x150data0.8392857142857143
                                        RT_RCDATA0x370e00x2cdata1.2045454545454546
                                        RT_GROUP_ICON0x3710c0x76dataEnglishUnited States0.6694915254237288
                                        RT_VERSION0x371840x4f4dataEnglishUnited States0.2894321766561514
                                        RT_MANIFEST0x376780x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                        DLLImport
                                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                        user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                        kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                        kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                        user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                        kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetSystemDirectoryW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, DeleteFileW, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CloseHandle
                                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                        comctl32.dllInitCommonControls
                                        kernel32.dllSleep
                                        advapi32.dllAdjustTokenPrivileges
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        07/11/24-19:39:38.782654TCP2025537ET MALWARE Lavasoft PUA/Adware Client Install4974080192.168.2.4104.16.148.130
                                        07/11/24-19:39:44.565238TCP2849740ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI49751443192.168.2.4104.16.148.130
                                        07/11/24-19:39:40.960268TCP2849741ETPRO MALWARE Suspicious Domain (sos .adaware .com) in TLS SNI49745443192.168.2.4104.16.212.94
                                        07/11/24-19:39:42.215264TCP2849740ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI49747443192.168.2.4104.16.148.130
                                        07/11/24-19:39:43.806977TCP2849740ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI49749443192.168.2.4104.16.148.130
                                        07/11/24-19:39:42.987417TCP2849740ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI49748443192.168.2.4104.16.148.130
                                        07/11/24-19:39:39.840011TCP2849740ETPRO MALWARE Suspicious Domain (flow .lavasoft .com) in TLS SNI49742443192.168.2.4104.16.148.130
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 11, 2024 19:50:16.982275009 CEST5718380192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:16.987190008 CEST8057183104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:16.987294912 CEST5718380192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:16.988071918 CEST5718380192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:16.992973089 CEST8057183104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:17.506561995 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.506613970 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:17.506736994 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.508939028 CEST8057183104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:17.509896040 CEST5718380192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.515099049 CEST8057183104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:17.515172005 CEST5718380192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.530796051 CEST5718580192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.535965919 CEST8057185104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:17.536031008 CEST5718580192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.554670095 CEST5718580192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.560077906 CEST8057185104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:17.656852961 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:17.656897068 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:17.657541990 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:17.671705008 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:17.671744108 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:17.675898075 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:17.675942898 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.300378084 CEST8057185104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.300647974 CEST5718580192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.303127050 CEST8057185104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.303169012 CEST5718580192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.310062885 CEST8057185104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.310116053 CEST5718580192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.318046093 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:18.318121910 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:18.320497036 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:18.320512056 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:18.320810080 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:18.371535063 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:18.379149914 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:18.420500994 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:18.420581102 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:18.420592070 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:18.421344042 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.421428919 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.423912048 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.423933983 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.424257994 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.425419092 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.472503901 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.472553015 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.472567081 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.637478113 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.637639046 CEST44357184104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.637691021 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.671753883 CEST57184443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.879884005 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:18.879954100 CEST44357188104.16.213.94192.168.2.6
                                        Jul 11, 2024 19:50:18.880089045 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:18.880598068 CEST57188443192.168.2.6104.16.213.94
                                        Jul 11, 2024 19:50:18.889326096 CEST57189443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.889386892 CEST44357189104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:18.889456987 CEST57189443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.893414021 CEST57189443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:18.893426895 CEST44357189104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:19.464653015 CEST44357189104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:19.465943098 CEST57189443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:19.465986967 CEST44357189104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:19.466027975 CEST57189443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:19.466037989 CEST44357189104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:19.619530916 CEST44357189104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:19.619826078 CEST44357189104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:19.619925022 CEST57189443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:19.620328903 CEST57189443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:19.621840954 CEST57190443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:19.621881962 CEST44357190104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:19.621946096 CEST57190443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:19.624514103 CEST57190443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:19.624541044 CEST44357190104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.180718899 CEST44357190104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.182075977 CEST57190443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.182122946 CEST44357190104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.182277918 CEST57190443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.182287931 CEST44357190104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.382638931 CEST44357190104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.382977962 CEST44357190104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.383044958 CEST57190443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.383557081 CEST57190443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.406832933 CEST57192443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.406860113 CEST44357192104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.406928062 CEST57192443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.414849997 CEST57192443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.414864063 CEST44357192104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.977447987 CEST44357192104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.986704111 CEST57192443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.986738920 CEST44357192104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:20.987034082 CEST57192443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:20.987041950 CEST44357192104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.166371107 CEST44357192104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.166615963 CEST44357192104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.166688919 CEST57192443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.167190075 CEST57192443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.171536922 CEST57193443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.171596050 CEST44357193104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.171680927 CEST57193443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.175283909 CEST57193443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.175302029 CEST44357193104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.732243061 CEST44357193104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.733906031 CEST57193443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.733951092 CEST44357193104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.733971119 CEST57193443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.733979940 CEST44357193104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.880373001 CEST44357193104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.880515099 CEST44357193104.16.149.130192.168.2.6
                                        Jul 11, 2024 19:50:21.880615950 CEST57193443192.168.2.6104.16.149.130
                                        Jul 11, 2024 19:50:21.881078005 CEST57193443192.168.2.6104.16.149.130
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 11, 2024 19:50:01.930367947 CEST53567821.1.1.1192.168.2.6
                                        Jul 11, 2024 19:50:16.945641994 CEST6162653192.168.2.61.1.1.1
                                        Jul 11, 2024 19:50:16.953011990 CEST53616261.1.1.1192.168.2.6
                                        Jul 11, 2024 19:50:16.959558964 CEST6138153192.168.2.61.1.1.1
                                        Jul 11, 2024 19:50:16.971128941 CEST53613811.1.1.1192.168.2.6
                                        Jul 11, 2024 19:50:17.493616104 CEST5831953192.168.2.61.1.1.1
                                        Jul 11, 2024 19:50:17.502343893 CEST53583191.1.1.1192.168.2.6
                                        Jul 11, 2024 19:50:17.642903090 CEST4993553192.168.2.61.1.1.1
                                        Jul 11, 2024 19:50:17.656200886 CEST53499351.1.1.1192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jul 11, 2024 19:50:16.945641994 CEST192.168.2.61.1.1.10xf8c2Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:16.959558964 CEST192.168.2.61.1.1.10x6bc6Standard query (0)flow.lavasoft.comA (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:17.493616104 CEST192.168.2.61.1.1.10x1e59Standard query (0)flow.lavasoft.comA (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:17.642903090 CEST192.168.2.61.1.1.10xed60Standard query (0)sos.adaware.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jul 11, 2024 19:50:16.953011990 CEST1.1.1.1192.168.2.60xf8c2No error (0)www.google.com142.250.185.132A (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:16.971128941 CEST1.1.1.1192.168.2.60x6bc6No error (0)flow.lavasoft.com104.16.149.130A (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:16.971128941 CEST1.1.1.1192.168.2.60x6bc6No error (0)flow.lavasoft.com104.16.148.130A (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:17.502343893 CEST1.1.1.1192.168.2.60x1e59No error (0)flow.lavasoft.com104.16.149.130A (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:17.502343893 CEST1.1.1.1192.168.2.60x1e59No error (0)flow.lavasoft.com104.16.148.130A (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:17.656200886 CEST1.1.1.1192.168.2.60xed60No error (0)sos.adaware.com104.16.213.94A (IP address)IN (0x0001)false
                                        Jul 11, 2024 19:50:17.656200886 CEST1.1.1.1192.168.2.60xed60No error (0)sos.adaware.com104.16.212.94A (IP address)IN (0x0001)false
                                        • sos.adaware.com
                                        • flow.lavasoft.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.657183104.16.149.130803352C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exe
                                        TimestampBytes transferredDirectionData
                                        Jul 11, 2024 19:50:16.988071918 CEST455OUTPOST /v1/event-stat?ProductID=IS&Type=StubStart HTTP/1.1
                                        Host: flow.lavasoft.com
                                        Accept: application/json
                                        Content-Type: application/json
                                        charsets: utf-8
                                        Content-Length: 274
                                        Data Raw: 7b 22 44 61 74 61 22 3a 7b 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 4f 73 56 65 72 73 69 6f 6e 22 3a 22 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 20 28 62 75 69 6c 64 20 31 39 30 34 35 29 2c 20 36 34 2d 62 69 74 22 2c 22 44 6f 74 4e 65 74 46 72 61 6d 65 77 6f 72 6b 22 3a 22 33 2e 35 2c 20 34 2e 30 20 43 6c 69 65 6e 74 2c 20 34 2e 30 20 46 75 6c 6c 2c 20 34 2e 35 2c 20 34 2e 35 2e 31 2c 20 34 2e 35 2e 32 2c 20 34 2e 36 2c 20 34 2e 36 2e 31 2c 20 34 2e 36 2e 32 22 7d 7d 0a
                                        Data Ascii: {"Data":{"BundleId":"BA002","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","OsVersion":"Microsoft Windows 10 (build 19045), 64-bit","DotNetFramework":"3.5, 4.0 Client, 4.0 Full, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2"}}
                                        Jul 11, 2024 19:50:17.508939028 CEST524INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:17 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: keep-alive
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa28ecab25589-EWR
                                        Data Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a 30 0d 0a 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.657185104.16.149.130803352C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exe
                                        TimestampBytes transferredDirectionData
                                        Jul 11, 2024 19:50:17.554670095 CEST338OUTPOST /v1/event-stat?ProductID=IS&Type=StubBundleStart HTTP/1.1
                                        Host: flow.lavasoft.com
                                        Accept: application/json
                                        Content-Type: application/json
                                        charsets: utf-8
                                        Content-Length: 151
                                        Data Raw: 7b 22 44 61 74 61 22 3a 7b 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 49 6e 50 72 6f 63 65 73 73 22 3a 22 74 72 75 65 22 7d 7d 0a
                                        Data Ascii: {"Data":{"BundleId":"BA002","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","InProcess":"true"}}
                                        Jul 11, 2024 19:50:18.300378084 CEST524INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:18 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: keep-alive
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa2922a939e16-EWR
                                        Data Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a 30 0d 0a 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}0
                                        Jul 11, 2024 19:50:18.303127050 CEST524INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:18 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: keep-alive
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa2922a939e16-EWR
                                        Data Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a 30 0d 0a 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.657188104.16.213.944431804C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-11 17:50:18 UTC163OUTPOST /v1/bundle/list/?bundleId=BA002 HTTP/1.1
                                        Content-Type: application/json;charset=utf-8
                                        Host: sos.adaware.com
                                        Content-Length: 185
                                        Connection: Keep-Alive
                                        2024-07-11 17:50:18 UTC1OUTData Raw: 7b
                                        Data Ascii: {
                                        2024-07-11 17:50:18 UTC184OUTData Raw: 22 4f 66 66 65 72 46 69 6c 74 65 72 4f 72 22 3a 5b 5b 7b 22 6b 65 79 22 3a 22 6c 61 6e 67 22 2c 22 73 68 6f 75 6c 64 22 3a 74 72 75 65 2c 22 62 65 49 6e 22 3a 5b 22 65 6e 22 5d 7d 2c 7b 22 6b 65 79 22 3a 22 6f 73 76 65 72 73 69 6f 6e 22 2c 22 73 68 6f 75 6c 64 22 3a 74 72 75 65 2c 22 62 65 49 6e 22 3a 5b 22 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 22 5d 7d 2c 7b 22 6b 65 79 22 3a 22 68 6f 73 74 62 72 6f 77 73 65 72 22 2c 22 73 68 6f 75 6c 64 22 3a 74 72 75 65 2c 22 62 65 49 6e 22 3a 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 5d 7d 5d 5d 7d
                                        Data Ascii: "OfferFilterOr":[[{"key":"lang","should":true,"beIn":["en"]},{"key":"osversion","should":true,"beIn":["Windows 10 Pro"]},{"key":"hostbrowser","should":true,"beIn":["Google Chrome"]}]]}
                                        2024-07-11 17:50:18 UTC204INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:18 GMT
                                        Content-Type: application/json
                                        Content-Length: 158
                                        Connection: close
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa29529d5421f-EWR
                                        2024-07-11 17:50:18 UTC158INData Raw: 7b 0a 20 20 22 6d 61 78 53 68 6f 77 6e 22 3a 20 32 2c 0a 20 20 22 6d 61 78 41 63 63 65 70 74 65 64 22 3a 20 32 2c 0a 20 20 22 6d 61 78 44 65 63 6c 69 6e 65 64 22 3a 20 30 2c 0a 20 20 22 73 6b 69 70 41 6c 6c 4f 66 66 65 72 73 22 3a 20 66 61 6c 73 65 2c 0a 20 20 22 73 68 6f 77 4f 66 66 65 72 43 6f 6e 73 65 6e 74 50 61 67 65 22 3a 20 66 61 6c 73 65 2c 0a 20 20 22 63 6f 75 6e 74 72 79 32 22 3a 20 22 55 53 22 2c 0a 20 20 22 4f 66 66 65 72 49 74 65 6d 73 22 3a 20 5b 5d 0a 7d
                                        Data Ascii: { "maxShown": 2, "maxAccepted": 2, "maxDeclined": 0, "skipAllOffers": false, "showOfferConsentPage": false, "country2": "US", "OfferItems": []}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.657184104.16.149.1304431804C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-11 17:50:18 UTC186OUTPOST /v1/event-stat/?ProductID=IS&Type=BundleInstallStart HTTP/1.1
                                        Content-Type: application/json;charset=utf-8
                                        Host: flow.lavasoft.com
                                        Content-Length: 848
                                        Connection: Keep-Alive
                                        2024-07-11 17:50:18 UTC1OUTData Raw: 7b
                                        Data Ascii: {
                                        2024-07-11 17:50:18 UTC847OUTData Raw: 22 44 61 74 61 22 3a 7b 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 42 75 6e 64 6c 65 56 65 72 73 69 6f 6e 22 3a 22 32 2e 30 2e 30 2e 35 33 35 22 2c 22 43 61 72 72 69 65 72 49 64 22 3a 6e 75 6c 6c 2c 22 43 61 72 72 69 65 72 4e 61 6d 65 22 3a 22 42 75 72 6e 41 77 61 72 65 22 2c 22 43 61 72 72 69 65 72 53 6f 66 74 77 61 72 65 4e 61 6d 65 22 3a 22 42 75 72 6e 41 77 61 72 65 20 46 72 65 65 22 2c 22 43 61 72 72 69 65 72 53 6f 66 74 77 61 72 65
                                        Data Ascii: "Data":{"InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","BundleId":"BA002","BundleVersion":"2.0.0.535","CarrierId":null,"CarrierName":"BurnAware","CarrierSoftwareName":"BurnAware Free","CarrierSoftware
                                        2024-07-11 17:50:18 UTC479INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:18 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa2957c545e80-EWR
                                        2024-07-11 17:50:18 UTC35INData Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}
                                        2024-07-11 17:50:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.657189104.16.149.1304431804C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-11 17:50:19 UTC171OUTPOST /v1/event-stat/?ProductID=IS&Type=BundleProposedOffersIsEmpty HTTP/1.1
                                        Content-Type: application/json;charset=utf-8
                                        Host: flow.lavasoft.com
                                        Content-Length: 230
                                        2024-07-11 17:50:19 UTC1OUTData Raw: 7b
                                        Data Ascii: {
                                        2024-07-11 17:50:19 UTC229OUTData Raw: 22 44 61 74 61 22 3a 7b 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 42 75 6e 64 6c 65 52 65 73 70 6f 6e 73 65 44 61 74 61 22 3a 7b 22 6d 61 78 53 68 6f 77 6e 22 3a 32 2c 22 6d 61 78 41 63 63 65 70 74 65 64 22 3a 32 2c 22 63 6f 75 6e 74 72 79 32 22 3a 22 55 53 22 2c 22 4f 66 66 65 72 49 74 65 6d 73 22 3a 5b 5d 7d 2c 22 44 65 6c 74 61 4d 73 22 3a 32 33 36 31 7d 7d
                                        Data Ascii: "Data":{"InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","BundleId":"BA002","BundleResponseData":{"maxShown":2,"maxAccepted":2,"country2":"US","OfferItems":[]},"DeltaMs":2361}}
                                        2024-07-11 17:50:19 UTC479INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:19 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa29bfa315e6b-EWR
                                        2024-07-11 17:50:19 UTC35INData Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}
                                        2024-07-11 17:50:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.657190104.16.149.1304431804C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-11 17:50:20 UTC153OUTPOST /v1/event-stat/?ProductID=IS&Type=PageShown HTTP/1.1
                                        Content-Type: application/json;charset=utf-8
                                        Host: flow.lavasoft.com
                                        Content-Length: 188
                                        2024-07-11 17:50:20 UTC1OUTData Raw: 7b
                                        Data Ascii: {
                                        2024-07-11 17:50:20 UTC187OUTData Raw: 22 44 61 74 61 22 3a 7b 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 50 61 67 65 4e 61 6d 65 22 3a 22 49 6e 73 74 61 6c 6c 69 6e 67 50 61 67 65 22 2c 22 53 65 71 4e 75 6d 62 65 72 22 3a 31 2c 22 44 65 6c 74 61 4d 73 22 3a 32 34 31 37 7d 7d
                                        Data Ascii: "Data":{"InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","BundleId":"BA002","PageName":"InstallingPage","SeqNumber":1,"DeltaMs":2417}}
                                        2024-07-11 17:50:20 UTC479INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:20 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa2a078a21851-EWR
                                        2024-07-11 17:50:20 UTC35INData Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}
                                        2024-07-11 17:50:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.657192104.16.149.1304431804C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-11 17:50:20 UTC166OUTPOST /v1/event-stat/?ProductID=IS&Type=BundleInstallComplete HTTP/1.1
                                        Content-Type: application/json;charset=utf-8
                                        Host: flow.lavasoft.com
                                        Content-Length: 1283
                                        2024-07-11 17:50:20 UTC1OUTData Raw: 7b
                                        Data Ascii: {
                                        2024-07-11 17:50:20 UTC1023OUTData Raw: 22 44 61 74 61 22 3a 7b 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 42 75 6e 64 6c 65 56 65 72 73 69 6f 6e 22 3a 22 32 2e 30 2e 30 2e 35 33 35 22 2c 22 43 61 72 72 69 65 72 49 64 22 3a 6e 75 6c 6c 2c 22 43 61 72 72 69 65 72 4e 61 6d 65 22 3a 22 42 75 72 6e 41 77 61 72 65 22 2c 22 43 61 72 72 69 65 72 53 6f 66 74 77 61 72 65 4e 61 6d 65 22 3a 22 42 75 72 6e 41 77 61 72 65 20 46 72 65 65 22 2c 22 43 61 72 72 69 65 72 53 6f 66 74 77 61 72 65
                                        Data Ascii: "Data":{"InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","BundleId":"BA002","BundleVersion":"2.0.0.535","CarrierId":null,"CarrierName":"BurnAware","CarrierSoftwareName":"BurnAware Free","CarrierSoftware
                                        2024-07-11 17:50:20 UTC1OUTData Raw: 6f
                                        Data Ascii: o
                                        2024-07-11 17:50:20 UTC258OUTData Raw: 77 73 5c 5c 73 79 73 74 65 6d 33 32 5c 5c 77 62 65 6d 5c 5c 57 4d 49 41 44 41 50 2e 45 58 45 22 2c 22 70 44 65 6c 74 61 22 3a 22 2b 22 7d 2c 7b 22 70 4e 61 6d 65 22 3a 22 73 76 63 68 6f 73 74 22 2c 22 70 44 65 73 63 22 3a 22 48 6f 73 74 20 50 72 6f 63 65 73 73 20 66 6f 72 20 57 69 6e 64 6f 77 73 20 53 65 72 76 69 63 65 73 22 2c 22 70 56 65 72 73 69 6f 6e 22 3a 22 31 30 2e 30 2e 31 39 30 34 31 2e 31 20 28 57 69 6e 42 75 69 6c 64 2e 31 36 30 31 30 31 2e 30 38 30 30 29 22 2c 22 70 43 6d 64 22 3a 22 43 3a 5c 5c 57 69 6e 64 6f 77 73 5c 5c 53 79 73 74 65 6d 33 32 5c 5c 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 22 70 44 65 6c 74 61 22 3a 22 2b 22 7d 5d 2c 22 43 61 72 72 69 65 72 4f 73 42 69 74 22 3a 22 41 6e 79 43 50 55 22 2c 22 44 65 6c 74 61 4d 73 22 3a 32 34 33
                                        Data Ascii: ws\\system32\\wbem\\WMIADAP.EXE","pDelta":"+"},{"pName":"svchost","pDesc":"Host Process for Windows Services","pVersion":"10.0.19041.1 (WinBuild.160101.0800)","pCmd":"C:\\Windows\\System32\\svchost.exe","pDelta":"+"}],"CarrierOsBit":"AnyCPU","DeltaMs":243
                                        2024-07-11 17:50:21 UTC479INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:21 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa2a57dcb4363-EWR
                                        2024-07-11 17:50:21 UTC35INData Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}
                                        2024-07-11 17:50:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.657193104.16.149.1304431804C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-11 17:50:21 UTC157OUTPOST /v1/event-stat/?ProductID=IS&Type=ProfileDebug HTTP/1.1
                                        Content-Type: application/json;charset=utf-8
                                        Host: flow.lavasoft.com
                                        Content-Length: 2860
                                        2024-07-11 17:50:21 UTC1OUTData Raw: 7b
                                        Data Ascii: {
                                        2024-07-11 17:50:21 UTC1023OUTData Raw: 22 44 61 74 61 22 3a 7b 22 49 6e 73 74 61 6c 6c 49 64 22 3a 22 64 61 30 62 36 62 64 30 2d 36 38 62 62 2d 34 35 66 36 2d 38 31 61 62 2d 66 65 35 61 61 30 36 36 39 35 63 61 22 2c 22 4d 61 63 68 69 6e 65 49 64 22 3a 22 33 64 34 30 35 64 62 65 2d 39 64 38 66 2d 34 39 61 35 2d 61 32 33 61 2d 64 61 35 33 62 66 31 38 38 38 30 36 22 2c 22 42 75 6e 64 6c 65 49 64 22 3a 22 42 41 30 30 32 22 2c 22 44 65 6c 74 61 4d 73 22 3a 32 34 34 33 2c 22 49 6e 73 74 61 6c 6c 65 64 41 70 70 44 61 74 61 22 3a 5b 7b 22 44 69 73 70 6c 61 79 4e 61 6d 65 22 3a 22 37 2d 5a 69 70 20 32 33 2e 30 31 20 28 78 36 34 29 22 2c 22 44 69 73 70 6c 61 79 56 65 72 73 69 6f 6e 22 3a 22 32 33 2e 30 31 22 2c 22 49 6e 73 74 61 6c 6c 44 61 74 65 22 3a 6e 75 6c 6c 2c 22 49 6e 73 74 61 6c 6c 4c 6f 63 61
                                        Data Ascii: "Data":{"InstallId":"da0b6bd0-68bb-45f6-81ab-fe5aa06695ca","MachineId":"3d405dbe-9d8f-49a5-a23a-da53bf188806","BundleId":"BA002","DeltaMs":2443,"InstalledAppData":[{"DisplayName":"7-Zip 23.01 (x64)","DisplayVersion":"23.01","InstallDate":null,"InstallLoca
                                        2024-07-11 17:50:21 UTC1OUTData Raw: 4c
                                        Data Ascii: L
                                        2024-07-11 17:50:21 UTC1835OUTData Raw: 6f 63 61 74 69 6f 6e 22 3a 22 22 7d 2c 7b 22 44 69 73 70 6c 61 79 4e 61 6d 65 22 3a 22 4f 66 66 69 63 65 20 31 36 20 43 6c 69 63 6b 2d 74 6f 2d 52 75 6e 20 45 78 74 65 6e 73 69 62 69 6c 69 74 79 20 43 6f 6d 70 6f 6e 65 6e 74 20 36 34 2d 62 69 74 20 52 65 67 69 73 74 72 61 74 69 6f 6e 22 2c 22 44 69 73 70 6c 61 79 56 65 72 73 69 6f 6e 22 3a 22 31 36 2e 30 2e 31 36 38 32 37 2e 32 30 30 35 36 22 2c 22 49 6e 73 74 61 6c 6c 44 61 74 65 22 3a 22 32 30 32 33 31 30 30 35 22 2c 22 49 6e 73 74 61 6c 6c 4c 6f 63 61 74 69 6f 6e 22 3a 22 22 7d 2c 7b 22 44 69 73 70 6c 61 79 4e 61 6d 65 22 3a 22 41 64 6f 62 65 20 41 63 72 6f 62 61 74 20 28 36 34 2d 62 69 74 29 22 2c 22 44 69 73 70 6c 61 79 56 65 72 73 69 6f 6e 22 3a 22 32 33 2e 30 30 36 2e 32 30 33 32 30 22 2c 22 49 6e
                                        Data Ascii: ocation":""},{"DisplayName":"Office 16 Click-to-Run Extensibility Component 64-bit Registration","DisplayVersion":"16.0.16827.20056","InstallDate":"20231005","InstallLocation":""},{"DisplayName":"Adobe Acrobat (64-bit)","DisplayVersion":"23.006.20320","In
                                        2024-07-11 17:50:21 UTC479INHTTP/1.1 200 OK
                                        Date: Thu, 11 Jul 2024 17:50:21 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                        Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range,Access-Control-Allow-Origin
                                        Access-Control-Expose-Headers: Content-Length,Content-Range
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8a1aa2aa2d377ced-EWR
                                        2024-07-11 17:50:21 UTC35INData Raw: 31 64 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 45 76 65 6e 74 20 70 65 72 73 69 73 74 65 64 22 7d 0d 0a
                                        Data Ascii: 1d{"message":"Event persisted"}
                                        2024-07-11 17:50:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:13:49:41
                                        Start date:11/07/2024
                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe"
                                        Imagebase:0x400000
                                        File size:8'728'608 bytes
                                        MD5 hash:A6D83330743EDCFF48A85DFA1013FDAB
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:Borland Delphi
                                        Reputation:low
                                        Has exited:false

                                        Target ID:2
                                        Start time:13:49:42
                                        Start date:11/07/2024
                                        Path:C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-DMLII.tmp\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.tmp" /SL5="$103DA,8156847,189952,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.2818.3154.4230.exe"
                                        Imagebase:0x400000
                                        File size:1'255'424 bytes
                                        MD5 hash:B3937B0F947BBEB9F93859803C6FD14E
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:Borland Delphi
                                        Yara matches:
                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000002.00000002.3970419543.0000000006271000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: 00000002.00000002.3970419543.000000000608D000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:4
                                        Start time:13:50:14
                                        Start date:11/07/2024
                                        Path:C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-3M0V5.tmp\BA002.exe"
                                        Imagebase:0x400000
                                        File size:894'336 bytes
                                        MD5 hash:9AA0F5A7FBC6F7A2E6FEAF78F8E6B7D7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:false

                                        Target ID:6
                                        Start time:13:50:15
                                        Start date:11/07/2024
                                        Path:C:\Users\user\AppData\Local\Temp\7zSC9543C70\installer.exe
                                        Wow64 process (32bit):true
                                        Commandline:.\installer.exe
                                        Imagebase:0xf80000
                                        File size:1'626'360 bytes
                                        MD5 hash:4D66DE397B5BF1F085AA7046A578A34C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:false

                                        Target ID:7
                                        Start time:13:50:15
                                        Start date:11/07/2024
                                        Path:C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\AppData\Local\Temp\7zSC9543C70\GenericSetup.exe
                                        Imagebase:0x410000
                                        File size:46'840 bytes
                                        MD5 hash:1F4C6E7D827B980005B2C9C057018BD0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 2%, ReversingLabs
                                        Reputation:low
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:15.9%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:1.8%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:14
                                          execution_graph 13005 40b681 13006 40b68e 13005->13006 13010 40b69f 13005->13010 13006->13010 13011 40b6c0 13006->13011 13012 40b6ca __EH_prolog 13011->13012 13026 404349 13012->13026 13017 404349 ctype 34 API calls 13018 40b710 13017->13018 13019 404320 ctype 34 API calls 13018->13019 13020 40b71b 13019->13020 13035 409739 13020->13035 13023 403a63 13111 413d6f 13023->13111 13045 40435e 13026->13045 13029 404320 13030 40432b 13029->13030 13031 404349 ctype 34 API calls 13030->13031 13032 404333 13031->13032 13033 403a63 ctype 29 API calls 13032->13033 13034 40433b 13033->13034 13034->13017 13036 409743 __EH_prolog 13035->13036 13037 404320 ctype 34 API calls 13036->13037 13038 409759 13037->13038 13039 404320 ctype 34 API calls 13038->13039 13040 409765 13039->13040 13041 404320 ctype 34 API calls 13040->13041 13042 409771 13041->13042 13043 404320 ctype 34 API calls 13042->13043 13044 40977c 13043->13044 13044->13023 13048 40b815 13045->13048 13046 404350 13046->13029 13049 40b82c 13048->13049 13050 40b864 13049->13050 13052 403a63 ctype 29 API calls 13049->13052 13053 409dfc 13049->13053 13050->13046 13052->13049 13054 409e06 __EH_prolog 13053->13054 13073 407782 13054->13073 13057 404320 ctype 34 API calls 13058 409e30 13057->13058 13059 404320 ctype 34 API calls 13058->13059 13060 409e3f 13059->13060 13061 404349 ctype 34 API calls 13060->13061 13062 409e59 13061->13062 13063 404320 ctype 34 API calls 13062->13063 13064 409e64 13063->13064 13065 404349 ctype 34 API calls 13064->13065 13066 409e7b 13065->13066 13067 404320 ctype 34 API calls 13066->13067 13068 409e86 13067->13068 13081 4099f1 13068->13081 13074 407792 13073->13074 13075 407797 13073->13075 13101 413030 SetEvent 13074->13101 13077 4077ad 13075->13077 13105 412fe0 WaitForSingleObject 13075->13105 13077->13057 13079 4077a6 13106 412fb0 13079->13106 13082 4099fb __EH_prolog 13081->13082 13083 407782 5 API calls 13082->13083 13084 409a14 13083->13084 13085 412fb0 ctype 2 API calls 13084->13085 13086 409a1c 13085->13086 13087 412fb0 ctype 2 API calls 13086->13087 13088 409a24 13087->13088 13089 412fb0 ctype 2 API calls 13088->13089 13090 409a2c 13089->13090 13091 409a39 13090->13091 13092 409a43 __EH_prolog 13091->13092 13093 404320 ctype 34 API calls 13092->13093 13094 409a59 13093->13094 13095 404320 ctype 34 API calls 13094->13095 13096 409a65 13095->13096 13097 404320 ctype 34 API calls 13096->13097 13098 409a71 13097->13098 13099 404320 ctype 34 API calls 13098->13099 13100 409a7d 13099->13100 13100->13049 13102 413040 GetLastError 13101->13102 13103 41303d 13101->13103 13104 41304a 13102->13104 13103->13075 13104->13075 13105->13079 13107 412fd5 13106->13107 13108 412fb9 CloseHandle 13106->13108 13107->13077 13108->13107 13109 412fc4 GetLastError 13108->13109 13109->13107 13110 412fce 13109->13110 13110->13077 13112 403a6c 13111->13112 13113 413d9d 13111->13113 13112->13010 13114 413de2 13113->13114 13115 413da7 13113->13115 13116 413dd3 13114->13116 13119 4154da ctype 28 API calls 13114->13119 13128 4154da 13115->13128 13116->13112 13118 413e3b RtlFreeHeap 13116->13118 13118->13112 13121 413dee ctype 13119->13121 13120 413dae ctype 13122 413dc8 13120->13122 13143 415898 13120->13143 13124 413e1a 13121->13124 13152 41661f 13121->13152 13149 413dd9 13122->13149 13156 413e31 13124->13156 13129 415530 EnterCriticalSection 13128->13129 13130 4154f2 13128->13130 13129->13120 13159 413c35 13130->13159 13133 415508 13135 4154da ctype 27 API calls 13133->13135 13136 415510 13135->13136 13137 415521 13136->13137 13138 415517 InitializeCriticalSection 13136->13138 13140 413d6f ctype 27 API calls 13137->13140 13139 415526 13138->13139 13168 41553b LeaveCriticalSection 13139->13168 13140->13139 13142 41552e 13142->13129 13144 4158d6 13143->13144 13148 415b8c ctype 13143->13148 13145 415ad2 VirtualFree 13144->13145 13144->13148 13146 415b36 13145->13146 13147 415b45 VirtualFree HeapFree 13146->13147 13146->13148 13147->13148 13148->13122 13252 41553b LeaveCriticalSection 13149->13252 13151 413de0 13151->13116 13153 416662 13152->13153 13154 41664c 13152->13154 13153->13124 13154->13153 13253 416506 13154->13253 13262 41553b LeaveCriticalSection 13156->13262 13158 413e38 13158->13116 13169 413c47 13159->13169 13162 4149dc 13163 4149e5 13162->13163 13164 4149ea 13162->13164 13232 4175cd 13163->13232 13238 417606 13164->13238 13168->13142 13170 413c44 13169->13170 13172 413c4e ctype 13169->13172 13170->13133 13170->13162 13172->13170 13173 413c73 13172->13173 13174 413ca0 13173->13174 13178 413ce3 13173->13178 13175 4154da ctype 28 API calls 13174->13175 13181 413cce 13174->13181 13176 413cb6 13175->13176 13191 415bc1 13176->13191 13177 413d52 RtlAllocateHeap 13180 413cd5 13177->13180 13178->13181 13182 413d05 13178->13182 13180->13172 13181->13177 13181->13180 13184 4154da ctype 28 API calls 13182->13184 13186 413d0c 13184->13186 13200 416664 13186->13200 13188 413d1f 13207 413d39 13188->13207 13194 415bf3 13191->13194 13192 415c92 13196 413cc1 13192->13196 13217 415f7b 13192->13217 13194->13192 13194->13196 13210 415eca 13194->13210 13197 413cda 13196->13197 13221 41553b LeaveCriticalSection 13197->13221 13199 413ce1 13199->13181 13205 416672 ctype 13200->13205 13201 41675e VirtualAlloc 13206 41672f ctype 13201->13206 13202 416833 13222 41636c 13202->13222 13205->13201 13205->13202 13205->13206 13206->13188 13206->13206 13231 41553b LeaveCriticalSection 13207->13231 13209 413d2c 13209->13180 13209->13181 13211 415f0d HeapAlloc 13210->13211 13212 415edd HeapReAlloc 13210->13212 13213 415f5d 13211->13213 13215 415f33 VirtualAlloc 13211->13215 13212->13213 13214 415efc 13212->13214 13213->13192 13214->13211 13215->13213 13216 415f4d HeapFree 13215->13216 13216->13213 13218 415f8d VirtualAlloc 13217->13218 13220 415fd6 13218->13220 13220->13196 13221->13199 13223 416380 HeapAlloc 13222->13223 13224 416379 13222->13224 13225 41639d VirtualAlloc 13223->13225 13230 4163d5 ctype 13223->13230 13224->13225 13226 416492 13225->13226 13227 4163bd VirtualAlloc 13225->13227 13228 41649a HeapFree 13226->13228 13226->13230 13229 416484 VirtualFree 13227->13229 13227->13230 13228->13230 13229->13226 13230->13206 13231->13209 13233 4175d7 13232->13233 13234 417606 ctype 7 API calls 13233->13234 13237 417604 13233->13237 13235 4175ee 13234->13235 13236 417606 ctype 7 API calls 13235->13236 13236->13237 13237->13164 13240 417619 13238->13240 13239 417730 ctype 13242 417743 GetStdHandle WriteFile 13239->13242 13240->13239 13241 417659 13240->13241 13246 4149f3 13240->13246 13243 417665 GetModuleFileNameA 13241->13243 13241->13246 13242->13246 13244 41767d ctype 13243->13244 13247 4180f0 13244->13247 13246->13133 13248 4180fd LoadLibraryA 13247->13248 13249 41813f 13247->13249 13248->13249 13250 41810e GetProcAddress 13248->13250 13249->13246 13250->13249 13251 418125 GetProcAddress GetProcAddress 13250->13251 13251->13249 13252->13151 13256 416513 13253->13256 13254 4165c3 13254->13153 13255 416534 VirtualFree 13255->13256 13256->13254 13256->13255 13258 4164b0 VirtualFree 13256->13258 13259 4164cd 13258->13259 13260 4164fd 13259->13260 13261 4164dd HeapFree 13259->13261 13260->13256 13261->13256 13262->13158 13263 410f30 13264 413d6f ctype 29 API calls 13263->13264 13265 410f36 13264->13265 13266 403724 13271 403740 13266->13271 13269 403739 13270 403a63 ctype 29 API calls 13270->13269 13272 40374a __EH_prolog 13271->13272 13287 4037d4 13272->13287 13274 40376d 13275 403a63 ctype 29 API calls 13274->13275 13276 403778 13275->13276 13291 4036b9 DeleteCriticalSection 13276->13291 13279 403a63 ctype 29 API calls 13280 403789 13279->13280 13281 403a63 ctype 29 API calls 13280->13281 13282 4037a3 13281->13282 13283 403a63 ctype 29 API calls 13282->13283 13284 4037ab 13283->13284 13285 403a63 ctype 29 API calls 13284->13285 13286 40372c 13285->13286 13286->13269 13286->13270 13288 4037e1 DestroyWindow 13287->13288 13289 4037dd 13287->13289 13290 4037f1 13288->13290 13289->13274 13290->13274 13292 412fb0 ctype 2 API calls 13291->13292 13293 4036ce 13292->13293 13294 403a63 ctype 29 API calls 13293->13294 13295 4036d6 13294->13295 13295->13279 13296 4148d4 GetVersion 13327 4157c8 HeapCreate 13296->13327 13298 414932 13299 414937 13298->13299 13300 41493f 13298->13300 13760 414a01 13299->13760 13339 41528c 13300->13339 13304 414944 13305 414950 13304->13305 13306 414948 13304->13306 13349 417411 13305->13349 13307 414a01 8 API calls 13306->13307 13309 41494f 13307->13309 13309->13305 13310 41495a GetCommandLineA 13363 4172df 13310->13363 13314 414974 13395 416fd9 13314->13395 13316 414979 13317 41497e GetStartupInfoA 13316->13317 13408 416f81 13317->13408 13319 414990 GetModuleHandleA 13412 401014 13319->13412 13328 4157e8 13327->13328 13329 41581e 13327->13329 13774 415680 13328->13774 13329->13298 13332 415804 13334 415821 13332->13334 13336 41636c ctype 5 API calls 13332->13336 13333 4157f7 13786 415825 HeapAlloc 13333->13786 13334->13298 13337 415801 13336->13337 13337->13334 13338 415812 HeapDestroy 13337->13338 13338->13329 13889 4154b1 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 13339->13889 13341 415292 TlsAlloc 13342 4152a2 13341->13342 13343 4152dc 13341->13343 13344 416ccc 30 API calls 13342->13344 13343->13304 13345 4152ab 13344->13345 13345->13343 13346 4152b3 TlsSetValue 13345->13346 13346->13343 13347 4152c4 13346->13347 13348 4152ca GetCurrentThreadId 13347->13348 13348->13304 13350 413c35 ctype 29 API calls 13349->13350 13351 417424 13350->13351 13352 417432 GetStartupInfoA 13351->13352 13353 4149dc ctype 7 API calls 13351->13353 13359 417551 13352->13359 13362 417480 13352->13362 13353->13352 13355 41757c GetStdHandle 13358 41758a GetFileType 13355->13358 13355->13359 13356 4175bc SetHandleCount 13356->13310 13357 413c35 ctype 29 API calls 13357->13362 13358->13359 13359->13355 13359->13356 13360 4174f7 13360->13359 13361 417519 GetFileType 13360->13361 13361->13360 13362->13357 13362->13359 13362->13360 13364 4172fa GetEnvironmentStringsW 13363->13364 13365 41732d 13363->13365 13367 417302 13364->13367 13368 41730e GetEnvironmentStrings 13364->13368 13366 41731e 13365->13366 13365->13367 13369 41496a 13366->13369 13372 4173c0 GetEnvironmentStrings 13366->13372 13373 4173cc 13366->13373 13370 417346 WideCharToMultiByte 13367->13370 13371 41733a GetEnvironmentStringsW 13367->13371 13368->13366 13368->13369 13386 417092 13369->13386 13375 41737a 13370->13375 13376 4173ac FreeEnvironmentStringsW 13370->13376 13371->13369 13371->13370 13372->13369 13372->13373 13377 413c35 ctype 29 API calls 13373->13377 13378 413c35 ctype 29 API calls 13375->13378 13376->13369 13384 4173e7 13377->13384 13379 417380 13378->13379 13379->13376 13380 417389 WideCharToMultiByte 13379->13380 13382 4173a3 13380->13382 13383 41739a 13380->13383 13381 4173fd FreeEnvironmentStringsA 13381->13369 13382->13376 13385 413d6f ctype 29 API calls 13383->13385 13384->13381 13385->13382 13387 4170a4 13386->13387 13388 4170a9 GetModuleFileNameA 13386->13388 13890 417fe2 13387->13890 13390 4170cc 13388->13390 13391 413c35 ctype 29 API calls 13390->13391 13392 4170ed 13391->13392 13393 4170fd 13392->13393 13394 4149dc ctype 7 API calls 13392->13394 13393->13314 13394->13393 13396 416fe6 13395->13396 13399 416feb ctype 13395->13399 13397 417fe2 48 API calls 13396->13397 13397->13399 13398 413c35 ctype 29 API calls 13400 417018 13398->13400 13399->13398 13401 4149dc ctype 7 API calls 13400->13401 13407 41702c ctype 13400->13407 13401->13407 13402 41706f 13403 413d6f ctype 29 API calls 13402->13403 13404 41707b 13403->13404 13404->13316 13405 413c35 ctype 29 API calls 13405->13407 13406 4149dc ctype 7 API calls 13406->13407 13407->13402 13407->13405 13407->13406 13409 416f8a 13408->13409 13411 416f8f 13408->13411 13410 417fe2 48 API calls 13409->13410 13410->13411 13411->13319 13919 401a7b GetVersionExA 13412->13919 13417 40218d 30 API calls 13418 401067 13417->13418 13419 40218d 30 API calls 13418->13419 13420 401079 13419->13420 13421 40218d 30 API calls 13420->13421 13422 40108b GetCommandLineW 13421->13422 13927 401cb5 13422->13927 13427 403a63 ctype 29 API calls 13428 4010b4 13427->13428 13429 40218d 30 API calls 13428->13429 13430 4010c7 13429->13430 13941 40460b 13430->13941 13437 401cb5 30 API calls 13438 4010ef 13437->13438 13971 401e6f 13438->13971 13443 403a63 ctype 29 API calls 13444 401112 13443->13444 13445 403a63 ctype 29 API calls 13444->13445 13446 40111a 13445->13446 13447 401154 13446->13447 14112 401e4e 13446->14112 13978 40245b 13447->13978 13454 40117c 13456 401180 13454->13456 13457 401199 13454->13457 13459 401191 13456->13459 14119 410ec0 MessageBoxW 13456->14119 13460 401cb5 30 API calls 13457->13460 13458 403a63 ctype 29 API calls 13461 401143 13458->13461 13465 403a63 ctype 29 API calls 13459->13465 13463 4011a9 13460->13463 13464 40237b 30 API calls 13461->13464 13467 40218d 30 API calls 13463->13467 13466 40114c 13464->13466 13468 401a2f 13465->13468 13469 402340 30 API calls 13466->13469 13474 4011bb 13467->13474 13471 403a63 ctype 29 API calls 13468->13471 13469->13447 13470 4014b2 13991 401c9d 13470->13991 13472 401a37 13471->13472 13475 403a63 ctype 29 API calls 13472->13475 13474->13470 14120 403de4 13474->14120 13478 401a3f 13475->13478 13481 403a63 ctype 29 API calls 13478->13481 13485 401a47 13481->13485 13483 4011f2 13661 401203 13483->13661 14147 410ec0 MessageBoxW 13483->14147 13484 40120b 13489 401cb5 30 API calls 13484->13489 13488 403a63 ctype 29 API calls 13485->13488 13486 4014f1 14010 403a3d 13486->14010 13487 4014d8 13539 4014e9 13487->13539 14155 410ec0 MessageBoxW 13487->14155 13492 401a4f 13488->13492 13494 401218 13489->13494 13497 403a63 ctype 29 API calls 13492->13497 14148 4040fd 13494->14148 13495 404349 ctype 34 API calls 13499 401341 13495->13499 13496 40536a 43 API calls 13500 401a06 13496->13500 13501 401392 13497->13501 13504 404320 ctype 34 API calls 13499->13504 13505 403a63 ctype 29 API calls 13500->13505 13766 416a66 13501->13766 13503 4014f8 14015 407f8e 13503->14015 13507 40134c 13504->13507 13509 401a11 13505->13509 13506 403a63 ctype 29 API calls 13510 401232 13506->13510 13512 403a63 ctype 29 API calls 13507->13512 13514 403a63 ctype 29 API calls 13509->13514 13511 401cb5 30 API calls 13510->13511 13515 401241 13511->13515 13516 401354 13512->13516 13519 401a19 13514->13519 13520 4040fd 30 API calls 13515->13520 13521 403a63 ctype 29 API calls 13516->13521 13517 401529 14156 410ec0 MessageBoxW 13517->14156 13518 40153a 14025 401d16 13518->14025 13524 403a63 ctype 29 API calls 13519->13524 13525 401253 13520->13525 13526 40135f 13521->13526 13524->13459 13528 403a63 ctype 29 API calls 13525->13528 13529 403a63 ctype 29 API calls 13526->13529 13532 40125b 13528->13532 13533 401367 13529->13533 13530 40218d 30 API calls 13531 401561 13530->13531 14028 402efe 13531->14028 13535 401cb5 30 API calls 13532->13535 13536 403a63 ctype 29 API calls 13533->13536 13538 40126a 13535->13538 13540 40136f 13536->13540 13543 4040fd 30 API calls 13538->13543 13539->13496 13544 403a63 ctype 29 API calls 13540->13544 13541 401584 13552 4015b5 13541->13552 13580 4015ef 13541->13580 14157 405ed1 13541->14157 13542 4015f8 13546 403a63 ctype 29 API calls 13542->13546 13547 40127f 13543->13547 13545 401377 13544->13545 13548 403a63 ctype 29 API calls 13545->13548 13549 401600 13546->13549 13550 403a63 ctype 29 API calls 13547->13550 13551 40137f 13548->13551 13554 401c9d 30 API calls 13549->13554 13555 401287 13550->13555 13557 403a63 ctype 29 API calls 13551->13557 13567 405ed1 33 API calls 13552->13567 13552->13580 13559 401609 13554->13559 13560 403b38 ctype 5 API calls 13555->13560 13556 403a63 ctype 29 API calls 13561 401924 13556->13561 13563 401387 13557->13563 13558 4015a1 13564 401daf 30 API calls 13558->13564 14069 404f70 13559->14069 13566 401298 13560->13566 13562 403a63 ctype 29 API calls 13561->13562 13568 40192f 13562->13568 13569 403a63 ctype 29 API calls 13563->13569 13570 4015aa 13564->13570 13572 401cb5 30 API calls 13566->13572 13573 4015d5 MessageBoxW 13567->13573 13578 40536a 43 API calls 13568->13578 13569->13501 13574 403a63 ctype 29 API calls 13570->13574 13576 4012af 13572->13576 13577 403a63 ctype 29 API calls 13573->13577 13574->13552 13589 403a63 ctype 29 API calls 13576->13589 13577->13580 13581 401946 13578->13581 13579 40161c 13582 401650 13579->13582 13583 401620 13579->13583 13580->13556 13584 403a63 ctype 29 API calls 13581->13584 13585 4017b4 13582->13585 13586 401659 13582->13586 13587 404f2c 33 API calls 13583->13587 13590 401951 13584->13590 13592 4017ec 13585->13592 14169 401d50 13585->14169 13591 401a66 31 API calls 13586->13591 13588 401628 13587->13588 13593 403a63 ctype 29 API calls 13588->13593 13594 4012c7 13589->13594 13596 403a63 ctype 29 API calls 13590->13596 13597 401664 13591->13597 13595 401d16 30 API calls 13592->13595 13599 401630 13593->13599 13608 401daf 30 API calls 13594->13608 13610 4012e4 13594->13610 13600 4017fb 13595->13600 13601 401959 13596->13601 13602 401692 13597->13602 13603 40169e 13597->13603 13607 403a63 ctype 29 API calls 13599->13607 14091 405bad 13600->14091 13612 403a63 ctype 29 API calls 13601->13612 14160 401e18 13602->14160 13605 401a66 31 API calls 13603->13605 13614 4016a9 ShellExecuteExA 13605->13614 13607->13539 13608->13610 13609 40139a 13616 401cb5 30 API calls 13609->13616 13610->13609 13617 4012f6 MessageBoxW 13610->13617 13619 401964 13612->13619 13620 401798 13614->13620 13621 4016e8 13614->13621 13623 4013a7 13616->13623 13617->13609 13624 40130e 13617->13624 13626 403a63 ctype 29 API calls 13619->13626 13629 403a63 ctype 29 API calls 13620->13629 13627 4016f9 13621->13627 14163 410ec0 MessageBoxW 13621->14163 13622 4017d2 13630 4040fd 30 API calls 13623->13630 13631 403a63 ctype 29 API calls 13624->13631 13625 401cb5 30 API calls 13632 401810 13625->13632 13633 40196c 13626->13633 13636 403a63 ctype 29 API calls 13627->13636 13637 4017a6 13629->13637 13639 4013bc 13630->13639 13640 401319 13631->13640 14095 401e8b 13632->14095 13642 403a63 ctype 29 API calls 13633->13642 13644 401701 13636->13644 13645 403a63 ctype 29 API calls 13637->13645 13646 401daf 30 API calls 13639->13646 13647 403a63 ctype 29 API calls 13640->13647 13643 401974 13642->13643 13649 403a63 ctype 29 API calls 13643->13649 13650 403a63 ctype 29 API calls 13644->13650 13651 4017ae 13645->13651 13652 4013c5 13646->13652 13653 401321 13647->13653 13657 40197c 13649->13657 13658 401709 13650->13658 13659 4019bf 13651->13659 13660 403a63 ctype 29 API calls 13652->13660 13655 403a63 ctype 29 API calls 13653->13655 13654 403a63 ctype 29 API calls 13656 401828 13654->13656 13655->13661 13662 403a63 ctype 29 API calls 13656->13662 13663 403a63 ctype 29 API calls 13657->13663 13664 404f2c 33 API calls 13658->13664 13665 4019d4 13659->13665 13666 4019c4 WaitForSingleObject CloseHandle 13659->13666 13667 4013d0 13660->13667 13661->13495 13669 401830 13662->13669 13670 401984 13663->13670 13671 401713 13664->13671 13672 404f2c 33 API calls 13665->13672 13666->13665 13668 403a63 ctype 29 API calls 13667->13668 13673 4013d8 13668->13673 13675 403a63 ctype 29 API calls 13670->13675 13679 401cb5 30 API calls 13673->13679 13681 40198c 13675->13681 13684 4013e7 13679->13684 13686 403a63 ctype 29 API calls 13681->13686 13689 4040fd 30 API calls 13684->13689 13686->13501 13692 4013fc 13689->13692 13695 401daf 30 API calls 13692->13695 13698 401405 13695->13698 13701 403a63 ctype 29 API calls 13698->13701 13705 401410 13701->13705 13710 403a63 ctype 29 API calls 13705->13710 13714 401418 13710->13714 13717 401cb5 30 API calls 13714->13717 13720 401427 13717->13720 13724 4040fd 30 API calls 13720->13724 13728 401440 13724->13728 13729 402635 30 API calls 13728->13729 13733 40144d 13729->13733 13735 401daf 30 API calls 13733->13735 13738 401456 13735->13738 13740 403a63 ctype 29 API calls 13738->13740 13742 401461 13740->13742 13744 403a63 ctype 29 API calls 13742->13744 13746 40146c 13744->13746 13748 403a63 ctype 29 API calls 13746->13748 13750 401474 13748->13750 13751 403a63 ctype 29 API calls 13750->13751 13752 40147f 13751->13752 13753 403a63 ctype 29 API calls 13752->13753 13754 401487 13753->13754 13755 403a63 ctype 29 API calls 13754->13755 13756 40148f 13755->13756 13757 404349 ctype 34 API calls 13756->13757 13758 4014a7 13757->13758 13759 404320 ctype 34 API calls 13758->13759 13759->13470 13761 414a0a 13760->13761 13762 414a0f 13760->13762 13763 4175cd ctype 7 API calls 13761->13763 13764 417606 ctype 7 API calls 13762->13764 13763->13762 13765 414a18 ExitProcess 13764->13765 16379 416a88 13766->16379 13769 416e09 13770 4152f3 35 API calls 13769->13770 13771 416e14 13770->13771 13772 416f3a UnhandledExceptionFilter 13771->13772 13773 4149ce 13771->13773 13772->13773 13788 413a90 13774->13788 13777 4156c3 GetEnvironmentVariableA 13781 4156e2 13777->13781 13785 4157a0 13777->13785 13778 4156a9 13778->13777 13779 4156bb 13778->13779 13779->13332 13779->13333 13782 415727 GetModuleFileNameA 13781->13782 13783 41571f 13781->13783 13782->13783 13783->13785 13790 4177c0 13783->13790 13785->13779 13793 415653 GetModuleHandleA 13785->13793 13787 415841 13786->13787 13787->13337 13789 413a9c GetVersionExA 13788->13789 13789->13777 13789->13778 13795 4177d7 13790->13795 13794 41566a 13793->13794 13794->13779 13797 4177ef 13795->13797 13799 41781f 13797->13799 13804 418578 13797->13804 13798 418578 6 API calls 13798->13799 13799->13798 13801 417948 13799->13801 13803 4177d3 13799->13803 13808 41843d 13799->13808 13801->13803 13819 416cba 13801->13819 13803->13785 13805 418596 13804->13805 13807 41858a 13804->13807 13822 41883c 13805->13822 13807->13797 13809 41845b InterlockedIncrement 13808->13809 13818 418448 13808->13818 13810 418477 InterlockedDecrement 13809->13810 13813 418481 13809->13813 13811 4154da ctype 29 API calls 13810->13811 13811->13813 13834 4184ac 13813->13834 13815 4184a1 InterlockedDecrement 13815->13818 13816 418497 13840 41553b LeaveCriticalSection 13816->13840 13818->13799 13859 4152f3 GetLastError TlsGetValue 13819->13859 13821 416cbf 13821->13803 13823 41886d GetStringTypeW 13822->13823 13827 418885 13822->13827 13824 418889 GetStringTypeA 13823->13824 13823->13827 13824->13827 13828 418971 13824->13828 13825 4188b0 GetStringTypeA 13825->13828 13826 4188d4 13826->13828 13830 4188ea MultiByteToWideChar 13826->13830 13827->13825 13827->13826 13828->13807 13830->13828 13831 41890e ctype 13830->13831 13831->13828 13832 418948 MultiByteToWideChar 13831->13832 13832->13828 13833 418961 GetStringTypeW 13832->13833 13833->13828 13835 4184d7 13834->13835 13839 41848e 13834->13839 13836 4184f3 13835->13836 13837 418578 6 API calls 13835->13837 13836->13839 13841 4185ed 13836->13841 13837->13836 13839->13815 13839->13816 13840->13818 13842 418639 13841->13842 13843 41861d LCMapStringW 13841->13843 13846 418682 LCMapStringA 13842->13846 13847 41869f 13842->13847 13843->13842 13844 418641 LCMapStringA 13843->13844 13844->13842 13845 41877b 13844->13845 13845->13839 13846->13845 13847->13845 13848 4186b5 MultiByteToWideChar 13847->13848 13848->13845 13849 4186df 13848->13849 13849->13845 13850 418715 MultiByteToWideChar 13849->13850 13850->13845 13851 41872e LCMapStringW 13850->13851 13851->13845 13852 418749 13851->13852 13853 41874f 13852->13853 13855 41878f 13852->13855 13853->13845 13854 41875d LCMapStringW 13853->13854 13854->13845 13855->13845 13856 4187c7 LCMapStringW 13855->13856 13856->13845 13857 4187df WideCharToMultiByte 13856->13857 13857->13845 13860 41530f 13859->13860 13861 41534e SetLastError 13859->13861 13870 416ccc 13860->13870 13861->13821 13864 415320 TlsSetValue 13865 415346 13864->13865 13866 415331 13864->13866 13867 4149dc ctype 7 API calls 13865->13867 13869 415337 GetCurrentThreadId 13866->13869 13868 41534d 13867->13868 13868->13861 13869->13861 13880 416d01 ctype 13870->13880 13871 415318 13871->13864 13871->13865 13872 416db9 HeapAlloc 13872->13880 13873 4154da ctype 29 API calls 13873->13880 13874 4154da ctype 29 API calls 13879 416d7b 13874->13879 13875 415bc1 ctype 5 API calls 13875->13880 13876 416664 ctype 6 API calls 13876->13879 13879->13872 13879->13874 13879->13876 13879->13880 13884 416dee 13879->13884 13880->13871 13880->13872 13880->13873 13880->13875 13880->13879 13881 416d65 13880->13881 13887 41553b LeaveCriticalSection 13881->13887 13883 416d6c 13883->13880 13888 41553b LeaveCriticalSection 13884->13888 13886 416df5 13886->13879 13887->13883 13888->13886 13889->13341 13891 417feb 13890->13891 13892 417ff2 13890->13892 13894 417c0a 13891->13894 13892->13388 13895 4154da ctype 29 API calls 13894->13895 13896 417c1a 13895->13896 13905 417db7 13896->13905 13900 417daf 13900->13892 13902 417c56 GetCPInfo 13904 417c6c 13902->13904 13903 417c31 13918 41553b LeaveCriticalSection 13903->13918 13904->13903 13910 417e5d GetCPInfo 13904->13910 13906 417dd7 13905->13906 13907 417dc7 GetOEMCP 13905->13907 13908 417c22 13906->13908 13909 417ddc GetACP 13906->13909 13907->13906 13908->13902 13908->13903 13908->13904 13909->13908 13911 417f48 13910->13911 13912 417e80 13910->13912 13911->13903 13913 41883c 6 API calls 13912->13913 13914 417efc 13913->13914 13915 4185ed 9 API calls 13914->13915 13916 417f20 13915->13916 13917 4185ed 9 API calls 13916->13917 13917->13911 13918->13900 13920 40102d 13919->13920 13921 40218d 13920->13921 13922 40219d 13921->13922 13926 401055 13921->13926 13923 403a3d 30 API calls 13922->13923 13924 4021a7 13923->13924 13925 403a63 ctype 29 API calls 13924->13925 13924->13926 13925->13926 13926->13417 13928 401cd3 13927->13928 13929 40218d 30 API calls 13928->13929 13930 40109a 13929->13930 13931 4038d7 13930->13931 13932 4038e1 __EH_prolog 13931->13932 13933 403956 13932->13933 13935 401ded 30 API calls 13932->13935 13940 4010ac 13932->13940 13934 401e4e 30 API calls 13933->13934 13936 403965 13934->13936 13935->13932 13937 401daf 30 API calls 13936->13937 13938 403972 13937->13938 13939 403a63 ctype 29 API calls 13938->13939 13939->13940 13940->13427 13942 404615 __EH_prolog 13941->13942 13943 404636 GetModuleFileNameA 13942->13943 13944 404697 GetModuleFileNameW 13942->13944 13946 404656 13943->13946 13950 4010cf 13943->13950 13945 4046b8 13944->13945 13944->13950 13948 401d50 30 API calls 13945->13948 13945->13950 13946->13950 14193 403bdf 13946->14193 13948->13950 13959 40237b 13950->13959 13953 401daf 30 API calls 13954 404683 13953->13954 13955 403a63 ctype 29 API calls 13954->13955 13956 40468b 13955->13956 13957 403a63 ctype 29 API calls 13956->13957 13958 404693 13957->13958 13958->13950 13960 402385 __EH_prolog 13959->13960 14214 4025c7 13960->14214 13962 402394 13963 403a63 ctype 29 API calls 13962->13963 13964 4010d7 13963->13964 13965 402340 13964->13965 13966 40234a __EH_prolog 13965->13966 13967 4025c7 30 API calls 13966->13967 13968 402359 13967->13968 13969 403a63 ctype 29 API calls 13968->13969 13970 4010df 13969->13970 13970->13437 14228 40222b 13971->14228 13974 403b38 13977 403b41 13974->13977 13975 403a90 5 API calls ctype 13975->13977 13976 401108 13976->13443 13977->13975 13977->13976 13979 401166 13978->13979 13980 40246b 13978->13980 13984 401b11 13979->13984 13981 403a3d 30 API calls 13980->13981 13982 402472 13981->13982 13982->13979 13983 403a63 ctype 29 API calls 13982->13983 13983->13979 13985 401b1b __EH_prolog 13984->13985 14241 405a0f 13985->14241 13988 401b4d 13988->13454 13989 401b49 ctype 13989->13988 14244 405a6c 13989->14244 14248 401f02 13989->14248 13992 40218d 30 API calls 13991->13992 13993 4014c3 13992->13993 13994 4052cf 13993->13994 13995 4052d9 __EH_prolog 13994->13995 13996 40536a 43 API calls 13995->13996 13997 4052e4 13996->13997 13998 4014d4 13997->13998 13999 40218d 30 API calls 13997->13999 13998->13486 13998->13487 14000 4052ff 13999->14000 14307 4050ee 14000->14307 14003 40530e 14005 403a63 ctype 29 API calls 14003->14005 14005->13998 14009 403a63 ctype 29 API calls 14009->14003 14011 413c35 ctype 29 API calls 14010->14011 14012 403a48 14011->14012 14013 403a61 14012->14013 14450 413b0d RaiseException 14012->14450 14013->13503 14016 407f98 __EH_prolog 14015->14016 14017 404349 ctype 34 API calls 14016->14017 14018 407fa7 14017->14018 14020 401d50 30 API calls 14018->14020 14024 401525 14018->14024 14451 40802f 14018->14451 14454 407d8d 14018->14454 14481 4080cf 14018->14481 14489 4020af 14018->14489 14020->14018 14024->13517 14024->13518 14026 40218d 30 API calls 14025->14026 14027 40154c 14026->14027 14027->13530 14029 402f08 __EH_prolog 14028->14029 14567 40335f 14029->14567 14032 401daf 30 API calls 14033 402f3c 14032->14033 14034 401daf 30 API calls 14033->14034 14035 402f4a 14034->14035 14036 403a3d 30 API calls 14035->14036 14037 402f54 14036->14037 14039 402f67 14037->14039 14633 4034cc 14037->14633 14040 403020 14039->14040 14041 402f83 14039->14041 14575 4030fc 14040->14575 14647 412ff0 14041->14647 14044 402fab 14046 402fb1 14044->14046 14047 402fbe 14044->14047 14045 40302b 14048 401daf 30 API calls 14045->14048 14049 412fb0 ctype 2 API calls 14046->14049 14050 40218d 30 API calls 14047->14050 14051 403039 14048->14051 14052 402fb9 14049->14052 14053 402fd1 14050->14053 14051->14052 14055 401daf 30 API calls 14051->14055 14623 403473 14052->14623 14054 405ed1 33 API calls 14053->14054 14056 402fe0 14054->14056 14055->14052 14058 401daf 30 API calls 14056->14058 14060 402fed 14058->14060 14061 403a63 ctype 29 API calls 14060->14061 14062 402ff9 14061->14062 14653 403086 14062->14653 14064 40300a 14065 403a63 ctype 29 API calls 14064->14065 14066 403012 14065->14066 14067 412fb0 ctype 2 API calls 14066->14067 14068 40301e 14067->14068 14068->14045 14070 404f7a __EH_prolog 14069->14070 14071 404f97 GetCurrentDirectoryA 14070->14071 14072 404fee GetCurrentDirectoryW 14070->14072 14074 403bdf 30 API calls 14071->14074 14073 401d50 30 API calls 14072->14073 14083 401611 14073->14083 14075 404fc0 14074->14075 14076 403bca 31 API calls 14075->14076 14077 404fce 14076->14077 14078 401daf 30 API calls 14077->14078 14079 404fda 14078->14079 14080 403a63 ctype 29 API calls 14079->14080 14081 404fe2 14080->14081 14082 403a63 ctype 29 API calls 14081->14082 14082->14083 14084 404f2c 14083->14084 14085 404f61 SetCurrentDirectoryW 14084->14085 14086 404f3b 14084->14086 14085->13579 14087 403b85 31 API calls 14086->14087 14088 404f46 SetCurrentDirectoryA 14087->14088 14089 403a63 ctype 29 API calls 14088->14089 14090 404f5b 14089->14090 14090->13579 14092 401803 14091->14092 14093 405bb8 14091->14093 14092->13625 14093->14092 14094 401ded 30 API calls 14093->14094 14094->14092 14096 401820 14095->14096 14097 401e9e 14095->14097 14096->13654 14097->14096 16197 4023b6 14097->16197 14113 40222b 30 API calls 14112->14113 14114 401132 14113->14114 14115 401daf 14114->14115 14116 40113b 14115->14116 14117 401dbb 14115->14117 14116->13458 14118 40218d 30 API calls 14117->14118 14118->14116 14119->13459 14121 403dee __EH_prolog 14120->14121 14122 404349 ctype 34 API calls 14121->14122 14126 403dff 14122->14126 14123 4011ee 14123->13483 14123->13484 14124 401c9d 30 API calls 14124->14126 14126->14123 14126->14124 14127 403f76 14126->14127 14133 40245b 30 API calls 14126->14133 14134 403f93 14126->14134 14136 4041a9 30 API calls 14126->14136 14143 401f02 30 API calls 14126->14143 14145 403a63 29 API calls ctype 14126->14145 16205 403fc6 14126->16205 16215 404148 14126->16215 16225 40215c 14126->16225 14128 403a63 ctype 29 API calls 14127->14128 14129 403f7e 14128->14129 14130 403a63 ctype 29 API calls 14129->14130 14131 403f86 14130->14131 14132 403a63 ctype 29 API calls 14131->14132 14132->14123 14133->14126 14135 403a63 ctype 29 API calls 14134->14135 14137 403f9b 14135->14137 14136->14126 14138 403a63 ctype 29 API calls 14137->14138 14139 403fa3 14138->14139 14141 403a63 ctype 29 API calls 14139->14141 14142 403fab 14141->14142 14144 403a63 ctype 29 API calls 14142->14144 14143->14126 14144->14123 14145->14126 14147->13661 14149 404115 14148->14149 14150 404119 14149->14150 14151 40412f 14149->14151 14152 40218d 30 API calls 14150->14152 14153 401d16 30 API calls 14151->14153 14154 40122a 14152->14154 14153->14154 14154->13506 14155->13539 14156->13539 16230 405e00 14157->16230 14161 4021e1 30 API calls 14160->14161 14162 401e28 14161->14162 14162->13603 14163->13627 14170 401d6d 14169->14170 14171 40218d 30 API calls 14170->14171 14172 4017c6 14171->14172 14173 4057af 14172->14173 14174 4057b9 __EH_prolog 14173->14174 14175 404d82 30 API calls 14174->14175 14176 4057c8 14175->14176 14177 405620 37 API calls 14176->14177 14178 4057d5 14177->14178 14179 403a63 ctype 29 API calls 14178->14179 14180 4017ce 14179->14180 14180->13592 14180->13622 14194 403bf6 14193->14194 14194->14194 14195 40245b 30 API calls 14194->14195 14196 403c05 14195->14196 14197 403bca 14196->14197 14200 403c26 14197->14200 14201 403c30 __EH_prolog 14200->14201 14202 40218d 30 API calls 14201->14202 14203 403c53 14202->14203 14204 403c9a 14203->14204 14205 403c6b MultiByteToWideChar 14203->14205 14207 40218d 30 API calls 14203->14207 14206 401d16 30 API calls 14204->14206 14205->14204 14208 403c85 14205->14208 14209 403cb0 14206->14209 14207->14205 14213 413b0d RaiseException 14208->14213 14211 403a63 ctype 29 API calls 14209->14211 14212 403bda 14211->14212 14212->13953 14213->14204 14215 4025d1 __EH_prolog 14214->14215 14216 40218d 30 API calls 14215->14216 14217 4025ed 14216->14217 14218 401ded 30 API calls 14217->14218 14219 4025fa 14218->14219 14220 401ded 30 API calls 14219->14220 14221 402604 14220->14221 14222 401ded 30 API calls 14221->14222 14223 40260e 14222->14223 14224 401d16 30 API calls 14223->14224 14225 40261a 14224->14225 14226 403a63 ctype 29 API calls 14225->14226 14227 402622 14226->14227 14227->13962 14230 402235 __EH_prolog 14228->14230 14229 402269 14232 40218d 30 API calls 14229->14232 14230->14229 14231 40225e 14230->14231 14233 401d16 30 API calls 14231->14233 14234 40227c 14232->14234 14236 4010ff 14233->14236 14235 40218d 30 API calls 14234->14235 14237 402289 14235->14237 14236->13974 14238 401d16 30 API calls 14237->14238 14239 4022bd 14238->14239 14240 403a63 ctype 29 API calls 14239->14240 14240->14236 14251 4059ee 14241->14251 14247 405a79 14244->14247 14246 405aa5 14246->13989 14247->14246 14298 405a4a 14247->14298 14303 4024a9 14248->14303 14254 4059d1 14251->14254 14257 405892 14254->14257 14267 405905 14257->14267 14260 4058f7 14260->13989 14261 4058de CreateFileW 14261->14260 14262 4058af 14270 403b85 14262->14270 14265 403a63 ctype 29 API calls 14266 4058db 14265->14266 14266->14260 14268 40590f FindCloseChangeNotification 14267->14268 14269 4058a0 14267->14269 14268->14269 14269->14260 14269->14261 14269->14262 14271 403b8f __EH_prolog 14270->14271 14272 401cb5 30 API calls 14271->14272 14273 403ba2 14272->14273 14278 403d8e 14273->14278 14276 403a63 ctype 29 API calls 14277 403bba CreateFileA 14276->14277 14277->14265 14281 403ccd 14278->14281 14282 403cd7 __EH_prolog 14281->14282 14283 40245b 30 API calls 14282->14283 14284 403cf9 14283->14284 14285 403d5d 14284->14285 14286 403d1a WideCharToMultiByte 14284->14286 14288 40245b 30 API calls 14284->14288 14295 403dae 14285->14295 14286->14285 14289 403d48 14286->14289 14288->14286 14294 413b0d RaiseException 14289->14294 14292 403a63 ctype 29 API calls 14293 403bb2 14292->14293 14293->14276 14294->14285 14296 40245b 30 API calls 14295->14296 14297 403d72 14296->14297 14297->14292 14299 405a57 14298->14299 14302 405a1d ReadFile 14299->14302 14301 405a68 14301->14247 14302->14301 14304 401f0c 14303->14304 14305 4024bd 14303->14305 14304->13989 14306 40245b 30 API calls 14305->14306 14306->14304 14308 4050f8 __EH_prolog 14307->14308 14309 405115 GetTempPathA 14308->14309 14310 40516c GetTempPathW 14308->14310 14311 403bdf 30 API calls 14309->14311 14312 401d50 30 API calls 14310->14312 14313 40513e 14311->14313 14315 405168 14312->14315 14314 403bca 31 API calls 14313->14314 14316 40514c 14314->14316 14315->14003 14322 40485a 14315->14322 14317 401daf 30 API calls 14316->14317 14318 405158 14317->14318 14319 403a63 ctype 29 API calls 14318->14319 14320 405160 14319->14320 14321 403a63 ctype 29 API calls 14320->14321 14321->14315 14323 404864 __EH_prolog 14322->14323 14324 401d16 30 API calls 14323->14324 14325 404877 14324->14325 14346 4048ab 14325->14346 14328 401d16 30 API calls 14329 404891 14328->14329 14330 403a63 ctype 29 API calls 14329->14330 14331 404899 14330->14331 14332 4051b7 GetCurrentThreadId GetTickCount GetCurrentProcessId 14331->14332 14342 4051ea 14332->14342 14333 401d50 30 API calls 14333->14342 14334 4048ab 30 API calls 14334->14342 14336 40526e SetLastError 14336->14342 14337 401ded 30 API calls 14345 40522c 14337->14345 14339 4048ab 30 API calls 14343 405240 GetTickCount 14339->14343 14340 4052b8 14340->14009 14342->14333 14342->14334 14342->14336 14342->14340 14344 405299 GetLastError 14342->14344 14342->14345 14354 405800 14342->14354 14362 4049f4 14342->14362 14370 405ae5 14342->14370 14343->14345 14344->14342 14345->14337 14345->14339 14345->14342 14347 4048c0 14346->14347 14350 4021e1 14347->14350 14351 402225 14350->14351 14352 4021f5 14350->14352 14351->14328 14353 40218d 30 API calls 14352->14353 14353->14351 14355 40580a __EH_prolog 14354->14355 14373 404d82 14355->14373 14360 403a63 ctype 29 API calls 14361 405830 14360->14361 14361->14342 14363 404a03 14362->14363 14364 404a29 CreateDirectoryW 14362->14364 14366 403b85 31 API calls 14363->14366 14365 404a34 14364->14365 14365->14342 14367 404a0e CreateDirectoryA 14366->14367 14368 403a63 ctype 29 API calls 14367->14368 14369 404a23 14368->14369 14369->14365 14444 405ace 14370->14444 14374 40218d 30 API calls 14373->14374 14375 404d99 14374->14375 14376 405620 14375->14376 14377 40562a __EH_prolog 14376->14377 14411 405434 14377->14411 14380 405653 GetLastError 14382 405661 14380->14382 14381 405414 FindClose 14410 405773 14381->14410 14383 401cb5 30 API calls 14382->14383 14389 40564c 14382->14389 14384 4056d3 14383->14384 14385 405788 14384->14385 14386 401cb5 30 API calls 14384->14386 14387 403a63 ctype 29 API calls 14385->14387 14388 4056f0 14386->14388 14387->14389 14390 405705 14388->14390 14391 401ded 30 API calls 14388->14391 14389->14381 14392 401ded 30 API calls 14390->14392 14391->14390 14393 40570f 14392->14393 14394 405434 35 API calls 14393->14394 14395 40571e 14394->14395 14396 405777 SetLastError 14395->14396 14398 405736 14395->14398 14397 403a63 ctype 29 API calls 14396->14397 14397->14385 14399 40222b 30 API calls 14398->14399 14400 405744 14399->14400 14401 401daf 30 API calls 14400->14401 14402 405750 14401->14402 14403 403a63 ctype 29 API calls 14402->14403 14404 405758 14403->14404 14405 403a63 ctype 29 API calls 14404->14405 14406 405760 14405->14406 14407 403a63 ctype 29 API calls 14406->14407 14408 405768 14407->14408 14425 405414 14408->14425 14410->14360 14412 405414 FindClose 14411->14412 14413 405445 14412->14413 14414 4054a4 14413->14414 14415 405452 14413->14415 14416 40548d FindFirstFileW 14413->14416 14414->14380 14414->14389 14417 403b85 31 API calls 14415->14417 14416->14414 14418 4054a8 14416->14418 14419 40545d FindFirstFileA 14417->14419 14440 4054bd 14418->14440 14421 403a63 ctype 29 API calls 14419->14421 14422 405477 14421->14422 14422->14414 14428 40551c 14422->14428 14426 40541e FindClose 14425->14426 14427 405429 14425->14427 14426->14427 14427->14410 14429 405526 __EH_prolog 14428->14429 14430 403bdf 30 API calls 14429->14430 14431 405584 14430->14431 14432 403bca 31 API calls 14431->14432 14433 405592 14432->14433 14434 401daf 30 API calls 14433->14434 14435 40559f 14434->14435 14436 403a63 ctype 29 API calls 14435->14436 14437 4055a7 14436->14437 14438 403a63 ctype 29 API calls 14437->14438 14439 40548b 14438->14439 14439->14414 14441 4054fb 14440->14441 14442 401d50 30 API calls 14441->14442 14443 405518 14442->14443 14443->14414 14447 405ab1 14444->14447 14448 405892 34 API calls 14447->14448 14449 405acb 14448->14449 14449->14342 14450->14013 14452 40218d 30 API calls 14451->14452 14453 40804f 14452->14453 14453->14018 14455 407d97 __EH_prolog 14454->14455 14456 401cb5 30 API calls 14455->14456 14470 407dee 14455->14470 14457 407dd3 14456->14457 14497 407ee9 14457->14497 14458 401cb5 30 API calls 14462 407dff 14458->14462 14459 407e9f 14461 404349 ctype 34 API calls 14459->14461 14465 407eae 14461->14465 14466 407ee9 35 API calls 14462->14466 14463 401c9d 30 API calls 14480 407e1a 14463->14480 14468 404320 ctype 34 API calls 14465->14468 14469 407e0e 14466->14469 14467 403a63 ctype 29 API calls 14467->14470 14471 407eba 14468->14471 14472 403a63 ctype 29 API calls 14469->14472 14470->14458 14470->14480 14473 404349 ctype 34 API calls 14471->14473 14472->14480 14475 407ecc 14473->14475 14474 401daf 30 API calls 14474->14480 14476 404320 ctype 34 API calls 14475->14476 14477 407ed8 14476->14477 14477->14018 14479 403a63 29 API calls ctype 14479->14480 14480->14459 14480->14463 14480->14474 14480->14479 14510 40806e 14480->14510 14482 4080d9 __EH_prolog 14481->14482 14483 403a3d 30 API calls 14482->14483 14484 4080e4 14483->14484 14485 4080fb 14484->14485 14550 408116 14484->14550 14486 40a528 30 API calls 14485->14486 14488 408107 14486->14488 14488->14018 14490 4020b9 __EH_prolog 14489->14490 14491 404349 ctype 34 API calls 14490->14491 14492 4020dd 14491->14492 14493 404320 ctype 34 API calls 14492->14493 14494 4020e8 14493->14494 14495 403a63 ctype 29 API calls 14494->14495 14496 4020f0 14495->14496 14496->14018 14498 407ef3 __EH_prolog 14497->14498 14499 404349 ctype 34 API calls 14498->14499 14500 407f05 14499->14500 14501 40218d 30 API calls 14500->14501 14506 407f1a 14501->14506 14502 407f76 14503 403a63 ctype 29 API calls 14502->14503 14505 407de2 14503->14505 14504 407f65 14504->14502 14508 403981 30 API calls 14504->14508 14505->14467 14506->14502 14506->14504 14507 401ded 30 API calls 14506->14507 14520 403981 14506->14520 14507->14506 14508->14502 14511 408078 __EH_prolog 14510->14511 14512 403a3d 30 API calls 14511->14512 14513 408084 14512->14513 14514 4080ae 14513->14514 14515 401d16 30 API calls 14513->14515 14516 40a528 30 API calls 14514->14516 14517 40809e 14515->14517 14518 4080bf 14516->14518 14519 401d16 30 API calls 14517->14519 14518->14480 14519->14514 14521 40398b __EH_prolog 14520->14521 14522 403a3d 30 API calls 14521->14522 14523 403996 14522->14523 14524 4039ad 14523->14524 14525 401d16 30 API calls 14523->14525 14528 40a528 14524->14528 14525->14524 14531 404372 14528->14531 14532 4039b9 14531->14532 14533 40437a 14531->14533 14532->14506 14535 40439a 14533->14535 14536 40443e 14535->14536 14537 4043ae 14535->14537 14536->14532 14538 4043cb 14537->14538 14547 413b0d RaiseException 14537->14547 14540 4043f2 14538->14540 14548 413b0d RaiseException 14538->14548 14543 403a3d 30 API calls 14540->14543 14545 40441a 14540->14545 14542 403a63 ctype 29 API calls 14542->14536 14544 4043fe 14543->14544 14544->14545 14549 413b0d RaiseException 14544->14549 14545->14542 14547->14538 14548->14540 14549->14545 14551 408120 __EH_prolog 14550->14551 14552 401d16 30 API calls 14551->14552 14553 408147 14552->14553 14556 40816f 14553->14556 14557 408179 __EH_prolog 14556->14557 14558 404349 ctype 34 API calls 14557->14558 14559 4081a0 14558->14559 14562 4081bb 14559->14562 14563 40439a 30 API calls 14562->14563 14566 4081d3 14563->14566 14564 408157 14564->14485 14565 40806e 30 API calls 14565->14566 14566->14564 14566->14565 14568 403369 __EH_prolog 14567->14568 14569 40218d 30 API calls 14568->14569 14570 403385 14569->14570 14571 40218d 30 API calls 14570->14571 14572 40339a 14571->14572 14573 40218d 30 API calls 14572->14573 14574 402f27 14573->14574 14574->14032 14576 403106 __EH_prolog 14575->14576 14577 401c9d 30 API calls 14576->14577 14578 403116 14577->14578 14579 405620 37 API calls 14578->14579 14580 403126 14579->14580 14581 40312a 14580->14581 14584 403141 14580->14584 14582 401d50 30 API calls 14581->14582 14583 403138 14582->14583 14585 403a63 ctype 29 API calls 14583->14585 14667 408d5e 14584->14667 14618 4031aa 14585->14618 14588 404320 ctype 34 API calls 14589 40318f 14588->14589 14590 403194 14589->14590 14591 4031af 14589->14591 14593 401d50 30 API calls 14590->14593 14592 401d16 30 API calls 14591->14592 14594 4031bb 14592->14594 14593->14583 14595 405bad 30 API calls 14594->14595 14596 4031c7 14595->14596 14702 404a3e 14596->14702 14599 403213 14601 401cb5 30 API calls 14599->14601 14600 4031d3 14829 4092e6 14600->14829 14603 403220 14601->14603 14737 402686 14603->14737 14609 403a63 ctype 29 API calls 14611 403252 14609->14611 14744 40bff7 14611->14744 14780 40b98f 14611->14780 14614 40326d 14616 403a63 ctype 29 API calls 14614->14616 14619 403278 14616->14619 14618->14045 14624 40347d __EH_prolog 14623->14624 14625 403a63 ctype 29 API calls 14624->14625 14626 403493 14625->14626 16060 403405 14626->16060 14629 403a63 ctype 29 API calls 14630 4034b5 14629->14630 14631 403a63 ctype 29 API calls 14630->14631 14632 401580 14631->14632 14632->13541 14632->13542 14634 4034d6 __EH_prolog 14633->14634 14635 40218d 30 API calls 14634->14635 14636 403508 14635->14636 14637 40218d 30 API calls 14636->14637 14638 40351e 14637->14638 14639 40218d 30 API calls 14638->14639 14640 403534 14639->14640 14641 40218d 30 API calls 14640->14641 14642 40354d 14641->14642 16070 40358f 14642->16070 14645 40218d 30 API calls 14646 403572 14645->14646 14646->14039 16089 41468e 14647->16089 14650 413013 14650->14044 14651 413018 GetLastError 14652 413022 14651->14652 14652->14044 14654 403090 __EH_prolog 14653->14654 14655 401daf 30 API calls 14654->14655 14656 4030a5 14655->14656 16161 4060e5 14656->16161 14660 4030bd 14661 405ed1 33 API calls 14660->14661 14662 4030c8 14661->14662 16181 405eeb 14662->16181 14665 403a63 ctype 29 API calls 14666 4030de ShowWindow 14665->14666 14666->14064 14668 408d68 __EH_prolog 14667->14668 14669 403a3d 30 API calls 14668->14669 14670 408d82 14669->14670 14671 408d94 14670->14671 14895 408f0b 14670->14895 14673 40218d 30 API calls 14671->14673 14674 408dcb 14673->14674 14675 40218d 30 API calls 14674->14675 14676 408de2 14675->14676 14684 408e11 14676->14684 14837 405039 14676->14837 14682 408e65 14686 402635 30 API calls 14682->14686 14683 408e3e 14685 403a63 ctype 29 API calls 14683->14685 14869 40888f 14684->14869 14687 408e46 14685->14687 14688 408e74 14686->14688 14689 403a63 ctype 29 API calls 14687->14689 14690 403981 30 API calls 14688->14690 14700 403181 14689->14700 14691 408e81 14690->14691 14692 403a63 ctype 29 API calls 14691->14692 14696 408e8d 14692->14696 14693 408ec6 14695 403a63 ctype 29 API calls 14693->14695 14694 402635 30 API calls 14694->14696 14697 408ee0 14695->14697 14696->14693 14696->14694 14698 403981 30 API calls 14696->14698 14701 403a63 ctype 29 API calls 14696->14701 14699 403a63 ctype 29 API calls 14697->14699 14698->14696 14699->14700 14700->14588 14701->14696 14703 404a48 __EH_prolog 14702->14703 14704 401cb5 30 API calls 14703->14704 14707 404a56 14704->14707 14705 401d16 30 API calls 14730 404ab4 14705->14730 14706 4049f4 33 API calls 14706->14730 14707->14705 14711 404a96 14707->14711 14708 404acb GetLastError 14712 404b47 14708->14712 14708->14730 14709 404b9e 14710 401daf 30 API calls 14709->14710 14728 404bab 14710->14728 14716 403a63 ctype 29 API calls 14711->14716 14714 401c9d 30 API calls 14712->14714 14713 404c00 14717 403a63 ctype 29 API calls 14713->14717 14715 404b4f 14714->14715 14718 405620 37 API calls 14715->14718 14719 4031cf 14716->14719 14717->14711 14720 404b5e 14718->14720 14719->14599 14719->14600 14721 404b62 14720->14721 14722 404b92 14720->14722 14723 403a63 ctype 29 API calls 14721->14723 14725 403a63 ctype 29 API calls 14722->14725 14726 404b7a 14723->14726 14724 401e6f 30 API calls 14724->14728 14725->14709 14729 403a63 ctype 29 API calls 14726->14729 14727 401e6f 30 API calls 14727->14730 14728->14713 14728->14724 14731 4049f4 33 API calls 14728->14731 14735 403a63 ctype 29 API calls 14728->14735 14732 404b82 14729->14732 14730->14706 14730->14708 14730->14709 14730->14713 14730->14727 14733 401daf 30 API calls 14730->14733 14736 403a63 ctype 29 API calls 14730->14736 14731->14728 14734 403a63 ctype 29 API calls 14732->14734 14733->14730 14734->14719 14735->14728 14736->14730 14738 401daf 30 API calls 14737->14738 14739 4026ad 14738->14739 14740 401daf 30 API calls 14739->14740 14741 4026d9 14740->14741 14742 405bad 30 API calls 14741->14742 14743 4026e0 14742->14743 14743->14609 14760 40bbbd 14744->14760 14745 40bbe2 14747 40c146 34 API calls 14745->14747 14746 40bc3e 15389 40c146 14746->15389 14749 40bc02 14747->14749 14748 403a3d 30 API calls 14748->14760 14751 404349 ctype 34 API calls 14749->14751 14757 40bc21 14757->14614 14759 40bd0b 14761 40c146 34 API calls 14759->14761 14760->14745 14760->14746 14760->14748 14760->14757 14760->14759 14767 40beb9 14760->14767 14768 40be1f 14760->14768 14769 40be7b 14760->14769 14770 40c820 62 API calls 14760->14770 14773 40bf1c 14760->14773 15399 40c50e 14760->15399 15403 40ab05 14760->15403 15516 40c3ae 14760->15516 14762 40bd3c 14761->14762 14764 404349 ctype 34 API calls 14762->14764 14771 40c146 34 API calls 14767->14771 14774 40c146 34 API calls 14768->14774 14775 40c146 34 API calls 14769->14775 14770->14760 14772 40be49 14771->14772 14776 404349 ctype 34 API calls 14772->14776 14777 40c146 34 API calls 14773->14777 14774->14772 14775->14772 14777->14772 14792 40b999 __EH_prolog 14780->14792 14781 40bb14 14783 40bb56 14781->14783 14784 40bb29 14781->14784 14788 403a3d 30 API calls 14783->14788 14785 404349 ctype 34 API calls 14784->14785 14787 40bb3c 14785->14787 14786 40c233 35 API calls 14786->14792 14789 404320 ctype 34 API calls 14787->14789 14817 40bb7a 14788->14817 14806 40b9e9 14789->14806 14790 404320 34 API calls ctype 14790->14792 14791 40c1d9 30 API calls 14791->14792 14792->14781 14792->14786 14792->14790 14792->14791 14792->14806 16035 40c0d4 14792->16035 16041 40c047 14792->16041 14794 40bbe2 14795 40bc3e 14797 403a3d 30 API calls 14797->14817 14803 40c3ae 30 API calls 14803->14817 14806->14614 14807 40c50e 62 API calls 14807->14817 14808 40bd0b 14811 40ab05 96 API calls 14811->14817 14815 40beb9 14816 40be1f 14817->14794 14817->14795 14817->14797 14817->14803 14817->14806 14817->14807 14817->14808 14817->14811 14817->14815 14817->14816 14818 40be7b 14817->14818 14819 40c820 62 API calls 14817->14819 14822 40bf1c 14817->14822 14819->14817 14830 4092f0 __EH_prolog 14829->14830 14831 405ed1 33 API calls 14830->14831 14832 409302 14831->14832 16046 409273 14832->16046 14838 405043 __EH_prolog 14837->14838 14903 404e2e 14838->14903 14841 405066 14843 401e6f 30 API calls 14841->14843 14854 4050d9 14841->14854 14842 401d50 30 API calls 14842->14841 14844 40509d 14843->14844 14845 401daf 30 API calls 14844->14845 14846 4050a9 14845->14846 14847 403a63 ctype 29 API calls 14846->14847 14848 4050b5 14847->14848 14849 401e4e 30 API calls 14848->14849 14850 4050c2 14849->14850 14851 401daf 30 API calls 14850->14851 14852 4050d1 14851->14852 14853 403a63 ctype 29 API calls 14852->14853 14853->14854 14855 409070 14854->14855 14856 40907a __EH_prolog 14855->14856 14857 401daf 30 API calls 14856->14857 14858 40908f 14857->14858 14859 402635 30 API calls 14858->14859 14860 40909c 14859->14860 14861 405620 37 API calls 14860->14861 14862 4090ab 14861->14862 14863 403a63 ctype 29 API calls 14862->14863 14864 4090bf 14863->14864 14865 4090d9 14864->14865 14923 413b0d RaiseException 14864->14923 14867 404349 ctype 34 API calls 14865->14867 14868 4090e1 14867->14868 14868->14684 14892 408899 __EH_prolog 14869->14892 14870 408cf4 30 API calls 14870->14892 14871 408b4f 14874 405cd6 VariantClear 14871->14874 14872 401daf 30 API calls 14872->14892 14873 408cc9 14876 405cd6 VariantClear 14873->14876 14884 4088b5 14874->14884 14876->14884 14877 408b3c 15034 4038ab 14877->15034 14879 409177 30 API calls 14879->14892 14882 408b62 14883 4038ab 29 API calls 14882->14883 14883->14884 14884->14682 14884->14683 14886 408ba9 14889 4038ab 29 API calls 14886->14889 14887 408c02 14890 4038ab 29 API calls 14887->14890 14889->14884 14890->14884 14891 408c5a 14893 4038ab 29 API calls 14891->14893 14892->14870 14892->14871 14892->14872 14892->14873 14892->14877 14892->14879 14892->14882 14892->14884 14892->14886 14892->14887 14892->14891 14894 4038ab 29 API calls 14892->14894 14924 408755 14892->14924 14937 405cd6 14892->14937 14941 4081f4 14892->14941 14966 4083ab 14892->14966 15030 408313 14892->15030 14893->14884 14894->14892 14896 408f15 __EH_prolog 14895->14896 14897 40218d 30 API calls 14896->14897 14898 408f48 14897->14898 14899 404d82 30 API calls 14898->14899 14900 408f53 14899->14900 14901 40218d 30 API calls 14900->14901 14902 408f69 14901->14902 14902->14671 14904 404e38 __EH_prolog 14903->14904 14905 404e59 14904->14905 14906 404edd GetFullPathNameW 14904->14906 14907 403b85 31 API calls 14905->14907 14908 404f02 14906->14908 14909 404ed9 14906->14909 14910 404e6c GetFullPathNameA 14907->14910 14908->14909 14912 401d50 30 API calls 14908->14912 14909->14841 14909->14842 14911 403a63 ctype 29 API calls 14910->14911 14913 404e8f 14911->14913 14912->14909 14913->14909 14914 403bdf 30 API calls 14913->14914 14915 404eaf 14914->14915 14916 403bca 31 API calls 14915->14916 14917 404ebd 14916->14917 14918 401daf 30 API calls 14917->14918 14919 404ec9 14918->14919 14920 403a63 ctype 29 API calls 14919->14920 14921 404ed1 14920->14921 14922 403a63 ctype 29 API calls 14921->14922 14922->14909 14923->14865 14925 40875f __EH_prolog 14924->14925 14926 40877a 14925->14926 14927 40879e 14925->14927 14928 403a3d 30 API calls 14926->14928 14929 408781 14927->14929 14931 403a3d 30 API calls 14927->14931 14928->14929 14930 4083ab 101 API calls 14929->14930 14932 40880c 14930->14932 14933 4087aa 14931->14933 14932->14892 14934 405a0f 34 API calls 14933->14934 14935 4087e4 14934->14935 14935->14929 14936 4087e8 GetLastError 14935->14936 14936->14932 14940 405cdb 14937->14940 14938 405d13 14938->14892 14939 405cfc VariantClear 14939->14892 14940->14938 14940->14939 14942 4081fe __EH_prolog 14941->14942 14943 40822a 14942->14943 14944 40823d 14942->14944 14945 405cd6 VariantClear 14943->14945 14946 408253 14944->14946 14947 408244 14944->14947 14964 408236 14945->14964 14949 4082f1 14946->14949 14950 408251 14946->14950 14948 401d50 30 API calls 14947->14948 14948->14950 14951 405cd6 VariantClear 14949->14951 14952 405cd6 VariantClear 14950->14952 14951->14964 14953 408274 14952->14953 14954 401daf 30 API calls 14953->14954 14953->14964 14955 408284 14954->14955 14956 4082a8 14955->14956 14957 4082b3 14955->14957 14958 4082d6 14955->14958 14961 405cd6 VariantClear 14956->14961 14959 401ded 30 API calls 14957->14959 14958->14956 14960 4082c6 14958->14960 14962 4082bc 14959->14962 14963 405cd6 VariantClear 14960->14963 14961->14964 14965 4048ab 30 API calls 14962->14965 14963->14964 14964->14892 14965->14960 14968 4083b5 __EH_prolog 14966->14968 15041 4045d0 14968->15041 14970 40218d 30 API calls 14972 4083f7 14970->14972 14971 40844b 14973 408466 14971->14973 14985 408476 14971->14985 14972->14971 14977 401e4e 30 API calls 14972->14977 14975 40a528 30 API calls 14973->14975 14974 4084c3 14980 40435e ctype 34 API calls 14974->14980 14992 408471 14974->14992 15021 4084cf 14974->15021 14975->14992 14978 408432 14977->14978 14979 401daf 30 API calls 14978->14979 14982 40843f 14979->14982 14980->14992 14986 403a63 ctype 29 API calls 14982->14986 14983 40a528 30 API calls 14983->14985 14984 404320 ctype 34 API calls 14987 4085c9 14984->14987 14985->14974 14985->14983 15079 407d59 14985->15079 15083 40447a 14985->15083 14986->14971 14988 403a63 ctype 29 API calls 14987->14988 14989 4085d1 14988->14989 14990 403a63 ctype 29 API calls 14989->14990 14991 4085d9 14990->14991 14991->14892 14993 4085f2 14992->14993 14997 408628 14992->14997 14992->15021 15045 40647d 14992->15045 15051 40cf82 14992->15051 15071 40dd29 14992->15071 14994 404320 ctype 34 API calls 14993->14994 14995 40860f 14994->14995 14996 403a63 ctype 29 API calls 14995->14996 14999 408617 14996->14999 14998 40867f 14997->14998 15002 401d50 30 API calls 14997->15002 14997->15021 15000 405cd6 VariantClear 14998->15000 15001 403a63 ctype 29 API calls 14999->15001 15003 40868b 15000->15003 15001->14991 15002->14998 15004 408700 15003->15004 15005 4086a4 15003->15005 15006 407d59 5 API calls 15004->15006 15007 401cb5 30 API calls 15005->15007 15008 40870b 15006->15008 15009 4086b2 15007->15009 15011 407bd5 35 API calls 15008->15011 15010 401cb5 30 API calls 15009->15010 15012 4086bf 15010->15012 15013 408727 15011->15013 15086 407bd5 15012->15086 15015 401daf 30 API calls 15013->15015 15017 408734 15015->15017 15019 403a63 ctype 29 API calls 15017->15019 15018 401daf 30 API calls 15020 4086e3 15018->15020 15019->15021 15021->14984 15031 40831d __EH_prolog 15030->15031 15032 405cd6 VariantClear 15031->15032 15033 408398 15032->15033 15033->14892 15035 403a63 ctype 29 API calls 15034->15035 15036 4038b6 15035->15036 15037 403a63 ctype 29 API calls 15036->15037 15038 4038be 15037->15038 15039 403a63 ctype 29 API calls 15038->15039 15040 4038c6 15039->15040 15040->14884 15042 4045e0 15041->15042 15043 401e4e 30 API calls 15042->15043 15044 404605 15043->15044 15044->14970 15046 40648d 15045->15046 15047 406486 15045->15047 15096 405970 SetFilePointer 15046->15096 15047->14992 15052 40cf8c __EH_prolog 15051->15052 15053 40dd29 34 API calls 15052->15053 15054 40cfdf 15053->15054 15055 40cfe5 15054->15055 15056 40d006 15054->15056 15107 40d0a6 15055->15107 15103 40f6e0 15056->15103 15060 40d038 15061 40d019 15070 40cff1 15070->14992 15072 40dd3b 15071->15072 15077 40647d 3 API calls 15072->15077 15073 40dd4f 15074 40dd86 15073->15074 15078 40647d 3 API calls 15073->15078 15074->14992 15075 40dd63 15075->15074 15345 40db62 15075->15345 15077->15073 15078->15075 15080 407d81 15079->15080 15082 407d64 15079->15082 15080->14985 15081 403b38 ctype 5 API calls 15081->15082 15082->15080 15082->15081 15084 404372 30 API calls 15083->15084 15085 404482 15084->15085 15085->14985 15087 407bdf __EH_prolog 15086->15087 15364 407c28 15087->15364 15090 40237b 30 API calls 15091 407c03 15090->15091 15092 401d16 30 API calls 15091->15092 15093 407c0e 15092->15093 15094 403a63 ctype 29 API calls 15093->15094 15095 407c16 15094->15095 15095->15018 15097 4059a3 15096->15097 15098 405999 GetLastError 15096->15098 15099 4063ff 15097->15099 15098->15097 15100 406403 15099->15100 15101 406406 GetLastError 15099->15101 15100->15047 15102 406410 15101->15102 15102->15047 15104 40f6ea __EH_prolog 15103->15104 15139 40f449 15104->15139 15108 40d0b0 __EH_prolog 15107->15108 15109 404349 ctype 34 API calls 15108->15109 15110 40d0d4 15109->15110 15111 404320 ctype 34 API calls 15110->15111 15112 40d0df 15111->15112 15112->15070 15140 40f453 __EH_prolog 15139->15140 15179 40d14e 15140->15179 15144 40f495 15145 40d91e RaiseException 15144->15145 15147 40f4ca 15144->15147 15145->15147 15146 40d012 15146->15060 15146->15061 15147->15146 15178 40647d 3 API calls 15147->15178 15148 40f53d 15148->15146 15178->15148 15180 40d1a9 34 API calls 15179->15180 15181 40d156 15180->15181 15182 404349 ctype 34 API calls 15181->15182 15183 40d161 15182->15183 15184 404349 ctype 34 API calls 15183->15184 15185 40d16c 15184->15185 15186 404349 ctype 34 API calls 15185->15186 15187 40d177 15186->15187 15188 404349 ctype 34 API calls 15187->15188 15189 40d182 15188->15189 15190 404349 ctype 34 API calls 15189->15190 15191 40d18d 15190->15191 15191->15144 15252 40d91e 15191->15252 15253 413b0d RaiseException 15252->15253 15254 40d936 15253->15254 15255 40d946 15254->15255 15256 40d91e RaiseException 15254->15256 15255->15144 15256->15255 15346 40db6c __EH_prolog 15345->15346 15347 407689 2 API calls 15346->15347 15349 40db83 15347->15349 15348 40db98 15348->15074 15349->15348 15350 4075ef 30 API calls 15349->15350 15355 40dbbc ctype 15350->15355 15351 40dc78 15352 403a63 ctype 29 API calls 15351->15352 15352->15348 15353 40dc8d 15354 403a63 ctype 29 API calls 15353->15354 15354->15348 15355->15351 15355->15353 15356 40dc90 15355->15356 15359 4063d0 15355->15359 15357 40647d 3 API calls 15356->15357 15357->15353 15360 405a4a ReadFile 15359->15360 15361 4063e8 15360->15361 15362 4063ff GetLastError 15361->15362 15363 4063fb 15362->15363 15363->15355 15366 407c32 __EH_prolog 15364->15366 15365 407d08 15367 407d11 15365->15367 15368 407d22 15365->15368 15369 401e4e 30 API calls 15366->15369 15371 407cb6 15366->15371 15370 40485a 30 API calls 15367->15370 15372 402635 30 API calls 15368->15372 15373 407c6e 15369->15373 15387 407bf7 15370->15387 15371->15365 15375 407ce1 15371->15375 15372->15387 15374 403b38 ctype 5 API calls 15373->15374 15376 407c7b 15374->15376 15377 401e6f 30 API calls 15375->15377 15378 403a63 ctype 29 API calls 15376->15378 15379 407ced 15377->15379 15380 407c8c 15378->15380 15381 402635 30 API calls 15379->15381 15380->15371 15382 407c91 15380->15382 15388 407cb1 15381->15388 15383 401e6f 30 API calls 15382->15383 15384 407c9d 15383->15384 15386 402635 30 API calls 15384->15386 15385 403a63 ctype 29 API calls 15385->15387 15386->15388 15387->15090 15388->15385 15390 40c150 __EH_prolog 15389->15390 15391 404349 ctype 34 API calls 15390->15391 15400 40c537 15399->15400 15520 40c6d6 15400->15520 15404 40ab0f __EH_prolog 15403->15404 15761 40d5a3 15404->15761 15517 40c3b8 __EH_prolog 15516->15517 15518 403a3d 30 API calls 15517->15518 15519 40c3f0 15518->15519 15519->14760 15521 40c6d9 15520->15521 15522 40c552 15521->15522 15524 40c557 15521->15524 15522->14760 15762 40d5ad __EH_prolog 15761->15762 16036 40c0de __EH_prolog 16035->16036 16037 40c12c 16036->16037 16038 40439a 30 API calls 16036->16038 16037->14792 16039 40c123 16038->16039 16042 40c056 16041->16042 16044 40c05c 16041->16044 16042->14792 16044->16042 16045 413b0d RaiseException 16044->16045 16045->16042 16047 40927d __EH_prolog 16046->16047 16048 401d16 30 API calls 16047->16048 16049 409290 16048->16049 16050 401cb5 30 API calls 16049->16050 16051 4092a1 16050->16051 16052 401e8b 30 API calls 16051->16052 16053 4092b4 16052->16053 16054 403a63 ctype 29 API calls 16053->16054 16055 4092c0 16054->16055 16056 401d16 30 API calls 16055->16056 16057 4092cc 16056->16057 16058 403a63 ctype 29 API calls 16057->16058 16061 40340f __EH_prolog 16060->16061 16062 404349 ctype 34 API calls 16061->16062 16063 40343b 16062->16063 16064 404320 ctype 34 API calls 16063->16064 16065 403446 16064->16065 16066 404349 ctype 34 API calls 16065->16066 16067 40345a 16066->16067 16068 404320 ctype 34 API calls 16067->16068 16069 403465 16068->16069 16069->14629 16071 403599 __EH_prolog 16070->16071 16072 40218d 30 API calls 16071->16072 16073 4035c6 16072->16073 16080 40364c 16073->16080 16077 4035fd 16078 403559 16077->16078 16087 413b0d RaiseException 16077->16087 16078->14645 16088 4130e0 InitializeCriticalSection 16080->16088 16082 4035da 16083 413070 CreateEventA 16082->16083 16084 413091 GetLastError 16083->16084 16085 41308e 16083->16085 16086 41309b 16084->16086 16085->16077 16086->16077 16087->16078 16088->16082 16090 416ccc 30 API calls 16089->16090 16091 41469e 16090->16091 16092 4146e1 16091->16092 16094 4146ac CreateThread 16091->16094 16093 413d6f ctype 29 API calls 16092->16093 16096 4146e7 16093->16096 16095 413009 16094->16095 16097 4146d9 GetLastError 16094->16097 16119 4146f9 TlsGetValue 16094->16119 16095->14650 16095->14651 16096->16095 16099 416c47 16096->16099 16097->16092 16116 416cc3 16099->16116 16102 416c80 16103 416cba 35 API calls 16102->16103 16105 416c85 16103->16105 16104 416c69 16106 416c90 16104->16106 16108 416c73 16104->16108 16105->16095 16107 416cad 16106->16107 16110 416ca0 16106->16110 16111 416cba 35 API calls 16107->16111 16109 416cba 35 API calls 16108->16109 16112 416c78 16109->16112 16113 416cba 35 API calls 16110->16113 16114 416cb2 16111->16114 16112->16095 16115 416ca5 16113->16115 16114->16095 16115->16095 16117 4152f3 35 API calls 16116->16117 16118 416c4d 16117->16118 16118->16102 16118->16104 16120 414731 16119->16120 16121 414746 TlsSetValue 16119->16121 16139 41535a 16120->16139 16124 414765 GetCurrentThreadId 16121->16124 16125 41475d 16121->16125 16127 414776 16124->16127 16126 4149dc ctype 7 API calls 16125->16126 16128 414764 16126->16128 16131 4147bf 16127->16131 16128->16124 16132 4147c8 16131->16132 16133 4152f3 35 API calls 16132->16133 16134 4147d0 16133->16134 16135 4147dd 16134->16135 16136 4149dc ctype 7 API calls 16134->16136 16137 41535a 31 API calls 16135->16137 16136->16135 16138 4147e4 ExitThread 16137->16138 16140 4153f9 16139->16140 16141 415368 16139->16141 16140->16121 16142 415371 TlsGetValue 16141->16142 16143 41537e 16141->16143 16142->16143 16144 4153ea TlsSetValue 16142->16144 16145 41538b 16143->16145 16146 413d6f ctype 29 API calls 16143->16146 16144->16140 16147 413d6f ctype 29 API calls 16145->16147 16149 415399 16145->16149 16146->16145 16147->16149 16148 4153a7 16151 413d6f ctype 29 API calls 16148->16151 16153 4153b5 16148->16153 16149->16148 16150 413d6f ctype 29 API calls 16149->16150 16150->16148 16151->16153 16152 4153c3 16155 4153d1 16152->16155 16156 413d6f ctype 29 API calls 16152->16156 16153->16152 16154 413d6f ctype 29 API calls 16153->16154 16154->16152 16157 4153e2 16155->16157 16159 413d6f ctype 29 API calls 16155->16159 16156->16155 16158 413d6f ctype 29 API calls 16157->16158 16160 4153e9 16158->16160 16159->16157 16160->16144 16162 4060ef __EH_prolog 16161->16162 16163 406100 DialogBoxParamW 16162->16163 16164 40611a 16162->16164 16170 4030b3 16163->16170 16165 40245b 30 API calls 16164->16165 16166 40612d 16165->16166 16167 406174 DialogBoxParamA 16166->16167 16169 401cb5 30 API calls 16166->16169 16168 403a63 ctype 29 API calls 16167->16168 16168->16170 16171 406143 16169->16171 16180 412fe0 WaitForSingleObject 16170->16180 16172 401a66 31 API calls 16171->16172 16173 406152 16172->16173 16193 405f5d 16173->16193 16176 403a63 ctype 29 API calls 16177 406167 16176->16177 16178 403a63 ctype 29 API calls 16177->16178 16179 40616f 16178->16179 16179->16167 16180->14660 16182 405ef5 __EH_prolog 16181->16182 16183 405f16 16182->16183 16184 405f07 SetWindowTextW 16182->16184 16185 401cb5 30 API calls 16183->16185 16192 4030d6 16184->16192 16186 405f1e 16185->16186 16187 403d8e 31 API calls 16186->16187 16188 405f2d SetWindowTextA 16187->16188 16189 403a63 ctype 29 API calls 16188->16189 16190 405f43 16189->16190 16191 403a63 ctype 29 API calls 16190->16191 16191->16192 16192->14665 16194 405f69 16193->16194 16196 405f7a 16193->16196 16195 40245b 30 API calls 16194->16195 16195->16196 16196->16176 16198 4023c5 16197->16198 16199 4023de 16198->16199 16201 40257d 16198->16201 16199->14097 16202 40258d 16201->16202 16206 403fd0 __EH_prolog 16205->16206 16207 40245b 30 API calls 16206->16207 16209 403ff3 16207->16209 16208 404024 16210 403dae 30 API calls 16208->16210 16209->16208 16211 401f02 30 API calls 16209->16211 16212 404030 16210->16212 16211->16209 16213 403a63 ctype 29 API calls 16212->16213 16214 404038 16213->16214 16214->14126 16216 404152 __EH_prolog 16215->16216 16217 403a3d 30 API calls 16216->16217 16218 40415e 16217->16218 16219 401d16 30 API calls 16218->16219 16224 404188 16218->16224 16220 404178 16219->16220 16222 401d16 30 API calls 16220->16222 16221 40a528 30 API calls 16223 404199 16221->16223 16222->16224 16223->14126 16224->16221 16226 403a63 ctype 29 API calls 16225->16226 16227 402167 16226->16227 16228 403a63 ctype 29 API calls 16227->16228 16229 40216e 16228->16229 16229->14126 16231 405e0a __EH_prolog 16230->16231 16232 405e21 16231->16232 16233 405e9a 16231->16233 16235 40218d 30 API calls 16232->16235 16246 405d5e 16233->16246 16237 405e35 16235->16237 16240 405e54 LoadStringW 16237->16240 16241 40218d 30 API calls 16237->16241 16239 405e95 16243 403a63 ctype 29 API calls 16239->16243 16240->16237 16242 405e6d 16240->16242 16241->16240 16244 401d16 30 API calls 16242->16244 16245 405ebe 16243->16245 16244->16239 16245->13558 16247 405d68 __EH_prolog 16246->16247 16248 40245b 30 API calls 16247->16248 16249 405d8b 16248->16249 16250 405daa LoadStringA 16249->16250 16251 40245b 30 API calls 16249->16251 16250->16249 16252 405dc3 16250->16252 16251->16250 16253 403dae 30 API calls 16252->16253 16254 405de4 16253->16254 16255 403a63 ctype 29 API calls 16254->16255 16256 405dec 16255->16256 16257 404845 16256->16257 16258 403c26 31 API calls 16257->16258 16259 404855 16258->16259 16259->16239 16388 416b2d 16379->16388 16382 416a99 GetCurrentProcess TerminateProcess 16383 416aaa 16382->16383 16384 416b14 16383->16384 16385 416b1b ExitProcess 16383->16385 16391 416b36 16384->16391 16389 4154da ctype 29 API calls 16388->16389 16390 416a8e 16389->16390 16390->16382 16390->16383 16394 41553b LeaveCriticalSection 16391->16394 16393 4149bd 16393->13769 16394->16393 16395 40c90c 16396 40c919 16395->16396 16397 40c92a 16395->16397 16396->16397 16401 40c931 16396->16401 16400 403a63 ctype 29 API calls 16400->16397 16402 40c93b __EH_prolog 16401->16402 16405 40c96c 16402->16405 16406 40c976 __EH_prolog 16405->16406 16407 404320 ctype 34 API calls 16406->16407 16408 40c98f 16407->16408 16409 404320 ctype 34 API calls 16408->16409 16410 40c99e 16409->16410 16411 404320 ctype 34 API calls 16410->16411 16412 40c9ad 16411->16412 16413 404320 ctype 34 API calls 16412->16413 16414 40c9bc 16413->16414 16415 404320 ctype 34 API calls 16414->16415 16416 40c9cb 16415->16416 16419 40c9e3 16416->16419 16420 40c9ed __EH_prolog 16419->16420 16421 404320 ctype 34 API calls 16420->16421 16422 40ca08 16421->16422 16423 404320 ctype 34 API calls 16422->16423 16424 40ca1d 16423->16424 16425 404320 ctype 34 API calls 16424->16425 16426 40ca28 16425->16426 16427 404320 ctype 34 API calls 16426->16427 16428 40ca3d 16427->16428 16429 404320 ctype 34 API calls 16428->16429 16430 40ca48 16429->16430 16431 404320 ctype 34 API calls 16430->16431 16432 40ca5d 16431->16432 16433 404320 ctype 34 API calls 16432->16433 16434 40ca68 16433->16434 16435 404320 ctype 34 API calls 16434->16435 16436 40ca7a 16435->16436 16437 404320 ctype 34 API calls 16436->16437 16438 40ca85 16437->16438 16439 404349 ctype 34 API calls 16438->16439 16440 40ca9c 16439->16440 16441 404320 ctype 34 API calls 16440->16441 16442 40caa7 16441->16442 16443 404320 ctype 34 API calls 16442->16443 16444 40cab3 16443->16444 16445 404349 ctype 34 API calls 16444->16445 16446 40caca 16445->16446 16447 404320 ctype 34 API calls 16446->16447 16448 40cad5 16447->16448 16449 404320 ctype 34 API calls 16448->16449 16450 40cae1 16449->16450 16451 404320 ctype 34 API calls 16450->16451 16452 40caed 16451->16452 16453 404320 ctype 34 API calls 16452->16453 16454 40c924 16453->16454 16454->16400 16455 4068fd 16456 40690a 16455->16456 16457 40691b 16455->16457 16456->16457 16461 406922 16456->16461 16460 403a63 ctype 29 API calls 16460->16457 16462 40692c __EH_prolog 16461->16462 16465 410f60 16462->16465 16466 406915 16465->16466 16467 410f64 VirtualFree 16465->16467 16466->16460 16467->16466

                                          Control-flow Graph

                                          APIs
                                          • GetVersion.KERNEL32 ref: 004148FA
                                            • Part of subcall function 004157C8: HeapCreate.KERNELBASE(00000000,00001000,00000000,00414932,00000001), ref: 004157D9
                                            • Part of subcall function 004157C8: HeapDestroy.KERNEL32 ref: 00415818
                                          • GetCommandLineA.KERNEL32 ref: 0041495A
                                          • GetStartupInfoA.KERNEL32(?), ref: 00414985
                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004149A8
                                            • Part of subcall function 00414A01: ExitProcess.KERNEL32 ref: 00414A1E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                          • String ID: `&
                                          • API String ID: 2057626494-1405188806
                                          • Opcode ID: d0b0bc6d91067fd433c2cc4b1856fc531dfd5f25a3beb9f48f66dbad23e013fe
                                          • Instruction ID: fb65514f2d73941f5fb5fe300876562abb5c146ee9b99336205dd39c2cb12ef3
                                          • Opcode Fuzzy Hash: d0b0bc6d91067fd433c2cc4b1856fc531dfd5f25a3beb9f48f66dbad23e013fe
                                          • Instruction Fuzzy Hash: BD219EB19407159FDB14EFB6DC46AEE7BB8EF44704F10412FF910AB291DB3C89818A58

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1328 405434-405447 call 405414 1331 4054a4-4054a6 1328->1331 1332 405449-405450 1328->1332 1335 4054b8-4054ba 1331->1335 1333 405452-40547b call 403b85 FindFirstFileA call 403a63 1332->1333 1334 40548d-4054a2 FindFirstFileW 1332->1334 1333->1331 1343 40547d-40548b call 40551c 1333->1343 1334->1331 1337 4054a8-4054b1 call 4054bd 1334->1337 1340 4054b6 1337->1340 1340->1335 1343->1340
                                          APIs
                                            • Part of subcall function 00405414: FindClose.KERNELBASE(?,000000FF,00405445,000000FF), ref: 0040541F
                                          • FindFirstFileW.KERNELBASE(?,?,000000FF), ref: 00405497
                                            • Part of subcall function 00403B85: __EH_prolog.LIBCMT ref: 00403B8A
                                          • FindFirstFileA.KERNEL32(?,?,000000FF), ref: 00405467
                                            • Part of subcall function 0040551C: __EH_prolog.LIBCMT ref: 00405521
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: Find$FileFirstH_prolog$Close
                                          • String ID:
                                          • API String ID: 3335342080-0
                                          • Opcode ID: 01ff4a9bc94c78cd279a0d863a54892268cf469c718bfc53d66ce16def007dff
                                          • Instruction ID: 44fa9ff84b7e7cb6f1e8d7f9ea47a8a098aa0700a3472251c04f15a334366322
                                          • Opcode Fuzzy Hash: 01ff4a9bc94c78cd279a0d863a54892268cf469c718bfc53d66ce16def007dff
                                          • Instruction Fuzzy Hash: 33014830401505ABCF20AF64DC456EE7779DF51329F20827AE855672D1D73C9A85CF98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 401014-40111e call 401a7b call 40218d * 4 GetCommandLineW call 401cb5 call 4038d7 call 403a63 call 40218d call 40460b call 40237b call 402340 call 401cb5 call 401e6f call 403b38 call 403a63 * 2 35 401120-40114f call 401e4e call 401daf call 403a63 call 40237b call 402340 0->35 36 401154-40117e call 40245b call 401b11 0->36 35->36 45 401180-401183 36->45 46 401199-4011c5 call 401cb5 call 40218d 36->46 48 401191-401194 45->48 49 401185-40118c call 410ec0 45->49 62 4014b2-4014d6 call 401c9d call 4052cf 46->62 63 4011cb-4011f0 call 402172 call 403de4 46->63 53 401a27-401a5a call 403a63 * 6 48->53 49->48 113 401a5d 53->113 80 4014f1-4014fd call 403a3d 62->80 81 4014d8-4014db 62->81 77 4011f2-4011f5 63->77 78 40120b-40129a call 401cb5 call 4040fd call 403a63 call 401cb5 call 4040fd call 403a63 call 401cb5 call 4040fd call 403a63 call 403b38 63->78 82 401203-401206 77->82 83 4011f7-4011fe call 410ec0 77->83 192 4012a2-4012ca call 401cb5 call 4040cb call 403a63 78->192 193 40129c 78->193 100 401512 80->100 101 4014ff-401510 call 401f2a 80->101 85 4014e9-4014ec 81->85 86 4014dd-4014e4 call 410ec0 81->86 90 40132c-401395 call 404349 call 404320 call 403a63 * 8 82->90 83->82 94 4019fb-401a24 call 40536a call 403a63 * 3 85->94 86->85 90->113 94->53 103 401514-401516 100->103 101->103 109 401518-40151a 103->109 110 40151e-401527 call 407f8e 103->110 109->110 126 401529-401535 call 410ec0 110->126 127 40153a-401582 call 401d16 call 40218d call 402efe 110->127 118 401a5f-401a63 113->118 141 40163d-40163f 126->141 154 401584-401587 127->154 155 4015f8-40161e call 403a63 call 401c9d call 404f70 call 404f2c 127->155 141->85 145 401645-40164b 141->145 145->85 159 4015f0-4015f3 154->159 160 401589-40158c 154->160 209 401650-401653 155->209 210 401620-40163c call 404f2c call 403a63 * 2 155->210 164 40191f-401933 call 403a63 * 2 159->164 165 401593-4015b6 call 405ed1 call 401daf call 403a63 160->165 166 40158e-401591 160->166 196 401935-401937 164->196 197 40193b-40199d call 40536a call 403a63 * 9 164->197 170 4015bb-4015c0 165->170 166->165 166->170 170->159 179 4015c2-4015c5 170->179 179->159 186 4015c7-4015ef call 405ed1 MessageBoxW call 403a63 179->186 186->159 229 4012e4-4012e7 192->229 230 4012cc-4012df call 401daf 192->230 193->192 196->197 197->118 213 4017b4-4017b7 209->213 214 401659-401690 call 401a66 209->214 210->141 220 4017b9-4017d0 call 401d50 call 4057af 213->220 221 4017ec-40185e call 401d16 call 405bad call 401cb5 call 401e8b call 403a63 * 2 call 401cb5 call 401e8b call 403a63 213->221 233 401692-401699 call 401e18 214->233 234 40169e-4016e2 call 401a66 ShellExecuteExA 214->234 220->221 254 4017d2-4017d5 220->254 340 401860-401871 call 401ded call 401e18 221->340 341 401876-4018f6 call 402635 call 401a66 call 403a63 CreateProcessA 221->341 240 40139a-4014ad call 401cb5 call 4040fd call 401daf call 403a63 * 2 call 401cb5 call 4040fd call 401daf call 403a63 * 2 call 401cb5 call 4040fd call 402635 call 401daf call 403a63 * 6 call 404349 call 404320 229->240 241 4012ed-4012f0 229->241 230->229 233->234 252 401798-4017af call 403a63 * 2 234->252 253 4016e8-4016eb 234->253 240->62 241->240 249 4012f6-401308 MessageBoxW 241->249 249->240 256 40130e-401329 call 403a63 * 3 249->256 295 4019bf-4019c2 252->295 259 4016f9-40172a call 403a63 * 2 call 404f2c call 403a63 * 2 253->259 260 4016ed-4016f4 call 410ec0 253->260 261 401914-40191c call 404f2c 254->261 262 4017db-4017e7 call 410ec0 254->262 256->90 329 401732-401793 call 40536a call 403a63 * 9 259->329 330 40172c-40172e 259->330 260->259 261->164 262->261 301 4019d4-4019f3 call 404f2c call 403a63 * 2 295->301 302 4019c4-4019ce WaitForSingleObject CloseHandle 295->302 301->94 335 4019f5-4019f7 301->335 302->301 329->118 330->329 335->94 340->341 363 4019a2-4019ba CloseHandle call 403a63 341->363 364 4018fc-4018ff 341->364 363->295 367 401901-401903 call 410ef6 364->367 368 401908-401913 call 403a63 364->368 367->368 368->261
                                          APIs
                                            • Part of subcall function 00401A7B: GetVersionExA.KERNEL32(?), ref: 00401A95
                                          • GetCommandLineW.KERNEL32(00000003,00000003,00000003,00000003,?,00000000), ref: 0040108B
                                            • Part of subcall function 004038D7: __EH_prolog.LIBCMT ref: 004038DC
                                            • Part of subcall function 0040460B: __EH_prolog.LIBCMT ref: 00404610
                                            • Part of subcall function 0040460B: GetModuleFileNameA.KERNEL32(00400000,?,00000105,00000000,00000000), ref: 00404649
                                            • Part of subcall function 0040237B: __EH_prolog.LIBCMT ref: 00402380
                                            • Part of subcall function 00402340: __EH_prolog.LIBCMT ref: 00402345
                                            • Part of subcall function 00403DE4: __EH_prolog.LIBCMT ref: 00403DE9
                                          • MessageBoxW.USER32(00000000,?,?,00000010), ref: 004015DE
                                          • ShellExecuteExA.SHELL32(0000003C,?,00000001,?,?,00000003,?,00000003,00420240,;!@InstallEnd@!,?,00000003,00000000,00000002,00420278,00000003), ref: 004016D5
                                          • MessageBoxW.USER32(00000000,?,?,00000024), ref: 004012FF
                                            • Part of subcall function 00410EC0: MessageBoxW.USER32(00000000,?,7-Zip,00000010), ref: 00410EC9
                                            • Part of subcall function 00402EFE: __EH_prolog.LIBCMT ref: 00402F03
                                          • CloseHandle.KERNEL32(?,?,00000000), ref: 004019A8
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 004019C7
                                          • CloseHandle.KERNEL32(?,?,00000000), ref: 004019CE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog$Message$CloseHandle$CommandExecuteFileLineModuleNameObjectShellSingleVersionWait
                                          • String ID: $%%T$%%T\$;!@Install@!UTF-8!$;!@InstallEnd@!$<$Can not create temp folder archive$Can not find setup.exe$Can not load codecs$Can not open file$Can't load config info$Config failed$D$Directory$ExecuteFile$ExecuteParameters$RunProgram$Title$setup.exe
                                          • API String ID: 785510900-2114487665
                                          • Opcode ID: 6d1d7d5e5e8f17c8e0c096f6da895b612a21696790b38e54e95bb8f8772b28f7
                                          • Instruction ID: f92d1a5b025e5f1856d93d01be2b226abe75c3e6546c85d9ed47549f0c040395
                                          • Opcode Fuzzy Hash: 6d1d7d5e5e8f17c8e0c096f6da895b612a21696790b38e54e95bb8f8772b28f7
                                          • Instruction Fuzzy Hash: 485228719002199ACF25EFA5DC82AEDBB75AF04308F1040BFE156721F2DA395B86CF58

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 404 40ab05-40ab29 call 413724 call 40d5a3 409 40b0c3-40b0c8 404->409 410 40ab2f-40ab65 call 402172 call 4130e0 call 4062e7 404->410 411 40b3f1-40b3ff 409->411 418 40ab6b 410->418 419 40ac4c-40ac83 call 40aab0 call 40b761 call 40b402 410->419 420 40ab6e-40ab78 call 403a3d 418->420 434 40aca2-40acb2 call 404349 419->434 435 40ac85-40ac9c call 40b519 419->435 427 40ab88 420->427 428 40ab7a-40ab86 420->428 430 40ab8a-40ab8f 427->430 428->430 432 40ab91-40ab93 430->432 433 40ab97-40abc2 call 403a3d 430->433 432->433 442 40abc4-40abd4 433->442 443 40abd6 433->443 445 40acb4-40acba 434->445 446 40acbd-40acc1 434->446 435->434 444 40ae5d-40ae73 435->444 447 40abd8-40abdd 442->447 443->447 458 40ae79-40ae7c 444->458 459 40b2ab-40b2cd call 40a1fc 444->459 445->446 450 40acc3-40acd7 call 403a3d 446->450 451 40ad04-40ad16 446->451 448 40abe5-40ac1e call 4062e7 call 40a3de 447->448 449 40abdf-40abe1 447->449 481 40ac20-40ac22 448->481 482 40ac26-40ac2c 448->482 449->448 461 40ace2 450->461 462 40acd9-40ace0 call 40b626 450->462 466 40ad18-40ad5a call 404320 call 409739 DeleteCriticalSection call 40a594 451->466 467 40ad5f-40ad65 451->467 465 40ae7f-40aeb4 458->465 477 40b2d8-40b2db 459->477 478 40b2cf-40b2d5 459->478 471 40ace4-40acf8 call 4062e7 461->471 462->471 493 40aeb6-40aebf 465->493 494 40aedf-40aee5 465->494 537 40b321-40b335 call 404349 call 404320 466->537 473 40ae4b-40ae5a call 40b735 467->473 474 40ad6b-40ad8f call 406297 467->474 502 40acfa-40acfd 471->502 503 40acff 471->503 473->444 490 40ad94-40ad98 474->490 486 40b33a-40b36a call 403291 call 40439a 477->486 487 40b2dd-40b31f call 404320 call 409739 DeleteCriticalSection call 40a594 477->487 478->477 481->482 491 40ac34-40ac43 482->491 492 40ac2e-40ac30 482->492 552 40b385-40b3a4 486->552 553 40b36c-40b383 call 40a528 486->553 487->537 504 40af83-40af8c 490->504 505 40ad9e-40ada9 490->505 491->420 506 40ac49 491->506 492->491 495 40aec5-40aed6 493->495 496 40b16e-40b174 493->496 499 40aee7-40aee9 494->499 500 40aeed-40af35 call 403291 * 2 call 40439a * 2 494->500 530 40b1c5-40b1ce 495->530 531 40aedc 495->531 512 40b176-40b178 496->512 513 40b17c-40b1c3 call 404320 call 409739 DeleteCriticalSection call 40a594 496->513 499->500 608 40af37-40af4d call 40a528 500->608 609 40af4f-40af55 500->609 509 40ad01 502->509 503->509 514 40af94-40af9d 504->514 515 40af8e-40af90 504->515 516 40add7-40addb 505->516 517 40adab-40adaf 505->517 506->419 509->451 512->513 593 40b218-40b22e call 404349 call 404320 513->593 527 40afa5-40afe9 call 404320 call 409739 DeleteCriticalSection call 40a594 514->527 528 40af9f-40afa1 514->528 515->514 519 40ade1-40adf0 call 4062e7 516->519 520 40b05c-40b065 516->520 517->516 525 40adb1-40adb6 517->525 558 40adf2-40adf8 call 409ed8 519->558 559 40adfd-40ae12 call 40b876 519->559 535 40b067-40b069 520->535 536 40b06d-40b0be call 404320 call 409739 DeleteCriticalSection call 40a594 call 404349 call 404320 520->536 539 40adbc-40adc8 call 4062e7 525->539 540 40afee-40aff7 525->540 527->537 528->527 544 40b1d0-40b1d2 530->544 545 40b1d6-40b211 call 404320 call 409739 DeleteCriticalSection call 40a594 530->545 531->494 535->536 536->409 600 40b3ef 537->600 539->559 569 40adca-40add5 call 409eb3 539->569 547 40b002-40b008 540->547 548 40aff9-40afff 540->548 544->545 545->593 561 40b010-40b057 call 404320 call 409739 DeleteCriticalSection call 40a594 547->561 562 40b00a-40b00c 547->562 548->547 674 40b3a5 call 412ff0 552->674 675 40b3a5 call 409ab3 552->675 553->552 558->559 596 40ae14-40ae16 559->596 597 40ae1a-40ae23 559->597 561->537 562->561 569->559 581 40b3a8-40b3ea call 404320 * 2 call 409739 call 40b60b call 40a3a6 581->600 593->411 596->597 606 40ae25-40ae27 597->606 607 40ae2b-40ae34 597->607 600->411 606->607 616 40ae36-40ae38 607->616 617 40ae3c-40ae45 607->617 608->609 619 40b126-40b15a call 404320 * 2 609->619 620 40af5b 609->620 616->617 617->473 617->474 619->465 659 40b160-40b165 619->659 627 40af5e-40af65 620->627 632 40b0d1 627->632 633 40af6b 627->633 635 40b0d4-40b0d6 632->635 637 40af6e-40af70 633->637 639 40b0e4-40b0eb 635->639 640 40b0d8-40b0e2 635->640 642 40af76-40af7c 637->642 643 40b0cd-40b0cf 637->643 646 40b0fc 639->646 647 40b0ed 639->647 645 40b10a-40b120 call 40a528 640->645 642->637 649 40af7e 642->649 643->635 645->619 645->627 651 40b0ff-40b101 646->651 650 40b0f0-40b0f2 647->650 649->632 654 40b0f4-40b0fa 650->654 655 40b16a-40b16c 650->655 656 40b233-40b2a6 call 404320 * 3 call 409739 DeleteCriticalSection call 40a594 call 404349 call 404320 651->656 657 40b107 651->657 654->646 654->650 655->651 656->411 657->645 659->459 674->581 675->581
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040AB0A
                                            • Part of subcall function 0040D5A3: __EH_prolog.LIBCMT ref: 0040D5A8
                                            • Part of subcall function 004130E0: InitializeCriticalSection.KERNEL32(?,?,?,00000000,00000000), ref: 0041310E
                                          • DeleteCriticalSection.KERNEL32(?), ref: 0040AD3E
                                          • DeleteCriticalSection.KERNEL32(?), ref: 0040AFCB
                                          • DeleteCriticalSection.KERNEL32(?), ref: 0040B036
                                          • DeleteCriticalSection.KERNEL32(?), ref: 0040B093
                                          • DeleteCriticalSection.KERNEL32(?), ref: 0040B1A2
                                          • DeleteCriticalSection.KERNEL32(?), ref: 0040B1FC
                                          • DeleteCriticalSection.KERNEL32(?,?,?,00000004,00000004), ref: 0040B271
                                          • DeleteCriticalSection.KERNEL32(?), ref: 0040B303
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CriticalSection$Delete$H_prolog$Initialize
                                          • String ID:
                                          • API String ID: 3452124646-0
                                          • Opcode ID: dea6bec7755b29b7e46bcd3bec54f2d253f19e881b251d9b3d1cd047beedd60e
                                          • Instruction ID: 4c9a54a47b38b58bbaef36bcc828af5c6ca02983ed7c574d3216c54edcd042c8
                                          • Opcode Fuzzy Hash: dea6bec7755b29b7e46bcd3bec54f2d253f19e881b251d9b3d1cd047beedd60e
                                          • Instruction Fuzzy Hash: FC627E7090024ADFDB14DFA5C944BDEBBB4FF14308F1080AEE805B7291DB789A49DB99

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 676 4051b7-4051e6 GetCurrentThreadId GetTickCount GetCurrentProcessId 677 4051ea-4051f6 call 401d50 676->677 680 4051f8-4051ff 677->680 681 40524f-405255 677->681 684 405200-40520b 680->684 682 405263-40526c call 405800 681->682 683 405257-40525e call 4048ab 681->683 691 40527b-405280 682->691 692 40526e-405279 SetLastError 682->692 683->682 687 405212 684->687 688 40520d-405210 684->688 690 405215-40521f 687->690 688->690 690->684 693 405221-40522a 690->693 695 405282-40528c call 405ae5 691->695 696 40528e-405290 call 4049f4 691->696 694 4052ab-4052b2 692->694 697 405235-405248 call 4048ab GetTickCount 693->697 698 40522c-405230 call 401ded 693->698 694->677 702 4052b8-4052c2 694->702 705 405295-405297 695->705 696->705 710 40524a-40524c 697->710 711 40524d 697->711 698->697 707 4052c4-4052c8 702->707 708 405299-4052a2 GetLastError 705->708 709 4052cb-4052cd 705->709 708->694 712 4052a4-4052a9 708->712 709->707 710->711 711->681 712->694 712->702
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 004051C5
                                          • GetTickCount.KERNEL32 ref: 004051D0
                                          • GetCurrentProcessId.KERNEL32(?,00000000,?,?,00405334,?,00000000,?,00000003,00000003,00000000,00000000,00000003,?,00000000), ref: 004051DB
                                          • GetTickCount.KERNEL32 ref: 00405240
                                          • SetLastError.KERNEL32(000000B7,00000000,?,00000000,?,?,00405334,?,00000000,?,00000003), ref: 00405273
                                          • GetLastError.KERNEL32(00000000,?,00000000,?,?,00405334,?,00000000,?,00000003), ref: 00405299
                                            • Part of subcall function 004049F4: CreateDirectoryA.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00405334,?,00000000,?,00000003), ref: 00404A13
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CountCurrentErrorLastTick$CreateDirectoryProcessThread
                                          • String ID: .tmp$d
                                          • API String ID: 3074393274-2797371523
                                          • Opcode ID: 2fda1539db0041318063c64b288010cc5c4c3aedaa5e381c7d8f696092406eab
                                          • Instruction ID: 4fab17955b769304b7d1cf71853489b42ead9ac2cf2e2055059d54e7646dac87
                                          • Opcode Fuzzy Hash: 2fda1539db0041318063c64b288010cc5c4c3aedaa5e381c7d8f696092406eab
                                          • Instruction Fuzzy Hash: CC31C1326506009BDB10ABA098897EF7760EFA5315F14807FE902BB2D2D77C9842CF99

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 747 4083ab-4083c3 call 413724 750 4083c5-4083cb 747->750 751 4083cd-408400 call 4045d0 call 40218d 747->751 750->751 757 408402-408405 751->757 758 40844c-408464 call 403291 751->758 760 408409-40840d 757->760 765 408476-408480 758->765 766 408466-408474 call 40a528 758->766 762 408417-40841b 760->762 763 40840f-408411 760->763 764 408420-408422 762->764 767 408413-408415 763->767 768 40841d 763->768 764->758 771 408424-40844b call 401e4e call 401daf call 403a63 764->771 769 408482-408493 call 407d59 765->769 770 4084c3-4084c7 765->770 778 4084e5-4084eb 766->778 767->760 768->764 785 4084b4-4084b8 call 40a528 769->785 786 408495-4084b2 call 40447a 769->786 775 4084e3 770->775 776 4084c9-4084cd 770->776 771->758 775->778 781 4084d9-4084de call 40435e 776->781 782 4084cf-4084d4 776->782 783 4084f1-4084f6 778->783 784 4085ba-4085bc 778->784 781->775 788 4085bd-4085dc call 404320 call 403a63 * 2 782->788 790 4084f8-4084ff call 40647d 783->790 791 40850a-408534 call 4062e7 783->791 784->788 798 4084bd-4084c1 785->798 786->798 812 4085dd-4085eb 788->812 801 408502-408504 790->801 810 408536-40853a 791->810 811 40853c-40853f 791->811 798->769 798->770 801->791 805 4085ee-4085f0 801->805 805->788 813 4085ab-4085b4 810->813 814 408541-40854e 811->814 815 408557-408571 811->815 813->783 813->784 878 40854f call 40cf82 814->878 879 40854f call 40dd29 814->879 818 4085f2-4085fb 815->818 819 408573-408588 815->819 817 408552-408555 820 408590-408594 817->820 821 408603-408626 call 404320 call 403a63 * 2 818->821 822 4085fd-4085ff 818->822 819->820 832 40858a-40858c 819->832 823 408628-40862b 820->823 824 40859a-4085a3 820->824 821->812 822->821 825 408646-408665 823->825 826 40862d-408636 823->826 824->813 828 4085a5-4085a7 824->828 836 408667-40866f 825->836 837 40867f-4086a2 call 405cd6 call 4062e7 825->837 830 408638-40863a 826->830 831 40863e-408641 826->831 828->813 830->831 831->788 832->820 839 408671 836->839 840 408676-40867a call 401d50 836->840 848 408700-40870d call 407d59 837->848 849 4086a4-4086fe call 401cb5 * 2 call 407bd5 call 401daf call 403a63 * 3 837->849 839->840 840->837 854 408711-40873c call 407bd5 call 401daf call 403a63 848->854 855 40870f 848->855 869 40873d-408746 849->869 854->869 855->854 871 408748-40874a 869->871 872 40874e-408750 869->872 871->872 872->788 878->817 879->817
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID: Unknown error$X3B
                                          • API String ID: 3519838083-1496835351
                                          • Opcode ID: 47f253f86f2cbe6f5ea7b7729e7e95f0c02779c145a6591478a86d185b5344b5
                                          • Instruction ID: 10ffca09dccd2053a4a89f972bfe6bbc607f2b880b0d523777cfa28ffc571443
                                          • Opcode Fuzzy Hash: 47f253f86f2cbe6f5ea7b7729e7e95f0c02779c145a6591478a86d185b5344b5
                                          • Instruction Fuzzy Hash: 89D16070900219EFCF05DFA4C984ADEBB74BF48304F14846EE846BB2D1DB78AA45CB95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 880 405620-40564a call 413724 call 405434 885 405653-40565f GetLastError 880->885 886 40564c-40564e 880->886 888 405661-405664 885->888 889 40566a-405672 885->889 887 405794-40579c call 405414 886->887 895 40579e-4057ac 887->895 888->889 890 405792 888->890 889->890 892 405678 889->892 890->887 894 40567a-405681 892->894 894->894 896 405683-405686 894->896 896->890 897 40568c-405692 896->897 897->890 898 405698-40569c 897->898 898->890 899 4056a2-4056ae call 403a6e 898->899 899->890 902 4056b4-4056d9 call 403a6e call 401cb5 899->902 907 4056e7-4056f6 call 401cb5 902->907 908 4056db-4056e1 902->908 914 405705-405720 call 401ded call 405434 907->914 915 4056f8-405700 call 401ded 907->915 908->907 909 405789-405791 call 403a63 908->909 909->890 921 405722-405734 call 403b11 914->921 922 405777-405788 SetLastError call 403a63 914->922 915->914 921->922 927 405736-405775 call 40222b call 401daf call 403a63 * 3 call 405414 921->927 922->909 927->895
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00405625
                                            • Part of subcall function 00405434: FindFirstFileA.KERNEL32(?,?,000000FF), ref: 00405467
                                          • GetLastError.KERNEL32(?,?,00000000,?,00000001), ref: 00405653
                                            • Part of subcall function 00405414: FindClose.KERNELBASE(?,000000FF,00405445,000000FF), ref: 0040541F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: Find$CloseErrorFileFirstH_prologLast
                                          • String ID:
                                          • API String ID: 364955512-0
                                          • Opcode ID: e39f0d4d85096f3cd882782c1d04852b930387ce9b142e76bb949cb0f7f9728b
                                          • Instruction ID: 04b13d9487752735ca5a27f2fc382c225ef0a6c39b2ce108fc8834fd1c85259b
                                          • Opcode Fuzzy Hash: e39f0d4d85096f3cd882782c1d04852b930387ce9b142e76bb949cb0f7f9728b
                                          • Instruction Fuzzy Hash: F0418E36900519AACF14FBA5D942AEFBB75EF14308F10403AE412772E1DB795E41DEA8

                                          Control-flow Graph

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00406F6D
                                          • EnterCriticalSection.KERNEL32(00000000,?,?,?,00406FF7,?,?,?,?,?), ref: 00406F7E
                                          • LeaveCriticalSection.KERNEL32(00000000,?,?,?,00406FF7,?,?,?,?,?), ref: 00406FB2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterH_prologLeave
                                          • String ID:
                                          • API String ID: 367238759-0
                                          • Opcode ID: 07f6c1fd103800f188fec5f91ab3bb47b81eb91ba650842d040f77beb3819d41
                                          • Instruction ID: 97c3a8bfcec3db19a0bb52fb413a425f8ec3aea0187b5ae5e4fa4e2c7e55e4ea
                                          • Opcode Fuzzy Hash: 07f6c1fd103800f188fec5f91ab3bb47b81eb91ba650842d040f77beb3819d41
                                          • Instruction Fuzzy Hash: 4C013C76A00214EFCB118F94DC08B9ABBB9FF48755F11886AFD16E7250C7B4A910DFA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 948 40280e-402831 call 413724 call 402d81 953 402833-402838 948->953 954 40283d-402844 948->954 955 402cdb-402ce9 953->955 956 402846-40284c 954->956 957 40284f-40286f call 40cd84 954->957 956->957 960 402871-402873 957->960 961 402875-402890 call 40218d 957->961 962 4028b5-4028c3 call 405cd6 960->962 967 4028a0-4028a5 961->967 968 402892-40289e call 401daf 961->968 962->955 970 4028a7-4028b0 call 403a63 967->970 971 4028c8-4028ce call 401d50 967->971 975 4028d3-4028e2 call 401daf 968->975 970->962 971->975 979 4028e8-402906 975->979 980 402cbf-402cc2 975->980 984 402908-40290a 979->984 985 40290f-402913 979->985 981 402cc4-402cd9 call 403a63 call 405cd6 980->981 981->955 987 402b4b-402b6e call 405cd6 call 403a63 call 405cd6 984->987 988 402915-402918 985->988 989 40291a-40291f 985->989 987->955 991 40292e-402943 988->991 992 402921-402926 989->992 993 40292b 989->993 991->984 999 402945-402972 991->999 992->987 993->991 1004 402974-4029a3 call 405cd6 * 2 call 403a63 call 405cd6 999->1004 1005 4029a8-4029ad 999->1005 1004->955 1006 4029b7-4029d7 call 405cd6 1005->1006 1007 4029af-4029b3 1005->1007 1006->984 1017 4029dd-4029e3 1006->1017 1007->1006 1019 4029e5-4029e8 1017->1019 1020 4029fe-402a09 1017->1020 1019->992 1023 4029ee-4029fc 1019->1023 1021 402a0c-402a31 call 402172 call 40452f 1020->1021 1028 402a33-402a3a 1021->1028 1029 402a3f-402a52 call 401d16 1021->1029 1023->1021 1030 402b32 1028->1030 1035 402a54-402a57 call 404351 1029->1035 1036 402a5c-402a5f 1029->1036 1032 402b37-402b46 call 404349 call 404320 1030->1032 1032->987 1035->1036 1039 402a71-402a87 call 402635 1036->1039 1040 402a61-402a64 1036->1040 1046 402a89-402a9c call 401daf 1039->1046 1047 402acb-402ae3 call 401c9d call 405620 1039->1047 1040->1039 1043 402a66-402a6c call 4027a7 1040->1043 1043->1039 1053 402aa5-402aab call 404908 1046->1053 1054 402a9e-402aa3 call 4049af 1046->1054 1055 402ae8-402aea 1047->1055 1061 402ab0-402ac9 call 403a63 * 2 1053->1061 1054->1061 1058 402af0-402afa call 404c29 1055->1058 1059 402b73-402b76 1055->1059 1058->1059 1072 402afc-402b2e call 401d50 call 403a63 * 3 1058->1072 1064 402c6c-402cbd call 401daf call 403a63 * 3 call 404349 call 404320 call 405cd6 1059->1064 1065 402b7c-402b86 call 403a3d 1059->1065 1061->1032 1064->981 1074 402b88-402b97 1065->1074 1075 402b99 1065->1075 1072->1030 1079 402b9b-402ba3 1074->1079 1075->1079 1082 402ba5-402ba7 1079->1082 1083 402bab-402bc8 call 405ae5 1079->1083 1082->1083 1092 402c55-402c67 call 4062e7 1083->1092 1093 402bce-402be5 call 401d50 1083->1093 1092->1064 1104 402be7-402be9 1093->1104 1105 402bed-402c50 call 403a63 * 3 call 404349 call 404320 call 405cd6 call 403a63 call 405cd6 1093->1105 1104->1105 1105->955
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00402813
                                            • Part of subcall function 00402D81: EnterCriticalSection.KERNEL32(?,?,?,00409336), ref: 00402D86
                                            • Part of subcall function 00402D81: LeaveCriticalSection.KERNEL32(?,?,?,?,00409336), ref: 00402D90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterH_prologLeave
                                          • String ID: .@
                                          • API String ID: 367238759-2582305824
                                          • Opcode ID: 6bd0cbd02e91da8db41c1a0c9b86144ada70f8f603afc7a71f60fbc1e8ac7ead
                                          • Instruction ID: fb4838387da9abac6519c3a0e173b295c4de01f89ec6b6ed0d4ee3fc8d60aaac
                                          • Opcode Fuzzy Hash: 6bd0cbd02e91da8db41c1a0c9b86144ada70f8f603afc7a71f60fbc1e8ac7ead
                                          • Instruction Fuzzy Hash: F3F1DF70900248DFCF14EFA5C985ADEBBB4AF54308F10807EE446B72E1DB785A85DB19

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1127 4030fc-403128 call 413724 call 401c9d call 405620 1134 403141-403146 1127->1134 1135 40312a-40313f call 401d50 1127->1135 1136 403150 1134->1136 1137 403148-40314e 1134->1137 1141 4031a2-4031aa call 403a63 1135->1141 1139 403153-403192 call 403291 call 408d5e call 404320 1136->1139 1137->1139 1152 403194-40319d call 401d50 1139->1152 1153 4031af-4031d1 call 401d16 call 405bad call 404a3e 1139->1153 1148 403281 1141->1148 1150 403282-403290 1148->1150 1152->1141 1161 403213-403268 call 401cb5 call 402686 call 403a63 1153->1161 1162 4031d3-403211 call 4092e6 call 401daf call 403a63 * 3 1153->1162 1184 40326a call 40bff7 1161->1184 1185 40326a call 40b98f 1161->1185 1162->1150 1176 40326d-403280 call 403a63 * 2 1176->1148 1184->1176 1185->1176
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00403101
                                            • Part of subcall function 00405620: __EH_prolog.LIBCMT ref: 00405625
                                            • Part of subcall function 00404A3E: __EH_prolog.LIBCMT ref: 00404A43
                                            • Part of subcall function 004092E6: __EH_prolog.LIBCMT ref: 004092EB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID: Default
                                          • API String ID: 3519838083-753088835
                                          • Opcode ID: 0fc91ddac6c1b16fe72a6cc7b41e2781a7216c9bd00a9ca8bd5645336c638fb0
                                          • Instruction ID: 203c82e13c85383a660d5cb73dbb10af46e9aa8c77eacbcc0267a4e11568a844
                                          • Opcode Fuzzy Hash: 0fc91ddac6c1b16fe72a6cc7b41e2781a7216c9bd00a9ca8bd5645336c638fb0
                                          • Instruction Fuzzy Hash: E4514E75900209EFDB14EFA5D8819EEBBB8FF18308F00456EE556772D1DB38AA06CB14

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1186 404a3e-404a5f call 413724 call 401cb5 1191 404a61-404a64 1186->1191 1192 404aa8-404ab7 call 401d16 1186->1192 1194 404a68-404a6c 1191->1194 1198 404abb-404ac5 call 4049f4 1192->1198 1196 404a76-404a7a 1194->1196 1197 404a6e-404a70 1194->1197 1201 404a7f-404a81 1196->1201 1199 404a72-404a74 1197->1199 1200 404a7c 1197->1200 1208 404acb-404ad6 GetLastError 1198->1208 1209 404b9f-404ba6 call 401daf 1198->1209 1199->1194 1200->1201 1201->1192 1202 404a83-404a88 1201->1202 1202->1192 1204 404a8a-404a8d 1202->1204 1206 404a9d-404aa3 call 40240b 1204->1206 1207 404a8f-404a94 1204->1207 1206->1192 1207->1206 1211 404a96-404a98 1207->1211 1213 404b47-404b59 call 401c9d call 405620 1208->1213 1214 404ad8-404add 1208->1214 1215 404bab-404bae 1209->1215 1216 404c0e-404c14 call 403a63 1211->1216 1235 404b5e-404b60 1213->1235 1217 404c00 1214->1217 1218 404ae3-404ae6 1214->1218 1222 404bb0-404bc2 call 403a6e 1215->1222 1223 404c25-404c27 1215->1223 1238 404c15-404c24 1216->1238 1220 404c02-404c0d call 403a63 1217->1220 1225 404aea-404aee 1218->1225 1220->1216 1242 404bc4-404bca 1222->1242 1243 404bcc 1222->1243 1223->1220 1226 404af0-404af2 1225->1226 1227 404af8-404afc 1225->1227 1232 404af4-404af6 1226->1232 1233 404afe 1226->1233 1236 404b01-404b03 1227->1236 1232->1225 1233->1236 1239 404b62-404b64 1235->1239 1240 404b66-404b6e 1235->1240 1236->1217 1241 404b09 1236->1241 1244 404b72-404b8d call 403a63 * 3 1239->1244 1245 404b70 1240->1245 1246 404b92-404b9e call 403a63 1240->1246 1241->1217 1247 404b0f-404b15 1241->1247 1242->1243 1248 404bcf-404bfe call 401e6f call 4049f4 call 403a63 1242->1248 1243->1248 1244->1238 1245->1244 1246->1209 1247->1217 1250 404b1b-404b42 call 401e6f call 401daf call 403a63 1247->1250 1248->1215 1248->1217 1250->1198
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00404A43
                                          • GetLastError.KERNEL32(?,?,?,00000000), ref: 00404ACB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ErrorH_prologLast
                                          • String ID:
                                          • API String ID: 1057991267-0
                                          • Opcode ID: cf2054507fd1ee53753d2eae408e5b803be4a538542d8802e2091fe77905cd97
                                          • Instruction ID: 397979b183d08822f23b565ee303c4952bc02ec102e27be1c48eee89bea9c2ad
                                          • Opcode Fuzzy Hash: cf2054507fd1ee53753d2eae408e5b803be4a538542d8802e2091fe77905cd97
                                          • Instruction Fuzzy Hash: 1E5105719441099ACF10EBA5C942AFEBB75AF91308F11017FE602731E1DB3DAE46CB99

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1270 408755-408778 call 413724 1273 40877a-408784 call 403a3d 1270->1273 1274 40879e-4087a1 1270->1274 1282 408791 1273->1282 1283 408786-40878f 1273->1283 1276 4087a3-4087ad call 403a3d 1274->1276 1277 4087f6-408807 call 4083ab 1274->1277 1285 4087ce 1276->1285 1286 4087af-4087cc 1276->1286 1284 40880c-408816 1277->1284 1287 408793-40879c call 4062e7 1282->1287 1283->1287 1288 408818-40881a 1284->1288 1289 40881e-408827 1284->1289 1292 4087d0-4087e6 call 4062e7 call 405a0f 1285->1292 1286->1292 1287->1277 1288->1289 1290 408829-40882b 1289->1290 1291 40882f-40883f 1289->1291 1290->1291 1299 4087f0-4087f3 1292->1299 1300 4087e8-4087ee GetLastError 1292->1300 1299->1277 1300->1284
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040875A
                                          • GetLastError.KERNEL32(?,00000000,?,?,00000000,?,?,0040893F,?,?,00000000,004149B4,?,?,?,00000000), ref: 004087E8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ErrorH_prologLast
                                          • String ID:
                                          • API String ID: 1057991267-0
                                          • Opcode ID: 3fff607fbbb18c810b60b5715c755df2af7f02dc56ee627f626541e13130f925
                                          • Instruction ID: 0128b321cd566d1ceb50e896689a501b942dab3b414a73cd3b5e456030195100
                                          • Opcode Fuzzy Hash: 3fff607fbbb18c810b60b5715c755df2af7f02dc56ee627f626541e13130f925
                                          • Instruction Fuzzy Hash: EE317C719012499FCB10DF95CE849AEBBB0FF44314B24817FE496B7292CB388D40DB69

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1313 41468e-4146a4 call 416ccc 1316 4146e1-4146ea call 413d6f 1313->1316 1317 4146a6-4146d7 call 4152e0 CreateThread 1313->1317 1322 4146f3 1316->1322 1323 4146ec-4146f2 call 416c47 1316->1323 1324 4146f5-4146f8 1317->1324 1325 4146d9-4146df GetLastError 1317->1325 1322->1324 1323->1322 1325->1316
                                          APIs
                                            • Part of subcall function 00416CCC: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00415318,00000001,00000074,?,?,00000000,00000001), ref: 00416DC2
                                          • CreateThread.KERNELBASE(00000000,00000003,004146F9,00000000,00000000,?), ref: 004146CF
                                          • GetLastError.KERNEL32(?,?,?,00413009,00000000,00000000,004032CA,?,00000000,00000000,?,00402FAB,?,00000000,?), ref: 004146D9
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: AllocCreateErrorHeapLastThread
                                          • String ID:
                                          • API String ID: 3580101977-0
                                          • Opcode ID: 0374611688ca75c4551dea276e5d424cbadff3ac534dbe24837146ca9d20d13e
                                          • Instruction ID: 928dc59a5e1d7113ba94efa25a55b36d47ae035f635b84aed830f8a2a3c61c12
                                          • Opcode Fuzzy Hash: 0374611688ca75c4551dea276e5d424cbadff3ac534dbe24837146ca9d20d13e
                                          • Instruction Fuzzy Hash: D6F02D362006156BCB209F66EC019DB3BA5EF81375F10402EF958C2290DF3DC8914BAC

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1301 405892-4058a2 call 405905 1304 405900-405902 1301->1304 1305 4058a4-4058ad 1301->1305 1306 4058de-4058f5 CreateFileW 1305->1306 1307 4058af-4058dc call 403b85 CreateFileA call 403a63 1305->1307 1309 4058f7-4058fd 1306->1309 1307->1309 1309->1304
                                          APIs
                                            • Part of subcall function 00405905: FindCloseChangeNotification.KERNELBASE(00000000,000000FF,004058A0,?,?,00000000), ref: 00405910
                                          • CreateFileW.KERNELBASE(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 004058EF
                                            • Part of subcall function 00403B85: __EH_prolog.LIBCMT ref: 00403B8A
                                          • CreateFileA.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 004058CB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CreateFile$ChangeCloseFindH_prologNotification
                                          • String ID:
                                          • API String ID: 3273702577-0
                                          • Opcode ID: 34b674e9a04a5ff3e8c8923f5916708bcc46c4f31befc859c171c75614de22e6
                                          • Instruction ID: 7cb04d8d1853a58e30318ad4c29bda14cf4b58fee7e46fc4002fe1391b6e6e2b
                                          • Opcode Fuzzy Hash: 34b674e9a04a5ff3e8c8923f5916708bcc46c4f31befc859c171c75614de22e6
                                          • Instruction Fuzzy Hash: 4F01287240020AFFCF11AFA4DC45C9B7F6AEF08364B10853AF991661A1D73699A1EF94

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1346 404965-404975 1347 404977-404998 call 403b85 SetFileAttributesA call 403a63 1346->1347 1348 40499a-4049a2 SetFileAttributesW 1346->1348 1350 4049a4 1347->1350 1348->1350 1352 4049a6-4049a8 1350->1352 1353 4049aa 1350->1353 1355 4049ac-4049ae 1352->1355 1353->1355
                                          APIs
                                          • SetFileAttributesW.KERNELBASE(?,00000000,?,00000003,?,00000000), ref: 0040499C
                                            • Part of subcall function 00403B85: __EH_prolog.LIBCMT ref: 00403B8A
                                          • SetFileAttributesA.KERNEL32(?,00000000,?,00000003,?,00000000), ref: 00404985
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: AttributesFile$H_prolog
                                          • String ID:
                                          • API String ID: 3790360811-0
                                          • Opcode ID: 5366c93646a32060bc4a1fe11ea500c12b8b92d1211a98e2b8e7846322785de3
                                          • Instruction ID: f078d443d6654451da1bdd33dee3a4941b810ca2709c1c0422ffd448cadfd8b3
                                          • Opcode Fuzzy Hash: 5366c93646a32060bc4a1fe11ea500c12b8b92d1211a98e2b8e7846322785de3
                                          • Instruction Fuzzy Hash: 12E0E5B19002106BCB302B749C08AD73F6CCB82314B108177E816B72D0DA388E06C6D9
                                          APIs
                                          • CreateDirectoryW.KERNELBASE(00000000,00000000,00000000,?,00000000,?,?,00405334,?,00000000,?,00000003), ref: 00404A2C
                                            • Part of subcall function 00403B85: __EH_prolog.LIBCMT ref: 00403B8A
                                          • CreateDirectoryA.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00405334,?,00000000,?,00000003), ref: 00404A13
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CreateDirectory$H_prolog
                                          • String ID:
                                          • API String ID: 2325068607-0
                                          • Opcode ID: a1e0d02f5bfc64bfc09281de4819c2c8931d1b3daee1640bd6a36795e0d5f738
                                          • Instruction ID: e8b418caba4fa0c83fd0f6cce2293bab18ef6c4fa53c548cc4c0ebfda5fe1645
                                          • Opcode Fuzzy Hash: a1e0d02f5bfc64bfc09281de4819c2c8931d1b3daee1640bd6a36795e0d5f738
                                          • Instruction Fuzzy Hash: 3CE0E570B002006BDB206B64AC05B977B68CB41709F104176E902F71D0DA78DE01DA9C
                                          APIs
                                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,00414932,00000001), ref: 004157D9
                                            • Part of subcall function 00415680: GetVersionExA.KERNEL32 ref: 0041569F
                                          • HeapDestroy.KERNEL32 ref: 00415818
                                            • Part of subcall function 00415825: HeapAlloc.KERNEL32(00000000,00000140,00415801,000003F8), ref: 00415832
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: Heap$AllocCreateDestroyVersion
                                          • String ID:
                                          • API String ID: 2507506473-0
                                          • Opcode ID: 0d18dfc85a1640e6673d81f03e6c6359104a03ea7de3319d0e450716895a192f
                                          • Instruction ID: ed3d0d0d9fb025b00032fbfed5580f0a7fafafb3549905f7ec75d8b7e0a93aa3
                                          • Opcode Fuzzy Hash: 0d18dfc85a1640e6673d81f03e6c6359104a03ea7de3319d0e450716895a192f
                                          • Instruction Fuzzy Hash: 6CF06530A54B01EEDF207B706C867EA2B90EB84795F60483BF401D81A0EB7884D1D659
                                          APIs
                                          • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040598B
                                          • GetLastError.KERNEL32(?,?,?,?), ref: 00405999
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastPointer
                                          • String ID:
                                          • API String ID: 2976181284-0
                                          • Opcode ID: 4eb004f5f0e538f15da8fb4a4b1192dc0e26d9ca4b62000b247bbe798b79ae76
                                          • Instruction ID: b27308c8a3af6e3091502473baf333c9532b4c6e1f366657fcb3ad1a7c3590d9
                                          • Opcode Fuzzy Hash: 4eb004f5f0e538f15da8fb4a4b1192dc0e26d9ca4b62000b247bbe798b79ae76
                                          • Instruction Fuzzy Hash: 93F0B7B4500208EFDF04CF94D9458AE7BB5EF49364B208169F815E7390D7359E00DFA9
                                          APIs
                                          • SetCurrentDirectoryW.KERNELBASE(?,?,00000000), ref: 00404F62
                                            • Part of subcall function 00403B85: __EH_prolog.LIBCMT ref: 00403B8A
                                          • SetCurrentDirectoryA.KERNEL32(00000000,00000000,?,00000000), ref: 00404F48
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$H_prolog
                                          • String ID:
                                          • API String ID: 3531555294-0
                                          • Opcode ID: 37bd0973ac103fd303293487a19168a5ccebfcf95a8c4f288a103cb7951a30b5
                                          • Instruction ID: 9edf083e53dd0555a3085cbe496080ff7240eda39e21aa363a26468641b3ea5b
                                          • Opcode Fuzzy Hash: 37bd0973ac103fd303293487a19168a5ccebfcf95a8c4f288a103cb7951a30b5
                                          • Instruction Fuzzy Hash: 75E02630B400093FDF112F78EC4A9AA3BB89B40309F10427AB403E20E1EF38CA48CA48
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: a11c13ecc7348690c9950298e9b4123e17515457bca919a0a6ec543c4fca9b97
                                          • Instruction ID: 4fbed39282daa38b1d3be95d0829f5567439209fdd6a1d56e89862dfcbe45c3a
                                          • Opcode Fuzzy Hash: a11c13ecc7348690c9950298e9b4123e17515457bca919a0a6ec543c4fca9b97
                                          • Instruction Fuzzy Hash: 05324B70904249DFDB10DFA8C584BDEBBB0AF58304F1441AEE845B7382DB78AE45CB99
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: f8f61f009d3daf8c2db6a732b574bcd6eafb3dea196858b7c2c201f5376d76a6
                                          • Instruction ID: dff2ad87a4df39db6f8fa6ff6a697358cee08fb6a23258ae47e5232e80a59da3
                                          • Opcode Fuzzy Hash: f8f61f009d3daf8c2db6a732b574bcd6eafb3dea196858b7c2c201f5376d76a6
                                          • Instruction Fuzzy Hash: FFE16E70904249DFDF10DFA4C988AAEBBB4AF48314F2444AEE556F7391CB389E45CB25
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040E7F9
                                            • Part of subcall function 0040F836: __EH_prolog.LIBCMT ref: 0040F83B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 4ed558b650c164779cc9b57daec31bf164f2a891cd885c72c4fce8c115d9c0a5
                                          • Instruction ID: 639e188e3e769c4c76ba7ddc7be71c767d86a570cac8f7036ff280b2304c1e48
                                          • Opcode Fuzzy Hash: 4ed558b650c164779cc9b57daec31bf164f2a891cd885c72c4fce8c115d9c0a5
                                          • Instruction Fuzzy Hash: 5DC13670900259DFDB14DFA5C985BDEBBB4BF14308F1480AEE945B7282CB786A48CF65
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 9b629b237c488f6570121b27c448209f08593b0ec605445137fe85d2b2ac4caf
                                          • Instruction ID: 37dc011919f3b1358f9a833e213d0996983958fb9ee029613f358e4c9ba25a45
                                          • Opcode Fuzzy Hash: 9b629b237c488f6570121b27c448209f08593b0ec605445137fe85d2b2ac4caf
                                          • Instruction Fuzzy Hash: 3C815C70E00605ABCB24DFA5C881AEEFBB1BF48304F14453EE445B3791D739A949CB99
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00408D63
                                            • Part of subcall function 00408F0B: __EH_prolog.LIBCMT ref: 00408F10
                                            • Part of subcall function 00402635: __EH_prolog.LIBCMT ref: 0040263A
                                            • Part of subcall function 00403981: __EH_prolog.LIBCMT ref: 00403986
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 8e4672a25e712ee03bfe81b83f3d326a41e79320acd863c419bbbc2d4c5d2bdd
                                          • Instruction ID: 2e5fef73c4a961ecd91826de13bda49669b7ee5ae1afd1ab178ba291f64b6413
                                          • Opcode Fuzzy Hash: 8e4672a25e712ee03bfe81b83f3d326a41e79320acd863c419bbbc2d4c5d2bdd
                                          • Instruction Fuzzy Hash: E5516D7190060AEFCF11DFA5C984A9EBBB4BF08314F10462EE556B72D1CB789A45CFA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 6102bc3ab49ae424949eee4761875b821dd30f392df23a536a372274e60046df
                                          • Instruction ID: 67e57bbcfb5e62c28ba97e2c762051c7e2fb602a8ee489b014dcb5d1e96c76cd
                                          • Opcode Fuzzy Hash: 6102bc3ab49ae424949eee4761875b821dd30f392df23a536a372274e60046df
                                          • Instruction Fuzzy Hash: DA419EB1E042059BEB14DF99C985ABEB7B5FF48304F14453EE402B7381D7B8A945CBA8
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 305c79b04e93cb02db0d94eb430663c97d837b050eba01e1428f85ec3b32050d
                                          • Instruction ID: 716710645470f9cf712b82a1641bf3e3a23618a4fc30be00c3c641d866b01c52
                                          • Opcode Fuzzy Hash: 305c79b04e93cb02db0d94eb430663c97d837b050eba01e1428f85ec3b32050d
                                          • Instruction Fuzzy Hash: 3151C531804146DFCB15CB68C4D4AEE7771EF48348F14827BE8167B2D2D6399A06DBEA
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 4a7b8dc75b00dab3078b6f2c0b685c16519ae0cc3006f02a661cb725d39e4b70
                                          • Instruction ID: dc66995ee082b2e59fd72de07b50a9d1ecefa8465c91578acc64d6d85ae5b981
                                          • Opcode Fuzzy Hash: 4a7b8dc75b00dab3078b6f2c0b685c16519ae0cc3006f02a661cb725d39e4b70
                                          • Instruction Fuzzy Hash: 7A51D071C042499FDF21DFA4C940BEEBBB4AF05394F14416AE851732E2E7789A41CB68
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00402F03
                                            • Part of subcall function 0040335F: __EH_prolog.LIBCMT ref: 00403364
                                            • Part of subcall function 004034CC: __EH_prolog.LIBCMT ref: 004034D1
                                            • Part of subcall function 00403086: __EH_prolog.LIBCMT ref: 0040308B
                                            • Part of subcall function 00403086: ShowWindow.USER32(004149B4,00000001,000001F4,00000000,?,?,00000000,00000003,00000000,00000000), ref: 004030E4
                                            • Part of subcall function 00412FB0: CloseHandle.KERNEL32(00000000,00000000,0040301E,?,?,00000000,00000003,?,00000000,?,?,00000003,00000000,00000000), ref: 00412FBA
                                            • Part of subcall function 00412FB0: GetLastError.KERNEL32(?,00000003,00000000,00000000), ref: 00412FC4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog$CloseErrorHandleLastShowWindow
                                          • String ID:
                                          • API String ID: 2740091781-0
                                          • Opcode ID: 435d4de2c910343181235d516f57e862e2f77dc60e703a2f4f1f759955e8b0df
                                          • Instruction ID: 576321bfec054c9ee934bf83a6d4a944d332aa9064831fab6676e01313dc7821
                                          • Opcode Fuzzy Hash: 435d4de2c910343181235d516f57e862e2f77dc60e703a2f4f1f759955e8b0df
                                          • Instruction Fuzzy Hash: FF419C71900248DBCB11EFA5C991AEDBBB4AF04304F1080BFE90AB72D2DA785B45CB59
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 039900a8d840d8f65cf18cf377fd5bff5d9e595a8fad608146d0eb9be483e555
                                          • Instruction ID: 41554ca9dc53ee1e5d6d797d633c48513fe02739bc2a4d97afccdd4c6a3ff44e
                                          • Opcode Fuzzy Hash: 039900a8d840d8f65cf18cf377fd5bff5d9e595a8fad608146d0eb9be483e555
                                          • Instruction Fuzzy Hash: 89416C71A00645DFCB24CF68C48486ABBF1FF48314B244AAED096AB791C731ED46CF91
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040CF87
                                            • Part of subcall function 0040F6E0: __EH_prolog.LIBCMT ref: 0040F6E5
                                            • Part of subcall function 0040D0A6: __EH_prolog.LIBCMT ref: 0040D0AB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 247e6e783af1532b670e604df5ee4666ee67329ca8b2db34e45a1f618534d241
                                          • Instruction ID: 59bb91874275df73172cd70bf395014d1b371f9bee4586dc4e729df687399cc5
                                          • Opcode Fuzzy Hash: 247e6e783af1532b670e604df5ee4666ee67329ca8b2db34e45a1f618534d241
                                          • Instruction Fuzzy Hash: 87319630D01248DFCB11DFA9C548BEDBBB5AF15308F14406EE8457B381C7789A49DB66
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: e5e892bd4f2dea64c0cb8d9120272725db7c3bac4477bec6e08c9f5bde4bc1f1
                                          • Instruction ID: a24cbab5944e5cd80d4d0b45cab95027a2511e7323fd1c0fe5e5f9bfcab47c11
                                          • Opcode Fuzzy Hash: e5e892bd4f2dea64c0cb8d9120272725db7c3bac4477bec6e08c9f5bde4bc1f1
                                          • Instruction Fuzzy Hash: 97218F71A05246DBCB24FFA5C44046FB7A1AB4130472285BFE053772C1C738AE61CB6A
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 00413D5A
                                            • Part of subcall function 004154DA: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,00416D82,00000009,00000000,00000000,00000001,00415318,00000001,00000074,?,?,00000000,00000001), ref: 00415517
                                            • Part of subcall function 004154DA: EnterCriticalSection.KERNEL32(?,?,?,00416D82,00000009,00000000,00000000,00000001,00415318,00000001,00000074,?,?,00000000,00000001), ref: 00415532
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CriticalSection$AllocateEnterHeapInitialize
                                          • String ID:
                                          • API String ID: 1616793339-0
                                          • Opcode ID: cdeed90e400f99c9328ec8b59033d7a90e074e0a5ab5361bfbc3574a04fde8a1
                                          • Instruction ID: 026ee179866774db734838c78619ddc809868a86b22b68076f663e2312d1f49b
                                          • Opcode Fuzzy Hash: cdeed90e400f99c9328ec8b59033d7a90e074e0a5ab5361bfbc3574a04fde8a1
                                          • Instruction Fuzzy Hash: D4219772A00605EBDB10DF69EC42BDA7764FB00765F20411BF421EB6D0D77CAAC28A9C
                                          APIs
                                          • RtlFreeHeap.NTDLL(00000000,00000000,00000000,?,00000000,?,00416D82,00000009,00000000,00000000,00000001,00415318,00000001,00000074), ref: 00413E43
                                            • Part of subcall function 004154DA: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,00416D82,00000009,00000000,00000000,00000001,00415318,00000001,00000074,?,?,00000000,00000001), ref: 00415517
                                            • Part of subcall function 004154DA: EnterCriticalSection.KERNEL32(?,?,?,00416D82,00000009,00000000,00000000,00000001,00415318,00000001,00000074,?,?,00000000,00000001), ref: 00415532
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterFreeHeapInitialize
                                          • String ID:
                                          • API String ID: 641406236-0
                                          • Opcode ID: 841176424f551508ca039d1f5d574a0052902f767b8dc575c65ddda1a9f22b4e
                                          • Instruction ID: 5a14261a50f2f4ae8fe925cd7ff68077a924e970bbdc1eb83d0c2eed9fb11c58
                                          • Opcode Fuzzy Hash: 841176424f551508ca039d1f5d574a0052902f767b8dc575c65ddda1a9f22b4e
                                          • Instruction Fuzzy Hash: 2421C272901705FADB10AF96DC02BDE7BB8EB04725F24012BF414B21C0D77C9AC08AA9
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 004052D4
                                            • Part of subcall function 004050EE: __EH_prolog.LIBCMT ref: 004050F3
                                            • Part of subcall function 004050EE: GetTempPathA.KERNEL32(00000105,?,00000000,?,00000000), ref: 00405127
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog$PathTemp
                                          • String ID:
                                          • API String ID: 3652545363-0
                                          • Opcode ID: 1ef5fa40e20091595c8a07c7add8e04f0ea87ba7b14c6b9ab7bd2a47fc7370d7
                                          • Instruction ID: 884fa5787797a708672a5e156f09df22a5f972d3b51e26f7068c24b8b673b68a
                                          • Opcode Fuzzy Hash: 1ef5fa40e20091595c8a07c7add8e04f0ea87ba7b14c6b9ab7bd2a47fc7370d7
                                          • Instruction Fuzzy Hash: 5211A3759401059ACF00EFA5C552AEFBBB8EF95348F14402FE841732D1C7B90A49DE54
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00409E01
                                            • Part of subcall function 004099F1: __EH_prolog.LIBCMT ref: 004099F6
                                            • Part of subcall function 00409A39: __EH_prolog.LIBCMT ref: 00409A3E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: e2be988a2ed4eac1d18d94ffb3dcbee280352d40f72ce7d9b7b55f505c73744e
                                          • Instruction ID: 728224cdcdeea9a50de84ff331f734dd83e0a6071a74e90d77f9a4778d081c57
                                          • Opcode Fuzzy Hash: e2be988a2ed4eac1d18d94ffb3dcbee280352d40f72ce7d9b7b55f505c73744e
                                          • Instruction Fuzzy Hash: 931182B0A01254DADB09EBAAC1153DDFBF59FA1318F54415F9552732C2CBF82B0487A6
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00409075
                                            • Part of subcall function 00402635: __EH_prolog.LIBCMT ref: 0040263A
                                            • Part of subcall function 00405620: __EH_prolog.LIBCMT ref: 00405625
                                            • Part of subcall function 00413B0D: RaiseException.KERNEL32(00000003,00000000,00000003,?,00000003,?,00000003,00000000,00000000,00401055,00000003,?,00000000), ref: 00413B3B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog$ExceptionRaise
                                          • String ID:
                                          • API String ID: 2062786585-0
                                          • Opcode ID: 6c04af95d194b343c6e3b51da39000bbf436754ac2cefe3ed305026ad673936b
                                          • Instruction ID: c87fc69b1ce411278b5c4cd36917e57d7785db396d8ca4da128de4c157d2198f
                                          • Opcode Fuzzy Hash: 6c04af95d194b343c6e3b51da39000bbf436754ac2cefe3ed305026ad673936b
                                          • Instruction Fuzzy Hash: 1601D2B5A402049ECB10EF26C451ADEBBB1FF84314F10852FE896A32E1CB796649CB54
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 004027AC
                                            • Part of subcall function 004049F4: CreateDirectoryA.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00405334,?,00000000,?,00000003), ref: 00404A13
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryH_prolog
                                          • String ID:
                                          • API String ID: 3554458247-0
                                          • Opcode ID: 1d6ed87279fcce4dfaa36ce39d8da3d177537eb6a1ece7d61f11b0fb4062048b
                                          • Instruction ID: aa96bd448e9fa33173a2259148c0e22656dcd3e9b7c7d25cba760d9f6e75f00f
                                          • Opcode Fuzzy Hash: 1d6ed87279fcce4dfaa36ce39d8da3d177537eb6a1ece7d61f11b0fb4062048b
                                          • Instruction Fuzzy Hash: 55F03C729005069BCB05EB5AC8429EEBBB5EF94308F10403FE152775E2DA786986DB94
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040629C
                                            • Part of subcall function 004061BF: __EH_prolog.LIBCMT ref: 004061C4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 6c2e6a82ad44a3596cf000a5615c5b739901b0aaac1cec813de11ba17f646bcd
                                          • Instruction ID: d002f29cd99a7d9c36b9a014c837f136803fcb54798139eb5382dd41199f51d8
                                          • Opcode Fuzzy Hash: 6c2e6a82ad44a3596cf000a5615c5b739901b0aaac1cec813de11ba17f646bcd
                                          • Instruction Fuzzy Hash: 2BF03A72A00218EFDB15DF94CC01BEEB779FB48315F10816AB422E72D0C7798A10CB14
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040C971
                                            • Part of subcall function 0040C9E3: __EH_prolog.LIBCMT ref: 0040C9E8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 97d13476a1578dbbb8b7321e23e8bd518515a52fd3c7649a69e8943f484a5e8b
                                          • Instruction ID: 180fbe891bab88941c19a906eef3a01802dada044b7360aafa1ebd8752043cfb
                                          • Opcode Fuzzy Hash: 97d13476a1578dbbb8b7321e23e8bd518515a52fd3c7649a69e8943f484a5e8b
                                          • Instruction Fuzzy Hash: 66F0FCB0911640DEC719EB74D1153DDFBB4AF55308F50419E9956736C2CFB81708C765
                                          APIs
                                          • SysAllocString.OLEAUT32(?), ref: 00405C13
                                            • Part of subcall function 00413B0D: RaiseException.KERNEL32(00000003,00000000,00000003,?,00000003,?,00000003,00000000,00000000,00401055,00000003,?,00000000), ref: 00413B3B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: AllocExceptionRaiseString
                                          • String ID:
                                          • API String ID: 1415472724-0
                                          • Opcode ID: 585828f0663470c28d012fa7c31560623ec32af21cf032640c5ea50ac41654d0
                                          • Instruction ID: bf266c775eafc0cd132ea201270a7534faa964ceb55315cc87c56e89072e7831
                                          • Opcode Fuzzy Hash: 585828f0663470c28d012fa7c31560623ec32af21cf032640c5ea50ac41654d0
                                          • Instruction Fuzzy Hash: B7E06D32200708A7CB20AF65D84198B7BE8FF00385B10C43FF949DA240E779E9808BD8
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00405805
                                            • Part of subcall function 00405620: __EH_prolog.LIBCMT ref: 00405625
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: d031f65d966fd76414b5e485b8cf5b0e5999cd66b44c505832369a9b765ef076
                                          • Instruction ID: a0f610f1b5e032532ed1cec3649959bf66a41b4e8af70f58d5593db508bcf515
                                          • Opcode Fuzzy Hash: d031f65d966fd76414b5e485b8cf5b0e5999cd66b44c505832369a9b765ef076
                                          • Instruction Fuzzy Hash: 46E04FB3D410049ACB05EB65E9527EDB378EF61319F50407FE412735D18B381F09CA58
                                          APIs
                                          • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 00405B4C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: FileWrite
                                          • String ID:
                                          • API String ID: 3934441357-0
                                          • Opcode ID: f685ec6030a7cae57bc9182c2f64f11e19c4f82e6ad9756b6e5eb0af141a467c
                                          • Instruction ID: fda623b9c22c7fd134ddab0a411968f0e63156441233f4ee367e8c40c556ab77
                                          • Opcode Fuzzy Hash: f685ec6030a7cae57bc9182c2f64f11e19c4f82e6ad9756b6e5eb0af141a467c
                                          • Instruction Fuzzy Hash: 17E0E575640208FBCB11CFA5C801B8E7BF9EB08354F20C169F914AA260D739EA11DF54
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040C936
                                            • Part of subcall function 0040C96C: __EH_prolog.LIBCMT ref: 0040C971
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 2f93a48584fc243b76bceec8380402125645ced17a7c1bf7a60211c0ce45116c
                                          • Instruction ID: 8adf79bcf0a25fb823e60414124b99f072840e3085735b9c49c9779a3d641231
                                          • Opcode Fuzzy Hash: 2f93a48584fc243b76bceec8380402125645ced17a7c1bf7a60211c0ce45116c
                                          • Instruction Fuzzy Hash: 6EE01A71811620EBC724EF58C4456DEB7B4EF08725F00875EA4E6B36D1C7B8AE40CB94
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ExitThread
                                          • String ID:
                                          • API String ID: 2158977761-0
                                          • Opcode ID: 6c939c18724e7789034020813005a1b29b75e21fb5f5d6c1b381c2503cc8d902
                                          • Instruction ID: 835638d51d7e690d80ddf8f11569568d1c7a5f433119f1d0283a2071334468ba
                                          • Opcode Fuzzy Hash: 6c939c18724e7789034020813005a1b29b75e21fb5f5d6c1b381c2503cc8d902
                                          • Instruction Fuzzy Hash: CDE08C32900925AADB223BA1DC06AEE3620AF81394F00002BF8146A5A0DBA88CD186D9
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040F6E5
                                            • Part of subcall function 0040F449: __EH_prolog.LIBCMT ref: 0040F44E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 0c00a6b9b995e6d122d0d1e5645fdc19a4d57d2469026a55dc4bfd6035115874
                                          • Instruction ID: 32d4a89d334c2aba7f1f5d27adfa0c04a02a885b7174eb98eed18e47b0b867f7
                                          • Opcode Fuzzy Hash: 0c00a6b9b995e6d122d0d1e5645fdc19a4d57d2469026a55dc4bfd6035115874
                                          • Instruction Fuzzy Hash: 1DD012B2515104FBD7109F45D842BDEBBB8EB51369F10813BF00171540D37D5644966A
                                          APIs
                                          • ReadFile.KERNELBASE(000000FF,00000000,?,?,00000000,000000FF,?,00405A68,00000000,?,00000000,?,00405A8E,00000000,?,00000000), ref: 00405A33
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: FileRead
                                          • String ID:
                                          • API String ID: 2738559852-0
                                          • Opcode ID: 7899785fd51540d5028ce756fcdedcbfaef9db2fe3ec3db1f53401f618f66a8a
                                          • Instruction ID: 33e006b7c7266c94de2827aaddd493f3c8d551b448fa911b85e4ce9a1db514e9
                                          • Opcode Fuzzy Hash: 7899785fd51540d5028ce756fcdedcbfaef9db2fe3ec3db1f53401f618f66a8a
                                          • Instruction Fuzzy Hash: A4E0EC75200208FBCB01CF91CC05FCE7BB9FB49754F208058E90596160C375AA14EB54
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ExitThread
                                          • String ID:
                                          • API String ID: 2158977761-0
                                          • Opcode ID: 24773d02a99502e401f88b35345ffc50176b794b148236fecf9e645f2ac90187
                                          • Instruction ID: b4e95b568d212fcbc8e7df7edbfd3446e029e3f46d4ca6baaecf21535c38ed65
                                          • Opcode Fuzzy Hash: 24773d02a99502e401f88b35345ffc50176b794b148236fecf9e645f2ac90187
                                          • Instruction Fuzzy Hash: 2AD0A732600E25AAD6223771DC467EF2244AF81795B04012BF818895A0DFA8CDC145DD
                                          APIs
                                          • FindClose.KERNELBASE(?,000000FF,00405445,000000FF), ref: 0040541F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CloseFind
                                          • String ID:
                                          • API String ID: 1863332320-0
                                          • Opcode ID: f0ce2bef5821c107b9489e8e4dd061de71a9af92eaf728c2451e2811c290832d
                                          • Instruction ID: ad963fc5273d8b9d86916b47fb17bcd605870b12c06d71a74b716dd917e87850
                                          • Opcode Fuzzy Hash: f0ce2bef5821c107b9489e8e4dd061de71a9af92eaf728c2451e2811c290832d
                                          • Instruction Fuzzy Hash: D4D0123151453157CA641E7C7848AD333D99A1637537157AAF4B4D32E0D3749CC34A98
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(00000000,000000FF,004058A0,?,?,00000000), ref: 00405910
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 9cbe10086181c6cf337a739c26a2519d1510d6718cc7d35307e3d92904545fb4
                                          • Instruction ID: c924a9121967eb2c43d42ee71539138ee39fbcc7c8c6d5ba34c486a20a6e0004
                                          • Opcode Fuzzy Hash: 9cbe10086181c6cf337a739c26a2519d1510d6718cc7d35307e3d92904545fb4
                                          • Instruction Fuzzy Hash: 93D0127151456197CE742E7C78445C337D8DA463303311B6BF4B0D32E0D3748D835A98
                                          APIs
                                          • SetFileTime.KERNELBASE(?,?,?,?,00405B26,00000000,00000000,?,00402E13,?), ref: 00405B0A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: FileTime
                                          • String ID:
                                          • API String ID: 1425588814-0
                                          • Opcode ID: 2b6a10e293fa4a8bd52839064a41e39e160aca85d3804aec240939be71bd967c
                                          • Instruction ID: 4beff7ba357006865f39a04876becaa9faf69e640e246345c6c1d8862761ec95
                                          • Opcode Fuzzy Hash: 2b6a10e293fa4a8bd52839064a41e39e160aca85d3804aec240939be71bd967c
                                          • Instruction Fuzzy Hash: 29C04C36159106FF8F120F70CC04D1ABFA2EF99311F10C958B165C5070C7328024EB52
                                          APIs
                                            • Part of subcall function 0041468E: CreateThread.KERNELBASE(00000000,00000003,004146F9,00000000,00000000,?), ref: 004146CF
                                            • Part of subcall function 0041468E: GetLastError.KERNEL32(?,?,?,00413009,00000000,00000000,004032CA,?,00000000,00000000,?,00402FAB,?,00000000,?), ref: 004146D9
                                          • GetLastError.KERNEL32(?,?,00000003,00000000,00000000), ref: 00413018
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CreateThread
                                          • String ID:
                                          • API String ID: 665435222-0
                                          • Opcode ID: fdfffcc17890bcc66e85f81167f5a4f4e376ab203a2f001e3d39f9f51099ce04
                                          • Instruction ID: 8241f09584fde1b7b47d6c8a5a56a0c389c2bf5d01a37efb599b640c9bda9e89
                                          • Opcode Fuzzy Hash: fdfffcc17890bcc66e85f81167f5a4f4e376ab203a2f001e3d39f9f51099ce04
                                          • Instruction Fuzzy Hash: 4EE086B22042126AE310DF509C05FE76ADCDB94B05F00443EB944C6184EB64CA40C3A9
                                          APIs
                                          • VirtualAlloc.KERNELBASE(00000000,00020000,00001000,00000004,004103C8), ref: 00410F51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 91e70fcb83806e64083a323eb2e3944731c0f93bc5a264736d7e7e867113384b
                                          • Instruction ID: 07720a170ef6d50c918e2da5ca2fe5f7ddfb2e687cae5d42b3df39ad5892c3a5
                                          • Opcode Fuzzy Hash: 91e70fcb83806e64083a323eb2e3944731c0f93bc5a264736d7e7e867113384b
                                          • Instruction Fuzzy Hash: DDB012B039138075FF7843208C1FFE71200A340B87F0080A8BB05D81C4E7D064C0501C
                                          APIs
                                          • VirtualFree.KERNELBASE(?,00000000,00008000,0040664A,?,00406624), ref: 00410F6C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: 1327e01bd96d07ee7a5a75ed87afd8ac78764046635013dfe708143c48cadece
                                          • Instruction ID: a132bef15ba7b425f1065e5a097c2bb543b957559febc4b94616fea76008790a
                                          • Opcode Fuzzy Hash: 1327e01bd96d07ee7a5a75ed87afd8ac78764046635013dfe708143c48cadece
                                          • Instruction Fuzzy Hash: 3BB0123424120031ED7807200C1AB5711005701701F10C1183102642C087D4B440450C
                                          APIs
                                          • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,0041772A,?,Microsoft Visual C++ Runtime Library,00012010,?,0041BD34,?,0041BD84,?,?,?,Runtime Error!Program: ), ref: 00418102
                                          • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0041811A
                                          • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0041812B
                                          • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00418138
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                          • API String ID: 2238633743-4044615076
                                          • Opcode ID: 595171f737e70550edc5abd38f068ead7bf618b78638dd3ba3c6e0fb0d2712e4
                                          • Instruction ID: 415fa372477fd235fe75ca2ef0ffa9dc0df8c28a9075a0eab2fce08d3bc4b09a
                                          • Opcode Fuzzy Hash: 595171f737e70550edc5abd38f068ead7bf618b78638dd3ba3c6e0fb0d2712e4
                                          • Instruction Fuzzy Hash: F5012572700241BF87219FB5AD849DBBAE9EB49751354443FB504C2220DB7CC9C39B69
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: ef3f0dd97c369c2370b5d413364e2112772f158c67037ae1847bc74799d93c78
                                          • Instruction ID: 6f1b27b05ce828494dcdc0ca2a3df983f9883c238a6bb878f092976797e95433
                                          • Opcode Fuzzy Hash: ef3f0dd97c369c2370b5d413364e2112772f158c67037ae1847bc74799d93c78
                                          • Instruction Fuzzy Hash: 68A1EB70E002099BCB18DF96C8919AEB7B2FF94318F14883FE915A7391D738AD52CB55
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000155D4), ref: 0041561F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: c73d5215fbd9f9fa44ce3c8db65af6300706d886bcb472667e49ab47f89b2735
                                          • Instruction ID: 5929198a1c1d143ebb6d47ac1dc9c369120d6613942f0ebcbf50c4dd8c3cbf29
                                          • Opcode Fuzzy Hash: c73d5215fbd9f9fa44ce3c8db65af6300706d886bcb472667e49ab47f89b2735
                                          • Instruction Fuzzy Hash: 57A001B5A41605DA8A209F60A8095C5BE62A689B42B608166A811E5268DFB812419A69
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00415631
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 80fdf592cfe35f6ca0a49e156fc06359dfcc477da488757324292bdf2a3d88f1
                                          • Instruction ID: 3aa75b883a8314cf8793ebdd48d7cbf343a2d53b1036c531b3b3a2656884bc9f
                                          • Opcode Fuzzy Hash: 80fdf592cfe35f6ca0a49e156fc06359dfcc477da488757324292bdf2a3d88f1
                                          • Instruction Fuzzy Hash:
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 27156ca4970ad7a14cafdd4d0f561c0251ce2efe8b7cb58f4bb8e0a1a151ff8a
                                          • Instruction ID: f7c307c9948f0502eef9bcc932476d7ce99f20ff48e31f419bd1d6f291c9dace
                                          • Opcode Fuzzy Hash: 27156ca4970ad7a14cafdd4d0f561c0251ce2efe8b7cb58f4bb8e0a1a151ff8a
                                          • Instruction Fuzzy Hash: BD023A72A042114BC71DCE18C6902B9BBE2FBD5350F110A3FE496D7A84D7B8D8E5CB99
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                          • Instruction ID: 6f6e9ae2f3605818a2c8e7767e34e4a9399a597c595f09bc79f2493b2d2310b3
                                          • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                          • Instruction Fuzzy Hash: 3EB17C7590120ADFDB15CF04C5D0AE9BBA1FF58318F25C1AEC85A4B382C735EA86CB94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8b1b8b3e4e9aa519cc0883e8f2e9399227ae21cf5f78173f93e12a8e0ced7762
                                          • Instruction ID: 7f21fa5966f3e8744179bfb474c2758024c7c669c00a9d4920a80f5d7b425c19
                                          • Opcode Fuzzy Hash: 8b1b8b3e4e9aa519cc0883e8f2e9399227ae21cf5f78173f93e12a8e0ced7762
                                          • Instruction Fuzzy Hash: D621427E370D0607A71C8B6AAD336B921D1E38430A7C8A03DE64BC53C1EE6DD595C60D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                          • Instruction ID: 99a347de7b16eca0cbeab8721e5afb4e5ad46217b84f2e64c48f172e38bf97ef
                                          • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                          • Instruction Fuzzy Hash: 2B21C83290062547C702DE6DF4845A7F391FBD4369F134727ED8467291C629A854D6E0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                          • Instruction ID: 71e75c779d64757812c6fa0593de5e91038406040dd0a6985e9d44633d38c26d
                                          • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                          • Instruction Fuzzy Hash: BC2137725105258BC701DF2DF4886B7B3E1FFD4319F638A3BD8818B1C1CA29D881D694
                                          APIs
                                          • LCMapStringW.KERNEL32(00000000,00000100,0041BE00,00000001,00000000,00000000,7622E860,004256E4,?,?,?,0041848E,?,?,?,00000000), ref: 0041862F
                                          • LCMapStringA.KERNEL32(00000000,00000100,0041BDFC,00000001,00000000,00000000,?,?,0041848E,?,?,?,00000000,00000001), ref: 0041864B
                                          • LCMapStringA.KERNEL32(?,?,?,0041848E,?,?,7622E860,004256E4,?,?,?,0041848E,?,?,?,00000000), ref: 00418694
                                          • MultiByteToWideChar.KERNEL32(?,VB,?,0041848E,00000000,00000000,7622E860,004256E4,?,?,?,0041848E,?,?,?,00000000), ref: 004186CC
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,?,0041848E,?,00000000,?,?,0041848E,?), ref: 00418724
                                          • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0041848E,?), ref: 0041873A
                                          • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,0041848E,?), ref: 0041876D
                                          • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,0041848E,?), ref: 004187D5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: String$ByteCharMultiWide
                                          • String ID: VB
                                          • API String ID: 352835431-2416070386
                                          • Opcode ID: 003663a998c404720e509784b904756e9dc21287fecc91c3ae78f0538cf30181
                                          • Instruction ID: 75fdc42d4ca3b2d5695a32d80f34dcfea13c9c9e1b2be43f5f9a41df7731755a
                                          • Opcode Fuzzy Hash: 003663a998c404720e509784b904756e9dc21287fecc91c3ae78f0538cf30181
                                          • Instruction Fuzzy Hash: A6515F31900609EFCF218F65CC45EEF7FB5FB48754F20412AF925A12A0D7398991DBA9
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0041496A), ref: 004172FA
                                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0041496A), ref: 0041730E
                                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0041496A), ref: 0041733A
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0041496A), ref: 00417372
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0041496A), ref: 00417394
                                          • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,0041496A), ref: 004173AD
                                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0041496A), ref: 004173C0
                                          • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004173FE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                          • String ID: jIA
                                          • API String ID: 1823725401-2590053038
                                          • Opcode ID: dcd9eacb03994a91aa73d6441958e3731b9086dbddb026e1bfa459d91ea586b1
                                          • Instruction ID: 8edd1d2af646b02ed721f394ba4169bf36ee68eca66066dd640126c456dfff16
                                          • Opcode Fuzzy Hash: dcd9eacb03994a91aa73d6441958e3731b9086dbddb026e1bfa459d91ea586b1
                                          • Instruction Fuzzy Hash: 7631D47250C219AFD7317F689C888FB7ABCE649354715053BFD66C3201E6288CC1E2AD
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 00417673
                                          • GetStdHandle.KERNEL32(000000F4,0041BD34,00000000,00000000,00000000,?), ref: 00417749
                                          • WriteFile.KERNEL32(00000000), ref: 00417750
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: File$HandleModuleNameWrite
                                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $x*B
                                          • API String ID: 3784150691-2083536112
                                          • Opcode ID: 9f3ee68eedca8c04870b7c4ba6519361572a149120d3a6d5458ca0bba870cf42
                                          • Instruction ID: d3223577c50248063a34d8f4d7298abe086d5d3d0ee639c6b3bd3f24b9ad2996
                                          • Opcode Fuzzy Hash: 9f3ee68eedca8c04870b7c4ba6519361572a149120d3a6d5458ca0bba870cf42
                                          • Instruction Fuzzy Hash: 5931D2726002186FDF20DA60DD46FDA377DEF89304F5005ABF544D6181EB78AAC48B5D
                                          APIs
                                          • GetStringTypeW.KERNEL32(00000001,0041BE00,00000001,?,7622E860,004256E4,?,?,0041848E,?,?,?,00000000,00000001), ref: 0041887B
                                          • GetStringTypeA.KERNEL32(00000000,00000001,0041BDFC,00000001,?,?,0041848E,?,?,?,00000000,00000001), ref: 00418895
                                          • GetStringTypeA.KERNEL32(?,?,?,?,0041848E,7622E860,004256E4,?,?,0041848E,?,?,?,00000000,00000001), ref: 004188C9
                                          • MultiByteToWideChar.KERNEL32(?,VB,?,?,00000000,00000000,7622E860,004256E4,?,?,0041848E,?,?,?,00000000,00000001), ref: 00418901
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,0041848E,?), ref: 00418957
                                          • GetStringTypeW.KERNEL32(?,?,00000000,0041848E,?,?,?,?,?,?,0041848E,?), ref: 00418969
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: StringType$ByteCharMultiWide
                                          • String ID: VB
                                          • API String ID: 3852931651-2416070386
                                          • Opcode ID: f366ae1a1c4feb3856e7e49d67d86268e533ee02966d98845c911f14f75699a6
                                          • Instruction ID: 0deb4df31157d4fbbd2276260d368b45192e758527c12e7bc8b96f729eb23429
                                          • Opcode Fuzzy Hash: f366ae1a1c4feb3856e7e49d67d86268e533ee02966d98845c911f14f75699a6
                                          • Instruction Fuzzy Hash: 85418FB2A00209BFCF209F94DC86EEF7F79EB08754F10452AF915D2250C7389991DB99
                                          APIs
                                          • GetStartupInfoA.KERNEL32(?), ref: 0041746F
                                          • GetFileType.KERNEL32(?,?,00000000), ref: 0041751A
                                          • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 0041757D
                                          • GetFileType.KERNEL32(00000000,?,00000000), ref: 0041758B
                                          • SetHandleCount.KERNEL32 ref: 004175C2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: FileHandleType$CountInfoStartup
                                          • String ID: $YB
                                          • API String ID: 1710529072-867103119
                                          • Opcode ID: 0f20f78b1d243ceb825b791af9b59c2038ed572102f9f62c4ccf998fd163e942
                                          • Instruction ID: 9157860cf2e7af3a35f89051d0ae9de0bf945cd889ae2d4a6076f2c4651d7c80
                                          • Opcode Fuzzy Hash: 0f20f78b1d243ceb825b791af9b59c2038ed572102f9f62c4ccf998fd163e942
                                          • Instruction Fuzzy Hash: B75135716086019FC720CF28D8897B63BB1EB05338F64466EC566CB6E0DB38C986C75D
                                          APIs
                                          • GetVersionExA.KERNEL32 ref: 0041569F
                                          • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004156D4
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00415734
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: EnvironmentFileModuleNameVariableVersion
                                          • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                          • API String ID: 1385375860-4131005785
                                          • Opcode ID: 352f7edc9f3896d13c070371f2d33d0b51665e116eb32c5a0d287e401f1eefe3
                                          • Instruction ID: 6eb182bd46f731c3af8b1d07a07b8df2d0194a1b299ff80343aa6f034c3c884c
                                          • Opcode Fuzzy Hash: 352f7edc9f3896d13c070371f2d33d0b51665e116eb32c5a0d287e401f1eefe3
                                          • Instruction Fuzzy Hash: 56312671945648EDEB3186706C87BDF3B788B46704F6400DBD199D52C2E6398ECA8B2D
                                          APIs
                                          • SetLastError.KERNEL32(00000078,.@,00000000,00402AB0,00000000,?,?,?,?), ref: 00404918
                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,.@,00000000,00402AB0,00000000,?,?,?,?), ref: 00404934
                                          • SetFileTime.KERNEL32(00000000,00000000,?,?,?,40000000,00000003,00000000,00000003,02000000,00000000,?,.@,00000000,00402AB0,00000000), ref: 0040494B
                                          • CloseHandle.KERNEL32(00000000,?,40000000,00000003,00000000,00000003,02000000,00000000,?,.@,00000000,00402AB0,00000000,?,?,?), ref: 00404957
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateErrorHandleLastTime
                                          • String ID: .@
                                          • API String ID: 2291555494-2582305824
                                          • Opcode ID: 134b82ee1bee937397c61f831c6e8a998fcbb54d8f51f8998ece3d2421389dbd
                                          • Instruction ID: b13e78268552c33248838deebc4f257ca571263cc4fefdaa9dfe176c52576776
                                          • Opcode Fuzzy Hash: 134b82ee1bee937397c61f831c6e8a998fcbb54d8f51f8998ece3d2421389dbd
                                          • Instruction Fuzzy Hash: 66F0E2B12812107BE2201B74BC48F9B6E5CDBCA715F108135B661A21E0C3284D19D7B8
                                          APIs
                                          • CharUpperW.USER32(00000000,00000000,?,00000000,00000000,?,00403B58), ref: 00403AAB
                                          • GetLastError.KERNEL32(?,00000000,00000000,?,00403B58), ref: 00403AB7
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000004,00000000,00000000,?,00000000,00000000,?,00403B58), ref: 00403AD2
                                          • CharUpperA.USER32(?,?,00000000,00000000,?,00403B58), ref: 00403AEB
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,00000001,?,00000000,00000000,?,00403B58), ref: 00403AFE
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: Char$ByteMultiUpperWide$ErrorLast
                                          • String ID:
                                          • API String ID: 3939315453-0
                                          • Opcode ID: 7c2300f256f82e2aee6372cd28c35fbf20af8ddddc15953858da8d33bcd8cfd2
                                          • Instruction ID: dd72d820dddc2be4d64e736f5eaa813d5c8cd4bb6d440344005d5656a272e87c
                                          • Opcode Fuzzy Hash: 7c2300f256f82e2aee6372cd28c35fbf20af8ddddc15953858da8d33bcd8cfd2
                                          • Instruction Fuzzy Hash: D60144B64002187ADB10ABE49C89DEBBE7CEB04259F014472F952E2281E2796E4487A8
                                          APIs
                                          • GetLastError.KERNEL32(00000103,7FFFFFFF,00416CBF,0041798E,00000000,?,?,00000000,00000001), ref: 004152F5
                                          • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 00415303
                                          • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 0041534F
                                            • Part of subcall function 00416CCC: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00415318,00000001,00000074,?,?,00000000,00000001), ref: 00416DC2
                                          • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00415327
                                          • GetCurrentThreadId.KERNEL32 ref: 00415338
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue$AllocCurrentHeapThread
                                          • String ID:
                                          • API String ID: 2020098873-0
                                          • Opcode ID: 9020ed6c5573c52789434ca8060b3935b73b18465b1892a80f2ba475462c6b54
                                          • Instruction ID: c348f308811c55cc6791f5f2c72cac7d5a6c02788d8c3db17f30136ca92006f7
                                          • Opcode Fuzzy Hash: 9020ed6c5573c52789434ca8060b3935b73b18465b1892a80f2ba475462c6b54
                                          • Instruction Fuzzy Hash: B4F09632600615ABC6312B70AC096DB3A51EB857E1B15413AF951972A0DB78888197DD
                                          APIs
                                          • InterlockedIncrement.KERNEL32(004256E4), ref: 00418463
                                          • InterlockedDecrement.KERNEL32(004256E4), ref: 00418478
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: Interlocked$DecrementIncrement
                                          • String ID: VB
                                          • API String ID: 2172605799-2416070386
                                          • Opcode ID: 3f0e7dfc381ab69d5717ddb5ba06b4fa70db5411652d110c580bb33579a080f3
                                          • Instruction ID: b2465ecea32c92352f716010131fb348419f683e9d2febfe3e70f5b1b578e6df
                                          • Opcode Fuzzy Hash: 3f0e7dfc381ab69d5717ddb5ba06b4fa70db5411652d110c580bb33579a080f3
                                          • Instruction Fuzzy Hash: 35F0C232201612EBD720AF56ECC19CF6755EB81326F50843FF00989190DF7899C2995E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d56ffb8a6685455f091880630799685eddd8ac587d3428563be9e88dd716d36c
                                          • Instruction ID: 1ac5c9ddcf095474d6e2a383ff06e8771fc838f6ee07df02b13506851481717d
                                          • Opcode Fuzzy Hash: d56ffb8a6685455f091880630799685eddd8ac587d3428563be9e88dd716d36c
                                          • Instruction Fuzzy Hash: C891F671D01618ABCF21AB69CC41ADE7BB9EB857A4F240127F814B6290D73D8DC18A6C
                                          APIs
                                          • HeapAlloc.KERNEL32(00000000,00002020,00420838,00420838,?,?,00416838,00000000,00000010,00000000,00000009,00000009,?,00413D1F,00000010,00000000), ref: 0041638D
                                          • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,00416838,00000000,00000010,00000000,00000009,00000009,?,00413D1F,00000010,00000000), ref: 004163B1
                                          • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,00416838,00000000,00000010,00000000,00000009,00000009,?,00413D1F,00000010,00000000), ref: 004163CB
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00416838,00000000,00000010,00000000,00000009,00000009,?,00413D1F,00000010,00000000,?), ref: 0041648C
                                          • HeapFree.KERNEL32(00000000,00000000,?,?,00416838,00000000,00000010,00000000,00000009,00000009,?,00413D1F,00000010,00000000,?,00000000), ref: 004164A3
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: AllocVirtual$FreeHeap
                                          • String ID:
                                          • API String ID: 714016831-0
                                          • Opcode ID: 61edb7c5b2a57b73fa0373c8b0061bfd64d3e4def081ef99dbe098b98f3bc666
                                          • Instruction ID: 1d273cd761051d77879f543994291e2c1f364a84a1ace75b4c6a1ba38ea4645d
                                          • Opcode Fuzzy Hash: 61edb7c5b2a57b73fa0373c8b0061bfd64d3e4def081ef99dbe098b98f3bc666
                                          • Instruction Fuzzy Hash: 1D310370640711EFD3309F24DC85BA6B7E4EB84764F12823AE56997791E778E881CB8C
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00409509
                                            • Part of subcall function 0040935A: EnterCriticalSection.KERNEL32(?,?,?,00409680), ref: 0040935F
                                            • Part of subcall function 0040935A: LeaveCriticalSection.KERNEL32(?,?,?,00409680), ref: 00409369
                                          • EnterCriticalSection.KERNEL32(?), ref: 00409536
                                          • LeaveCriticalSection.KERNEL32(?), ref: 00409552
                                          • __aulldiv.LIBCMT ref: 004095A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$H_prolog__aulldiv
                                          • String ID:
                                          • API String ID: 3848147900-0
                                          • Opcode ID: a35648faa5521048dc7a706a0a4db6dfa1122edae8f5ec55bff1d899094cecd3
                                          • Instruction ID: 81a485ad15cb22f282f6c018201ee4179c2b1d1cd2674c5f201a60282c37c453
                                          • Opcode Fuzzy Hash: a35648faa5521048dc7a706a0a4db6dfa1122edae8f5ec55bff1d899094cecd3
                                          • Instruction Fuzzy Hash: C6315076A00215AFCB11EF65C8819EFBBB5FF88704F00442AE51673692D779AD41CB64
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 004047AD
                                          • FormatMessageA.KERNEL32(00001300,00000000,?,00000000,?,00000000,00000000,?,00000000), ref: 004047D1
                                          • FormatMessageW.KERNEL32(00001300,00000000,?,00000000,?,00000000,00000000,?,00000000), ref: 00404814
                                          • LocalFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,?,00000000), ref: 0040482F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: FormatMessage$FreeH_prologLocal
                                          • String ID:
                                          • API String ID: 3392428314-0
                                          • Opcode ID: d8114c00c851820dfd69355ab4a5a7d10c3f97c7ff5c1a94d174072509a20bce
                                          • Instruction ID: b23ee79e455563f0a2b187c1bc8aea4849c6785c5b1f5abfa42b55bee9ed31b8
                                          • Opcode Fuzzy Hash: d8114c00c851820dfd69355ab4a5a7d10c3f97c7ff5c1a94d174072509a20bce
                                          • Instruction Fuzzy Hash: 451170B5A00159AFDF01BFA59C419FFBB7DEF44349F00847AE112721E2DB391A01DA68
                                          APIs
                                            • Part of subcall function 00413030: SetEvent.KERNEL32(00000000,0040756D), ref: 00413033
                                          • GetDlgItem.USER32(?,000003E8), ref: 00409397
                                          • LoadIconA.USER32(00000000), ref: 004093B1
                                          • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 004093C2
                                          • SetTimer.USER32(?,00000003,00000064,00000000), ref: 004093D1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: EventIconItemLoadMessageSendTimer
                                          • String ID:
                                          • API String ID: 2758541657-0
                                          • Opcode ID: 426d8240eb7a06a459b3f470407d996c0274358d2b71b1374ad8138c79f04d47
                                          • Instruction ID: 34d2fc59b34559bed7d893ef409eb69d6d7528a9cba69d030baf66432b50efa3
                                          • Opcode Fuzzy Hash: 426d8240eb7a06a459b3f470407d996c0274358d2b71b1374ad8138c79f04d47
                                          • Instruction Fuzzy Hash: 4D015A30100B00AFD3319F21DD5AB66BBA1FB04721F008A2DF5A7959F0CB75B942CB48
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID: $
                                          • API String ID: 3519838083-227171996
                                          • Opcode ID: 74feb26567ea79c8fd9d5f3f589634721b0a9a4a518abdc39c0b6b7ccedab932
                                          • Instruction ID: 116f94ee193b6a60a58d4aec76a07daa8eefdeb27c95ac76265691768f75313a
                                          • Opcode Fuzzy Hash: 74feb26567ea79c8fd9d5f3f589634721b0a9a4a518abdc39c0b6b7ccedab932
                                          • Instruction Fuzzy Hash: CB712431D0020A9FCB24DF99D981AAEB7B1FF48314F20467ED416B7691D734AA8ACF54
                                          APIs
                                          • GetCPInfo.KERNEL32(?,00000000), ref: 00417E71
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: Info
                                          • String ID: $
                                          • API String ID: 1807457897-3032137957
                                          • Opcode ID: be8999de8ad5c30073bbd0379d60ad0f54c653f5d04d814f41e486670cb2e0db
                                          • Instruction ID: 669041dcfce0968cbe3c51124f50cac4b21f3f9a56807733dc4743f672ff05a2
                                          • Opcode Fuzzy Hash: be8999de8ad5c30073bbd0379d60ad0f54c653f5d04d814f41e486670cb2e0db
                                          • Instruction Fuzzy Hash: 65417C312482585AEB219714CC49FFB7FF9DB02714F5404E6D149C7153C2794AC6C7BA
                                          APIs
                                          • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,00415C92,00000000,00000000,00000000,00413CC1,00000000,00000000,?,00000000,00000000,00000000), ref: 00415EF2
                                          • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,00415C92,00000000,00000000,00000000,00413CC1,00000000,00000000,?,00000000,00000000,00000000), ref: 00415F26
                                          • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 00415F40
                                          • HeapFree.KERNEL32(00000000,?), ref: 00415F57
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: AllocHeap$FreeVirtual
                                          • String ID:
                                          • API String ID: 3499195154-0
                                          • Opcode ID: 712f9e2f9eec85a92a3a672498402ffd9fd7e765c5a6c8233a1a124cbc29739c
                                          • Instruction ID: 8f6381cf99308f7e34b2c2e49534b1224184cafd179dea44f4322364d011a6a4
                                          • Opcode Fuzzy Hash: 712f9e2f9eec85a92a3a672498402ffd9fd7e765c5a6c8233a1a124cbc29739c
                                          • Instruction Fuzzy Hash: A6114C31300A01EFC7308F59EC86DA6BBB5FB85760791462AF156D69B0D3719887CF58
                                          APIs
                                          • InitializeCriticalSection.KERNEL32(?,00415292,?,00414944), ref: 004154BE
                                          • InitializeCriticalSection.KERNEL32(?,00415292,?,00414944), ref: 004154C6
                                          • InitializeCriticalSection.KERNEL32(?,00415292,?,00414944), ref: 004154CE
                                          • InitializeCriticalSection.KERNEL32(?,00415292,?,00414944), ref: 004154D6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3965332390.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.3965288173.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965398692.000000000041B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965509440.0000000000420000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965584644.0000000000422000.00000008.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965653003.0000000000423000.00000004.00000001.01000000.00000008.sdmpDownload File
                                          • Associated: 00000004.00000002.3965720405.0000000000427000.00000002.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_BA002.jbxd
                                          Similarity
                                          • API ID: CriticalInitializeSection
                                          • String ID:
                                          • API String ID: 32694325-0
                                          • Opcode ID: ec7037d00a0fc94f488d53f3a91d2e26ae03bdd42e29aafad6c46e686e3ec5a2
                                          • Instruction ID: a8e831e61b8b61633fe4a4176da74b0e9d16ee726bcd83620c475df078586321
                                          • Opcode Fuzzy Hash: ec7037d00a0fc94f488d53f3a91d2e26ae03bdd42e29aafad6c46e686e3ec5a2
                                          • Instruction Fuzzy Hash: 0AC00231A11138ABCF312B55FC048463FA6EB852A03518072A1045203186612C12EFD8

                                          Execution Graph

                                          Execution Coverage:12.4%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:11.7%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:96
                                          execution_graph 61872 1010100 61906 10102d0 61872->61906 61876 101014a 61933 100fce0 61876->61933 61878 1010166 61879 100fce0 29 API calls 61878->61879 61880 101017e 61879->61880 61945 1010930 61880->61945 61882 1010183 61885 101026f 61882->61885 61989 100ff60 61882->61989 61884 101019a 61888 100fce0 29 API calls 61884->61888 61905 101026d 61885->61905 62008 f8ada0 26 API calls collate 61885->62008 61890 10101b6 61888->61890 61889 10102c4 61891 100fce0 29 API calls 61890->61891 61892 10101ce 61891->61892 61893 1010930 37 API calls 61892->61893 61894 10101d3 61893->61894 61894->61885 61895 10101e5 61894->61895 61896 1010203 61895->61896 61999 100cd70 29 API calls 61895->61999 62000 fbeee0 61896->62000 61899 1010245 61902 1010258 61899->61902 62004 f88910 61899->62004 62009 100adc4 61905->62009 61908 1010314 61906->61908 61907 1010378 62033 f89f40 61907->62033 61908->61907 61911 1010349 61908->61911 61910 101036e 61912 fbeee0 26 API calls 61910->61912 61913 1010000 37 API calls 61911->61913 61914 10103d1 61912->61914 61915 101034e 61913->61915 61916 10103fb 61914->61916 62045 f8ada0 26 API calls collate 61914->62045 62016 f8a040 61915->62016 61918 1010437 61916->61918 62046 f8ada0 26 API calls collate 61916->62046 61920 100adc4 ___crtLCMapStringA 5 API calls 61918->61920 61922 101013e 61920->61922 61923 1010000 61922->61923 61924 101003e 61923->61924 61932 101007e 61923->61932 62077 100b1f7 EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 61924->62077 61932->61876 61934 100fd3c 61933->61934 62078 1011a30 61934->62078 61937 100fd8e 61944 100fdaa 61937->61944 62081 f8ada0 26 API calls collate 61937->62081 61938 f8a040 29 API calls 61938->61937 61940 100fe1c 61941 100adc4 ___crtLCMapStringA 5 API calls 61940->61941 61942 100fe36 61941->61942 61942->61878 61943 f89f40 29 API calls 61943->61940 61944->61940 61944->61943 61966 1010960 61945->61966 61946 1010abe 61948 1010af4 61946->61948 61951 1010ad2 61946->61951 62083 1079221 26 API calls 2 library calls 61946->62083 61949 1010b32 61948->61949 61953 1010b68 61948->61953 62087 1079221 26 API calls 2 library calls 61948->62087 61949->61953 61959 1010b46 61949->61959 62088 1079221 26 API calls 2 library calls 61949->62088 61950 1010a45 61950->61946 61950->61948 62082 1079221 26 API calls 2 library calls 61950->62082 61958 1010ade 61951->61958 62084 1079221 26 API calls 2 library calls 61951->62084 61954 1010ba3 61953->61954 61955 1010bd9 61953->61955 62092 1079221 26 API calls 2 library calls 61953->62092 61954->61955 61967 1010bb7 61954->61967 62093 1079221 26 API calls 2 library calls 61954->62093 61956 1010c17 61955->61956 61963 1010c4c 61955->61963 62097 1079221 26 API calls 2 library calls 61955->62097 61956->61963 61971 1010c2a 61956->61971 62098 1079221 26 API calls 2 library calls 61956->62098 61965 1010aea 61958->61965 62085 1079221 26 API calls 2 library calls 61958->62085 61961 1010b52 61959->61961 62089 1079221 26 API calls 2 library calls 61959->62089 61970 1010b5e 61961->61970 62090 1079221 26 API calls 2 library calls 61961->62090 61963->61882 61965->61948 62086 1079221 26 API calls 2 library calls 61965->62086 61966->61950 61973 1010d60 37 API calls 61966->61973 61975 1010bc3 61967->61975 62094 1079221 26 API calls 2 library calls 61967->62094 61970->61953 62091 1079221 26 API calls 2 library calls 61970->62091 61978 1010c36 61971->61978 62099 1079221 26 API calls 2 library calls 61971->62099 61973->61966 61981 1010bcf 61975->61981 62095 1079221 26 API calls 2 library calls 61975->62095 61984 1010c42 61978->61984 62100 1079221 26 API calls 2 library calls 61978->62100 61981->61955 62096 1079221 26 API calls 2 library calls 61981->62096 61984->61963 62101 1079221 26 API calls 2 library calls 61984->62101 61990 100ff9e 61989->61990 61998 100ffde 61989->61998 62102 100b1f7 EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 61990->62102 61998->61884 61999->61896 62002 fbef19 62000->62002 62001 fbef3c 62001->61899 62002->62001 62103 f8ada0 26 API calls collate 62002->62103 62008->61905 62010 100adcd 62009->62010 62011 100adcf IsProcessorFeaturePresent 62009->62011 62010->61889 62013 100b626 62011->62013 62105 100b5ea SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 62013->62105 62015 100b709 62015->61889 62017 f8a059 62016->62017 62018 f8a13c 62016->62018 62019 f8a09a 62017->62019 62020 f8a067 62017->62020 62061 ff2328 28 API calls 2 library calls 62018->62061 62024 f8a150 62019->62024 62025 f8a0a6 62019->62025 62022 f8a146 62020->62022 62023 f8a073 62020->62023 62062 ff2328 28 API calls 2 library calls 62022->62062 62060 f8ae80 28 API calls 2 library calls 62023->62060 62063 ff2308 27 API calls 2 library calls 62024->62063 62032 f8a0b6 _Yarn 62025->62032 62047 f8b830 62025->62047 62031 f8a091 62031->61910 62032->61910 62034 f89f96 62033->62034 62039 f89f4e 62033->62039 62035 f8a02e 62034->62035 62036 f89fa6 62034->62036 62076 ff2308 27 API calls 2 library calls 62035->62076 62038 f8b830 28 API calls 62036->62038 62041 f89fb6 _Yarn 62036->62041 62038->62041 62039->62034 62042 f89f75 62039->62042 62041->61910 62043 f8a040 29 API calls 62042->62043 62044 f89f90 62043->62044 62044->61910 62045->61916 62046->61918 62049 f8b870 62047->62049 62048 f8b8b9 62051 f8b8e2 62048->62051 62052 f8b8c2 62048->62052 62049->62048 62058 f8b8a9 _Yarn 62049->62058 62070 100bf2b KiUserExceptionDispatcher Concurrency::cancel_current_task __CxxThrowException@8 62049->62070 62064 100ade3 62051->62064 62053 f8b8ce 62052->62053 62071 100bf2b KiUserExceptionDispatcher Concurrency::cancel_current_task __CxxThrowException@8 62052->62071 62057 100ade3 new 9 API calls 62053->62057 62057->62058 62059 f8b94f 62058->62059 62072 f8ada0 26 API calls collate 62058->62072 62059->62032 62060->62031 62061->62022 62062->62024 62065 100ade8 new 62064->62065 62066 100ae14 62065->62066 62073 10893ad 7 API calls 2 library calls 62065->62073 62074 100bf48 IsProcessorFeaturePresent KiUserExceptionDispatcher __CxxThrowException@8 new 62065->62074 62075 100bf2b KiUserExceptionDispatcher Concurrency::cancel_current_task __CxxThrowException@8 62065->62075 62066->62058 62072->62059 62073->62065 62074->62065 62079 f8a040 29 API calls 62078->62079 62080 100fd77 62079->62080 62080->61937 62080->61938 62081->61944 62103->62001 62105->62015 62106 1018400 62109 f97650 62106->62109 62114 1017db0 62109->62114 62112 f976a5 62116 1017dbc new 62114->62116 62115 f97684 62115->62112 62119 f97720 GetSystemTimeAsFileTime 62115->62119 62116->62115 62145 1071273 62116->62145 62118 1017dee 62120 f97777 __aulldiv 62119->62120 62148 f95180 62120->62148 62122 f977cf 62124 f977e9 62122->62124 62159 f95220 29 API calls 3 library calls 62122->62159 62127 f9781d 62124->62127 62161 f95360 29 API calls 3 library calls 62124->62161 62125 f977c2 62158 f99e40 27 API calls __CxxThrowException@8 62125->62158 62128 f9783a 62127->62128 62163 f95360 29 API calls 3 library calls 62127->62163 62165 f97280 29 API calls 62128->62165 62130 f977dc 62160 f99e40 27 API calls __CxxThrowException@8 62130->62160 62135 f97810 62162 f9abd0 27 API calls __CxxThrowException@8 62135->62162 62137 f9782d 62164 f9abd0 27 API calls __CxxThrowException@8 62137->62164 62138 f97852 62166 f95400 29 API calls 3 library calls 62138->62166 62141 f9785a 62142 100adc4 ___crtLCMapStringA 5 API calls 62141->62142 62143 f978a2 62142->62143 62143->62112 62147 1071293 62145->62147 62146 10712c5 KiUserExceptionDispatcher 62146->62118 62147->62146 62167 107d97c 62148->62167 62151 f951f9 62153 100adc4 ___crtLCMapStringA 5 API calls 62151->62153 62154 f9520e 62153->62154 62154->62122 62157 f95220 29 API calls 3 library calls 62154->62157 62155 f951df 62176 f99bd0 27 API calls __CxxThrowException@8 62155->62176 62157->62125 62159->62130 62161->62135 62163->62137 62165->62138 62166->62141 62177 1084ac9 62167->62177 62170 f951b1 62170->62151 62172 106f8c4 62170->62172 62173 106f8d1 new 62172->62173 62174 106f8fe 62172->62174 62173->62174 62473 108fc34 26 API calls _Mpunct 62173->62473 62174->62155 62221 1090084 GetLastError 62177->62221 62179 1084aef 62182 107d987 62179->62182 62253 107da27 20 API calls _Atexit 62179->62253 62182->62170 62186 107d6f2 62182->62186 62187 107d715 62186->62187 62188 107d702 62186->62188 62190 107d727 62187->62190 62197 107d73a 62187->62197 62288 107da27 20 API calls _Atexit 62188->62288 62290 107da27 20 API calls _Atexit 62190->62290 62191 107d707 62289 1079211 26 API calls _Mpunct 62191->62289 62193 107d75a 62292 107da27 20 API calls _Atexit 62193->62292 62194 107d76d 62269 1091f6d 62194->62269 62196 107d72c 62291 1079211 26 API calls _Mpunct 62196->62291 62197->62193 62197->62194 62201 107d772 62277 10917a2 62201->62277 62203 107d784 62204 107d971 62203->62204 62293 10917ce 62203->62293 62284 107923e IsProcessorFeaturePresent 62204->62284 62207 107d796 62207->62204 62300 10917fa 62207->62300 62208 107d97b 62209 1084ac9 21 API calls 62208->62209 62211 107d987 62209->62211 62213 107d996 62211->62213 62214 107d6f2 48 API calls 62211->62214 62212 107d7a8 62212->62204 62215 107d7b1 62212->62215 62213->62170 62214->62213 62216 107d839 62215->62216 62218 107d7d5 62215->62218 62220 107d711 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 62216->62220 62308 1091fbe 26 API calls 2 library calls 62216->62308 62218->62220 62307 1091fbe 26 API calls 2 library calls 62218->62307 62220->62170 62222 10900a3 62221->62222 62223 109009d 62221->62223 62227 10900fa SetLastError 62222->62227 62255 1085f50 62222->62255 62254 1092944 11 API calls 2 library calls 62223->62254 62230 1084ad1 62227->62230 62228 10900bd 62232 10872f5 _free 17 API calls 62228->62232 62230->62179 62230->62182 62240 1086524 62230->62240 62231 10900d2 62231->62228 62234 10900d9 62231->62234 62233 10900c3 62232->62233 62235 10900f1 SetLastError 62233->62235 62263 108fe72 20 API calls _Atexit 62234->62263 62235->62230 62237 10900e4 62238 10872f5 _free 17 API calls 62237->62238 62239 10900ea 62238->62239 62239->62227 62239->62235 62241 1086562 62240->62241 62245 1086532 ___crtLCMapStringA 62240->62245 62267 107da27 20 API calls _Atexit 62241->62267 62243 108654d RtlAllocateHeap 62244 1084ae5 62243->62244 62243->62245 62247 10872f5 62244->62247 62245->62241 62245->62243 62266 10893ad 7 API calls 2 library calls 62245->62266 62248 1087329 __dosmaperr 62247->62248 62249 1087300 RtlFreeHeap 62247->62249 62248->62179 62249->62248 62250 1087315 62249->62250 62268 107da27 20 API calls _Atexit 62250->62268 62252 108731b GetLastError 62252->62248 62253->62182 62254->62222 62260 1085f5d ___crtLCMapStringA 62255->62260 62256 1085f88 RtlAllocateHeap 62258 1085f9b 62256->62258 62256->62260 62257 1085f9d 62265 107da27 20 API calls _Atexit 62257->62265 62258->62228 62262 109299a 11 API calls 2 library calls 62258->62262 62260->62256 62260->62257 62264 10893ad 7 API calls 2 library calls 62260->62264 62262->62231 62263->62237 62264->62260 62265->62258 62266->62245 62267->62244 62268->62252 62270 1091f79 ___unDName 62269->62270 62271 1091faf ___unDName 62270->62271 62309 1085ce5 EnterCriticalSection 62270->62309 62271->62201 62273 1091f89 62274 1091f9c 62273->62274 62310 1091e8d 62273->62310 62328 1091fb5 LeaveCriticalSection std::_Lockit::~_Lockit 62274->62328 62278 10917ae 62277->62278 62279 10917c3 62277->62279 62461 107da27 20 API calls _Atexit 62278->62461 62279->62203 62281 10917b3 62462 1079211 26 API calls _Mpunct 62281->62462 62283 10917be 62283->62203 62285 1079249 62284->62285 62463 1079047 62285->62463 62288->62191 62289->62220 62290->62196 62291->62220 62292->62220 62294 10917da 62293->62294 62295 10917ef 62293->62295 62469 107da27 20 API calls _Atexit 62294->62469 62295->62207 62297 10917df 62470 1079211 26 API calls _Mpunct 62297->62470 62299 10917ea 62299->62207 62301 109181b 62300->62301 62302 1091806 62300->62302 62301->62212 62471 107da27 20 API calls _Atexit 62302->62471 62304 109180b 62472 1079211 26 API calls _Mpunct 62304->62472 62306 1091816 62306->62212 62307->62220 62308->62220 62309->62273 62312 1091ed9 __cftoe 62310->62312 62311 1091ee0 62314 1091f50 62311->62314 62315 1091f47 62311->62315 62312->62311 62313 1086524 ___crtLCMapStringA 21 API calls 62312->62313 62323 1091ef8 __cftoe 62313->62323 62316 1091f4d 62314->62316 62390 1091d32 62314->62390 62329 1091b5d 62315->62329 62320 10872f5 _free 20 API calls 62316->62320 62318 1091eff 62322 10872f5 _free 20 API calls 62318->62322 62321 1091f5b 62320->62321 62324 100adc4 ___crtLCMapStringA 5 API calls 62321->62324 62322->62311 62323->62318 62326 1091f25 62323->62326 62325 1091f69 62324->62325 62325->62274 62327 10872f5 _free 20 API calls 62326->62327 62327->62311 62328->62271 62330 1091b6c __cftoe 62329->62330 62331 10917fa __cftoe 26 API calls 62330->62331 62332 1091b82 62331->62332 62333 1091cfc 62332->62333 62334 10917a2 __cftoe 26 API calls 62332->62334 62335 107923e __Getctype 11 API calls 62333->62335 62388 1091d05 __cftoe 62333->62388 62337 1091b94 62334->62337 62338 1091d31 __cftoe 62335->62338 62336 10872f5 _free 20 API calls 62339 1091be4 62336->62339 62337->62333 62337->62336 62337->62388 62340 10917fa __cftoe 26 API calls 62338->62340 62345 1086524 ___crtLCMapStringA 21 API calls 62339->62345 62341 1091d57 62340->62341 62342 1091e82 62341->62342 62343 10917a2 __cftoe 26 API calls 62341->62343 62344 107923e __Getctype 11 API calls 62342->62344 62346 1091d69 62343->62346 62351 1091e8c __cftoe 62344->62351 62347 1091bfc 62345->62347 62346->62342 62349 10917ce __cftoe 26 API calls 62346->62349 62348 10872f5 _free 20 API calls 62347->62348 62354 1091c08 62348->62354 62350 1091d7b 62349->62350 62350->62342 62352 1091d84 62350->62352 62355 1086524 ___crtLCMapStringA 21 API calls 62351->62355 62374 1091ee0 62351->62374 62353 10872f5 _free 20 API calls 62352->62353 62357 1091d8f GetTimeZoneInformation 62353->62357 62354->62388 62426 108fc34 26 API calls _Mpunct 62354->62426 62370 1091ef8 __cftoe 62355->62370 62356 1091f50 62360 1091f4d 62356->62360 62361 1091d32 __cftoe 45 API calls 62356->62361 62369 1091dab 62357->62369 62380 1091e4c __cftoe 62357->62380 62359 1091f47 62364 1091b5d __cftoe 45 API calls 62359->62364 62365 10872f5 _free 20 API calls 62360->62365 62361->62360 62362 1091c32 62362->62333 62427 1093b19 26 API calls _Mpunct 62362->62427 62363 1091eff 62368 10872f5 _free 20 API calls 62363->62368 62364->62360 62366 1091f5b 62365->62366 62371 100adc4 ___crtLCMapStringA 5 API calls 62366->62371 62368->62374 62432 1086034 62369->62432 62370->62363 62375 1091f25 62370->62375 62373 1091f69 62371->62373 62373->62316 62374->62356 62374->62359 62377 10872f5 _free 20 API calls 62375->62377 62377->62374 62378 1091e1e WideCharToMultiByte 62378->62380 62379 1091c4b 62379->62333 62428 107d308 42 API calls UnDecorator::getZName 62379->62428 62380->62316 62383 1091c73 62384 1091cbf 62383->62384 62429 107d308 42 API calls UnDecorator::getZName 62383->62429 62384->62388 62431 1093b19 26 API calls _Mpunct 62384->62431 62387 1091c9a 62387->62384 62430 107d308 42 API calls UnDecorator::getZName 62387->62430 62388->62316 62391 1091d41 __cftoe 62390->62391 62392 10917fa __cftoe 26 API calls 62391->62392 62393 1091d57 62392->62393 62394 1091e82 62393->62394 62395 10917a2 __cftoe 26 API calls 62393->62395 62396 107923e __Getctype 11 API calls 62394->62396 62397 1091d69 62395->62397 62400 1091e8c __cftoe 62396->62400 62397->62394 62398 10917ce __cftoe 26 API calls 62397->62398 62399 1091d7b 62398->62399 62399->62394 62401 1091d84 62399->62401 62403 1086524 ___crtLCMapStringA 21 API calls 62400->62403 62419 1091ee0 62400->62419 62402 10872f5 _free 20 API calls 62401->62402 62405 1091d8f GetTimeZoneInformation 62402->62405 62415 1091ef8 __cftoe 62403->62415 62404 1091f50 62407 1091f4d 62404->62407 62408 1091d32 __cftoe 45 API calls 62404->62408 62414 1091dab 62405->62414 62424 1091e4c __cftoe 62405->62424 62406 1091f47 62410 1091b5d __cftoe 45 API calls 62406->62410 62411 10872f5 _free 20 API calls 62407->62411 62408->62407 62409 1091eff 62413 10872f5 _free 20 API calls 62409->62413 62410->62407 62412 1091f5b 62411->62412 62416 100adc4 ___crtLCMapStringA 5 API calls 62412->62416 62413->62419 62417 1086034 __Getcvt 38 API calls 62414->62417 62415->62409 62420 1091f25 62415->62420 62418 1091f69 62416->62418 62421 1091e00 WideCharToMultiByte 62417->62421 62418->62316 62419->62404 62419->62406 62422 10872f5 _free 20 API calls 62420->62422 62423 1091e1e WideCharToMultiByte 62421->62423 62422->62419 62423->62424 62424->62316 62426->62362 62427->62379 62428->62383 62429->62387 62430->62384 62431->62333 62437 1090000 GetLastError 62432->62437 62434 108603f 62457 1090489 62434->62457 62438 109001c 62437->62438 62439 1090016 62437->62439 62441 1085f50 __Getctype 20 API calls 62438->62441 62443 109006b SetLastError 62438->62443 62440 1092944 _Atexit 11 API calls 62439->62440 62440->62438 62442 109002e 62441->62442 62444 1090036 62442->62444 62445 109299a _Atexit 11 API calls 62442->62445 62443->62434 62446 10872f5 _free 20 API calls 62444->62446 62447 109004b 62445->62447 62448 109003c 62446->62448 62447->62444 62449 1090052 62447->62449 62450 1090077 SetLastError 62448->62450 62451 108fe72 _Atexit 20 API calls 62449->62451 62452 10864e1 _abort 35 API calls 62450->62452 62453 109005d 62451->62453 62455 1090083 62452->62455 62454 10872f5 _free 20 API calls 62453->62454 62456 1090064 62454->62456 62456->62443 62456->62450 62458 109049c 62457->62458 62459 108604f WideCharToMultiByte 62457->62459 62458->62459 62460 10987de __Toupper 38 API calls 62458->62460 62459->62378 62460->62459 62461->62281 62462->62283 62464 1079063 __fread_nolock _Atexit 62463->62464 62465 107908f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 62464->62465 62466 1079160 _Atexit 62465->62466 62467 100adc4 ___crtLCMapStringA 5 API calls 62466->62467 62468 107917e GetCurrentProcess TerminateProcess 62467->62468 62468->62208 62469->62297 62470->62299 62471->62304 62472->62306 62473->62174 62474 108dced 62477 108d597 62474->62477 62476 108dd00 62478 108d5a3 ___unDName 62477->62478 62479 108d5af 62478->62479 62480 108d5c4 62478->62480 62497 107da27 20 API calls _Atexit 62479->62497 62490 108dd05 62480->62490 62483 108d5b4 62498 1079211 26 API calls _Mpunct 62483->62498 62487 108d600 62489 108d5bf ___unDName 62487->62489 62500 107da27 20 API calls _Atexit 62487->62500 62489->62476 62501 10943c4 62490->62501 62493 108d5ec 62499 108d610 LeaveCriticalSection 62493->62499 62496 10872f5 _free 20 API calls 62496->62493 62497->62483 62498->62489 62499->62487 62500->62489 62502 10943d0 62501->62502 62503 10943e7 62501->62503 62572 107da27 20 API calls _Atexit 62502->62572 62504 10943ef 62503->62504 62505 1094406 62503->62505 62574 107da27 20 API calls _Atexit 62504->62574 62576 1092769 10 API calls 2 library calls 62505->62576 62509 10943d5 62573 1079211 26 API calls _Mpunct 62509->62573 62510 10943f4 62575 1079211 26 API calls _Mpunct 62510->62575 62511 109440d MultiByteToWideChar 62514 109443c 62511->62514 62515 109442c GetLastError 62511->62515 62517 1086524 ___crtLCMapStringA 21 API calls 62514->62517 62577 107d9f1 20 API calls 2 library calls 62515->62577 62519 1094444 62517->62519 62518 108dd1b 62518->62493 62525 108dd76 62518->62525 62520 109446c 62519->62520 62521 109444b MultiByteToWideChar 62519->62521 62523 10872f5 _free 20 API calls 62520->62523 62521->62520 62522 1094460 GetLastError 62521->62522 62578 107d9f1 20 API calls 2 library calls 62522->62578 62523->62518 62579 108dac1 62525->62579 62528 108dda8 62610 107da14 20 API calls _Atexit 62528->62610 62529 108ddc1 62596 1093df6 62529->62596 62532 108ddc6 62534 108ddcf 62532->62534 62535 108dde6 62532->62535 62533 108ddad 62611 107da27 20 API calls _Atexit 62533->62611 62612 107da14 20 API calls _Atexit 62534->62612 62609 108da2c CreateFileW 62535->62609 62539 108ddd4 62613 107da27 20 API calls _Atexit 62539->62613 62541 108de9c GetFileType 62542 108deee 62541->62542 62543 108dea7 GetLastError 62541->62543 62618 1093d3f 21 API calls 2 library calls 62542->62618 62616 107d9f1 20 API calls 2 library calls 62543->62616 62544 108de71 GetLastError 62615 107d9f1 20 API calls 2 library calls 62544->62615 62546 108de1f 62546->62541 62546->62544 62614 108da2c CreateFileW 62546->62614 62548 108deb5 CloseHandle 62548->62533 62550 108dede 62548->62550 62617 107da27 20 API calls _Atexit 62550->62617 62552 108de64 62552->62541 62552->62544 62554 108df0f 62556 108df5b 62554->62556 62619 108dc3d 72 API calls 3 library calls 62554->62619 62555 108dee3 62555->62533 62560 108df88 62556->62560 62620 108d7df 72 API calls 3 library calls 62556->62620 62559 108df81 62559->62560 62561 108df99 62559->62561 62621 108d4fb 62560->62621 62563 108dd43 62561->62563 62564 108e017 CloseHandle 62561->62564 62563->62496 62636 108da2c CreateFileW 62564->62636 62566 108e042 62567 108e04c GetLastError 62566->62567 62568 108e078 62566->62568 62637 107d9f1 20 API calls 2 library calls 62567->62637 62568->62563 62570 108e058 62638 1093f08 21 API calls 2 library calls 62570->62638 62572->62509 62573->62518 62574->62510 62575->62518 62576->62511 62577->62518 62578->62520 62580 108dafc 62579->62580 62581 108dae2 62579->62581 62639 108da51 62580->62639 62581->62580 62646 107da27 20 API calls _Atexit 62581->62646 62584 108daf1 62647 1079211 26 API calls _Mpunct 62584->62647 62586 108db34 62587 108db63 62586->62587 62648 107da27 20 API calls _Atexit 62586->62648 62593 108dbb6 62587->62593 62650 108a646 26 API calls _Mpunct 62587->62650 62590 108dbb1 62590->62593 62594 107923e __Getctype 11 API calls 62590->62594 62591 108db58 62649 1079211 26 API calls _Mpunct 62591->62649 62593->62528 62593->62529 62595 108dc3c 62594->62595 62597 1093e02 ___unDName 62596->62597 62653 1085ce5 EnterCriticalSection 62597->62653 62600 1093e2e 62654 1093bd5 62600->62654 62602 1093e09 62602->62600 62605 1093e9c EnterCriticalSection 62602->62605 62607 1093e50 62602->62607 62604 1093e79 ___unDName 62604->62532 62606 1093ea9 LeaveCriticalSection 62605->62606 62605->62607 62606->62602 62661 1093eff 62607->62661 62609->62546 62610->62533 62611->62563 62612->62539 62613->62533 62614->62552 62615->62533 62616->62548 62617->62555 62618->62554 62619->62556 62620->62559 62667 1093f99 62621->62667 62623 108d511 62680 1093f08 21 API calls 2 library calls 62623->62680 62624 108d50b 62624->62623 62625 108d543 62624->62625 62627 1093f99 __fread_nolock 26 API calls 62624->62627 62625->62623 62628 1093f99 __fread_nolock 26 API calls 62625->62628 62631 108d53a 62627->62631 62632 108d54f FindCloseChangeNotification 62628->62632 62629 108d569 62630 108d58b 62629->62630 62681 107d9f1 20 API calls 2 library calls 62629->62681 62630->62563 62634 1093f99 __fread_nolock 26 API calls 62631->62634 62632->62623 62635 108d55b GetLastError 62632->62635 62634->62625 62635->62623 62636->62566 62637->62570 62638->62568 62642 108da69 62639->62642 62640 108da84 62640->62586 62642->62640 62651 107da27 20 API calls _Atexit 62642->62651 62643 108daa8 62652 1079211 26 API calls _Mpunct 62643->62652 62645 108dab3 62645->62586 62646->62584 62647->62580 62648->62591 62649->62587 62650->62590 62651->62643 62652->62645 62653->62602 62655 1085f50 __Getctype 20 API calls 62654->62655 62658 1093be7 62655->62658 62656 1093bf4 62657 10872f5 _free 20 API calls 62656->62657 62660 1093c46 62657->62660 62658->62656 62665 1092c6f 11 API calls 2 library calls 62658->62665 62660->62607 62664 1093d1c EnterCriticalSection 62660->62664 62666 1085d2d LeaveCriticalSection 62661->62666 62663 1093f06 62663->62604 62664->62607 62665->62658 62666->62663 62668 1093fbb 62667->62668 62669 1093fa6 62667->62669 62674 1093fe0 62668->62674 62684 107da14 20 API calls _Atexit 62668->62684 62682 107da14 20 API calls _Atexit 62669->62682 62672 1093fab 62683 107da27 20 API calls _Atexit 62672->62683 62674->62624 62675 1093feb 62685 107da27 20 API calls _Atexit 62675->62685 62676 1093fb3 62676->62624 62678 1093ff3 62686 1079211 26 API calls _Mpunct 62678->62686 62680->62629 62681->62630 62682->62672 62683->62676 62684->62675 62685->62678 62686->62676 62687 fa9d50 63091 fa9910 62687->63091 63092 fafb90 37 API calls 63091->63092 63093 fa9971 63092->63093 63944 fbf7f0 63093->63944 63098 f94fa0 29 API calls 63099 fa999c 63098->63099 63100 fa99bd 63099->63100 64029 f8ada0 26 API calls collate 63099->64029 63102 fa99fc __fread_nolock 63100->63102 64030 f8ada0 26 API calls collate 63100->64030 63969 fac910 63102->63969 64037 10706c0 63944->64037 63947 fbf860 __fread_nolock 64039 f88d70 87 API calls 63947->64039 63948 f89f40 29 API calls 63951 fbf983 63948->63951 63950 fbf93c 63950->63948 63954 100adc4 ___crtLCMapStringA 5 API calls 63951->63954 63952 fbf884 GetLastError 64040 f8c5c0 37 API calls 63952->64040 63956 fa9980 63954->63956 63955 fbf8a3 64041 fa50a0 85 API calls 63955->64041 63964 10112f0 63956->63964 63958 fbf8ad 64042 f88c60 29 API calls 63958->64042 63960 fbf8bf 63961 106f8c4 ___std_exception_copy 26 API calls 63960->63961 63962 fbf8fc 63961->63962 64043 f8c870 27 API calls __CxxThrowException@8 63962->64043 63965 10112f8 63964->63965 63967 fa998b 63965->63967 64044 ff2328 28 API calls 2 library calls 63965->64044 63967->63098 63968 1011328 64045 f8bb70 63969->64045 63977 fac9eb 64029->63100 64030->63102 64038 fbf841 GetModuleFileNameW 64037->64038 64038->63947 64038->63950 64039->63952 64040->63955 64041->63958 64042->63960 64044->63968 64097 f83100 64045->64097 64047 f8bb9e 64104 f8bea0 64047->64104 64049 f8bc12 64052 f8bc1e 64049->64052 64121 ff2b28 4 API calls 2 library calls 64049->64121 64051 f82fe0 37 API calls 64051->64049 64054 f8b2b0 64052->64054 64055 100ade3 new 9 API calls 64054->64055 64056 f8b2e3 64055->64056 64057 ff2644 std::locale::_Init 44 API calls 64056->64057 64058 f8b2fa 64057->64058 64059 fadc40 64058->64059 64060 fadcc0 64059->64060 64061 fadce7 64059->64061 64141 107e950 26 API calls _Mpunct 64060->64141 64063 100adc4 ___crtLCMapStringA 5 API calls 64061->64063 64064 fac9d0 64063->64064 64065 fade00 64064->64065 64066 fade2e 64065->64066 64067 fadea3 64065->64067 64142 ff30da 64066->64142 64067->63977 64098 f82fe0 37 API calls 64097->64098 64099 f83175 64098->64099 64100 100ade3 new 9 API calls 64099->64100 64101 f8317c 64100->64101 64102 ff2644 std::locale::_Init 44 API calls 64101->64102 64103 f83196 64102->64103 64103->64047 64122 ff2395 64104->64122 64107 ff2395 std::_Lockit::_Lockit 2 API calls 64108 f8befe 64107->64108 64110 ff23ed std::_Lockit::~_Lockit 2 API calls 64108->64110 64114 f8bf1e std::locale::_Locimp::_Makexloc 64110->64114 64111 f8bfb5 64112 100adc4 ___crtLCMapStringA 5 API calls 64111->64112 64115 f8bbc3 64112->64115 64113 f8bf58 64128 ff23ed 64113->64128 64114->64113 64135 f82960 77 API calls 3 library calls 64114->64135 64115->64049 64115->64051 64117 f8bf68 64118 f8bf94 64117->64118 64119 1071273 __CxxThrowException@8 KiUserExceptionDispatcher 64117->64119 64136 ff2610 9 API calls new 64118->64136 64119->64118 64121->64052 64123 ff23ab 64122->64123 64124 ff23a4 64122->64124 64125 f8bedb 64123->64125 64138 ff3142 EnterCriticalSection 64123->64138 64137 1085d44 EnterCriticalSection std::_Lockit::_Lockit 64124->64137 64125->64107 64125->64114 64129 1085d4d 64128->64129 64130 ff23f7 64128->64130 64140 1085d2d LeaveCriticalSection 64129->64140 64131 ff240a 64130->64131 64139 ff3150 LeaveCriticalSection 64130->64139 64131->64111 64134 1085d54 64134->64111 64135->64117 64136->64113 64137->64125 64138->64125 64139->64131 64140->64134 64141->64061 66944 fabf50 66945 fa9340 134 API calls 66944->66945 66946 fabfa6 66945->66946 67013 fbe920 66946->67013 66948 fabfb8 66949 fac111 66948->66949 66952 f89f40 29 API calls 66948->66952 66950 f8a260 collate 29 API calls 66949->66950 66951 fac13e 66950->66951 67041 fb00d0 66951->67041 66954 fac015 66952->66954 66956 f8a260 collate 29 API calls 66954->66956 66958 fac046 66956->66958 66957 fb3f70 29 API calls 66959 fac19d 66957->66959 66960 fbfd90 30 API calls 66958->66960 66961 fac1df 66959->66961 66964 faf340 9 API calls 66959->66964 66963 fac07e 66960->66963 66962 fb4ef0 56 API calls 66961->66962 66965 fac1ed 66962->66965 67055 faf9e0 56 API calls ___crtLCMapStringA 66963->67055 66967 fac1b7 66964->66967 66969 fac20b 66965->66969 67060 f8a9f0 26 API calls collate 66965->67060 67059 fb4070 29 API calls 3 library calls 66967->67059 66973 fac248 66969->66973 67061 f8a9f0 26 API calls collate 66969->67061 66970 fac098 66974 fac0b6 66970->66974 67056 f8a9f0 26 API calls collate 66970->67056 66971 fac1ce 66976 faf3e0 26 API calls 66971->66976 66978 f8a260 collate 29 API calls 66973->66978 66975 fac0ef 66974->66975 67057 f8a9f0 26 API calls collate 66974->67057 66975->66949 67058 f8ada0 26 API calls collate 66975->67058 66976->66961 66981 fac275 66978->66981 66983 fa8360 229 API calls 66981->66983 66984 fac28a 66983->66984 66985 fac2ac 66984->66985 67062 f8a9f0 26 API calls collate 66984->67062 66987 fa9340 134 API calls 66985->66987 66988 fac2b7 66987->66988 66989 faf440 29 API calls 66988->66989 66990 fac2c7 66989->66990 66991 fac2dd std::ios_base::_Tidy 66990->66991 67063 fb1df0 26 API calls collate 66990->67063 66992 fac30e 66991->66992 67064 f8a9f0 26 API calls collate 66991->67064 66995 f8a260 collate 29 API calls 66992->66995 66996 fac342 66995->66996 67050 fb0220 66996->67050 67014 10706c0 __fread_nolock 67013->67014 67015 fbe964 GetVersionExW 67014->67015 67016 fbedd6 67015->67016 67017 fbe986 GetModuleHandleW GetProcAddress 67015->67017 67020 100adc4 ___crtLCMapStringA 5 API calls 67016->67020 67018 fbe9ac GetSystemInfo 67017->67018 67019 fbe9a1 GetNativeSystemInfo 67017->67019 67021 fbe9b9 67018->67021 67019->67021 67022 fbede6 67020->67022 67023 fbedcc 67021->67023 67025 fbe9d3 67021->67025 67022->66948 67070 fbe7b0 76 API calls UnDecorator::getTemplateConstant 67023->67070 67026 fbea2a 67025->67026 67027 fbeb79 67025->67027 67032 fbe9f5 67025->67032 67029 fbea3f 67026->67029 67030 fbeaa9 GetModuleHandleW GetProcAddress 67026->67030 67028 fbeb91 GetSystemMetrics 67027->67028 67027->67032 67028->67032 67029->67030 67033 fbead9 67030->67033 67069 fbe850 51 API calls UnDecorator::getTemplateConstant 67032->67069 67033->67032 67034 fbedaa 67036 100adc4 ___crtLCMapStringA 5 API calls 67034->67036 67035 fbed66 67035->67034 67037 fbed8d 67035->67037 67038 fbedc8 67036->67038 67039 100adc4 ___crtLCMapStringA 5 API calls 67037->67039 67038->66948 67040 fbeda6 67039->67040 67040->66948 67045 fb0131 67041->67045 67042 fb01f4 67043 100adc4 ___crtLCMapStringA 5 API calls 67042->67043 67044 fac171 67043->67044 67044->66957 67045->67042 67071 fb81d0 29 API calls std::invalid_argument::invalid_argument 67045->67071 67048 fb0189 67048->67042 67072 f98430 29 API calls std::invalid_argument::invalid_argument 67048->67072 67073 fb81d0 29 API calls std::invalid_argument::invalid_argument 67048->67073 67051 ff2644 std::locale::_Init 44 API calls 67050->67051 67052 fb0255 67051->67052 67074 fb2e00 67052->67074 67055->66970 67056->66974 67057->66975 67058->66949 67059->66971 67060->66969 67061->66973 67062->66985 67063->66991 67064->66992 67069->67035 67070->67016 67071->67048 67072->67048 67073->67048 67075 fb3f70 29 API calls 67074->67075 67076 fb2e48 67075->67076 67077 faf340 9 API calls 67076->67077 67084 fb2e54 67076->67084 67078 fb2e67 67077->67078 67110 fb4070 29 API calls 3 library calls 67078->67110 67080 fb2e74 67082 faf3e0 26 API calls 67080->67082 67082->67084 67087 fb6390 67084->67087 67111 fb7920 67087->67111 67110->67080 67112 fb796f __fread_nolock 67111->67112 67113 f8bb70 87 API calls 67112->67113 67114 fb79ac 67113->67114 67115 f8b2b0 44 API calls 67114->67115 67116 fb79ed 67115->67116 67134 fb8250 67116->67134 67135 fb8295 67134->67135 67137 f8e1f0 5 API calls 67135->67137 67139 fb82be 67135->67139 67137->67139 67149 fc1470 67150 fc148f 67149->67150 67151 fc14d9 67149->67151 67157 fcfe30 67150->67157 67152 fc1495 67152->67151 67154 fc14b7 67152->67154 67371 fc1850 67152->67371 67154->67151 67382 fc12c0 GetTickCount 67154->67382 67158 fcfe9f 67157->67158 67159 fcfea8 67157->67159 67158->67159 67166 fcfec7 67158->67166 67160 100adc4 ___crtLCMapStringA 5 API calls 67159->67160 67161 fcfec3 67160->67161 67161->67152 67162 fd02f5 67164 100adc4 ___crtLCMapStringA 5 API calls 67162->67164 67165 fd0307 67164->67165 67165->67152 67166->67162 67383 fd2320 67166->67383 67167 fd0ff4 67168 100adc4 ___crtLCMapStringA 5 API calls 67167->67168 67169 fd100e 67168->67169 67169->67152 67170 fcffd1 67170->67167 67175 fd0070 67170->67175 67425 fd7f80 42 API calls ___swprintf_l 67170->67425 67172 fd004d 67173 fd005a 67172->67173 67172->67175 67174 100adc4 ___crtLCMapStringA 5 API calls 67173->67174 67176 fd006c 67174->67176 67178 fd0101 67175->67178 67426 fd7f80 42 API calls ___swprintf_l 67175->67426 67176->67152 67181 fd012c 67178->67181 67185 fd014a 67178->67185 67179 fd00de 67179->67178 67180 fd00eb 67179->67180 67182 100adc4 ___crtLCMapStringA 5 API calls 67180->67182 67427 fd1e10 42 API calls ___from_strstr_to_strchr 67181->67427 67184 fd00fd 67182->67184 67184->67152 67186 fd0190 67185->67186 67190 fd013c 67185->67190 67428 fcd340 68 API calls ___swprintf_l 67186->67428 67187 fd031a 67192 fd0345 67187->67192 67193 fd0371 67187->67193 67189 fd022d 67429 fd1ee0 42 API calls 2 library calls 67189->67429 67190->67187 67190->67189 67191 fd019b 67195 100adc4 ___crtLCMapStringA 5 API calls 67191->67195 67431 fd7f80 42 API calls ___swprintf_l 67192->67431 67432 fd7f80 42 API calls ___swprintf_l 67193->67432 67198 fd01b0 67195->67198 67198->67152 67199 fd058f 67206 fd05dc 67199->67206 67433 febf20 109 API calls 2 library calls 67199->67433 67201 fd0233 ___from_strstr_to_strchr collate 67201->67162 67208 fd02e4 _Yarn _strstr 67201->67208 67430 fd7f80 42 API calls ___swprintf_l 67201->67430 67203 fd082c 67205 fd081e 67203->67205 67220 fd0893 67203->67220 67226 fd086e 67203->67226 67204 fd07d9 67204->67203 67204->67205 67207 fd0802 67204->67207 67205->67162 67210 fd092f 67205->67210 67206->67167 67206->67204 67213 fd069b 67206->67213 67231 fd06bf 67206->67231 67235 fd0754 67206->67235 67437 fd7f80 42 API calls ___swprintf_l 67207->67437 67208->67162 67208->67199 67208->67208 67209 fd8030 ___swprintf_l 42 API calls 67208->67209 67209->67199 67390 fd19b0 67210->67390 67434 fcd340 68 API calls ___swprintf_l 67213->67434 67214 fd078f 67435 fcd340 68 API calls ___swprintf_l 67214->67435 67215 fd093d 67215->67167 67224 fd19b0 42 API calls 67215->67224 67239 fd096b 67215->67239 67218 fd079a 67223 100adc4 ___crtLCMapStringA 5 API calls 67218->67223 67219 fd06a6 67225 100adc4 ___crtLCMapStringA 5 API calls 67219->67225 67221 fd08a5 67220->67221 67222 fd08d4 67220->67222 67439 fd7f80 42 API calls ___swprintf_l 67221->67439 67440 fd7f80 42 API calls ___swprintf_l 67222->67440 67228 fd07af 67223->67228 67224->67239 67230 fd06bb 67225->67230 67438 fd7f80 42 API calls ___swprintf_l 67226->67438 67228->67152 67230->67152 67233 fd07b3 67231->67233 67231->67235 67436 fcd340 68 API calls ___swprintf_l 67233->67436 67235->67204 67235->67214 67236 fd07c0 67237 100adc4 ___crtLCMapStringA 5 API calls 67236->67237 67238 fd07d5 67237->67238 67238->67152 67239->67167 67240 fd19b0 42 API calls 67239->67240 67241 fd0ac1 67240->67241 67241->67167 67242 fd0b34 67241->67242 67243 fd0b4a 67241->67243 67245 100adc4 ___crtLCMapStringA 5 API calls 67242->67245 67246 fd0c83 67243->67246 67258 fd0c23 67243->67258 67441 fc3890 28 API calls 67243->67441 67248 fd0b46 67245->67248 67246->67167 67393 fd1c40 67246->67393 67247 fd0cb5 67247->67167 67412 fd1a20 67247->67412 67248->67152 67250 fd0c57 67250->67167 67251 fd19b0 42 API calls 67250->67251 67251->67246 67253 fd19b0 42 API calls 67253->67250 67254 fd0cc8 67254->67167 67255 fd0cf6 67254->67255 67267 fd10b0 67254->67267 67256 fd0cff 67255->67256 67257 fd0e9a 67255->67257 67261 fd0d08 67256->67261 67288 fd0d94 67256->67288 67260 fd103e 67257->67260 67263 fd0eb4 67257->67263 67258->67246 67258->67250 67258->67253 67259 fd0ba5 67259->67258 67262 fd19b0 42 API calls 67259->67262 67264 fd19b0 42 API calls 67260->67264 67261->67167 67270 fd0d20 67261->67270 67262->67259 67272 fd0ec5 67263->67272 67306 fd0ee9 67263->67306 67265 fd1049 67264->67265 67265->67167 67268 fd1050 67265->67268 67266 fd0df4 67266->67167 67271 fd0e10 67266->67271 67444 fd3400 42 API calls 67266->67444 67269 fd114c 67267->67269 67282 fd19b0 42 API calls 67267->67282 67273 fd17f0 86 API calls 67268->67273 67274 fd1171 67269->67274 67279 fd19b0 42 API calls 67269->67279 67275 fd17f0 86 API calls 67270->67275 67271->67167 67284 fd0e35 67271->67284 67446 fcd340 68 API calls ___swprintf_l 67272->67446 67278 fd1060 67273->67278 67274->67167 67297 fd118e 67274->67297 67298 fd11a9 67274->67298 67280 fd0d30 67275->67280 67286 fd108d 67278->67286 67287 fd106c 67278->67287 67279->67274 67289 fd0d5d 67280->67289 67290 fd0d3c 67280->67290 67281 fd0f3e 67281->67167 67447 fd3400 42 API calls 67281->67447 67291 fd1134 67282->67291 67310 fd17f0 86 API calls 67284->67310 67285 fd0ed0 67293 100adc4 ___crtLCMapStringA 5 API calls 67285->67293 67452 fd4cc0 69 API calls 67286->67452 67451 fcd340 68 API calls ___swprintf_l 67287->67451 67288->67266 67295 fd19b0 42 API calls 67288->67295 67443 fd4cc0 69 API calls 67289->67443 67442 fcd340 68 API calls ___swprintf_l 67290->67442 67291->67269 67300 fd113b 67291->67300 67302 fd0ee5 67293->67302 67295->67266 67453 fd1e10 42 API calls ___from_strstr_to_strchr 67297->67453 67313 fd119e 67298->67313 67454 fd3400 42 API calls 67298->67454 67301 100adc4 ___crtLCMapStringA 5 API calls 67300->67301 67309 fd1148 67301->67309 67302->67152 67303 fd1077 67311 100adc4 ___crtLCMapStringA 5 API calls 67303->67311 67304 fd0d47 67312 100adc4 ___crtLCMapStringA 5 API calls 67304->67312 67306->67281 67308 fd19b0 42 API calls 67306->67308 67308->67281 67309->67152 67315 fd0e53 67310->67315 67316 fd1089 67311->67316 67317 fd0d59 67312->67317 67313->67167 67318 fd1369 67313->67318 67333 fd11e8 67313->67333 67314 fd0f51 67314->67167 67320 fd0f76 67314->67320 67341 fd0f9a 67314->67341 67321 fd0e5d 67315->67321 67353 fd0e7f 67315->67353 67316->67152 67317->67152 67318->67167 67343 fd1383 67318->67343 67319 fd0d86 67329 fd14cc 67319->67329 67457 fd5de0 67319->67457 67448 fcd340 68 API calls ___swprintf_l 67320->67448 67445 fcd340 68 API calls ___swprintf_l 67321->67445 67325 fd1486 67331 fd6070 72 API calls 67325->67331 67326 fd0f81 67332 100adc4 ___crtLCMapStringA 5 API calls 67326->67332 67327 fd0e68 67334 100adc4 ___crtLCMapStringA 5 API calls 67327->67334 67330 100adc4 ___crtLCMapStringA 5 API calls 67329->67330 67335 fd1512 67330->67335 67338 fd148c 67331->67338 67339 fd0f96 67332->67339 67336 fd1218 67333->67336 67337 fd1309 67333->67337 67340 fd0e7b 67334->67340 67335->67152 67336->67167 67344 fd1232 67336->67344 67342 fd1358 67337->67342 67362 fd12f6 67337->67362 67338->67329 67347 fcd3e0 68 API calls 67338->67347 67339->67152 67340->67152 67341->67167 67351 fd17f0 86 API calls 67341->67351 67345 100adc4 ___crtLCMapStringA 5 API calls 67342->67345 67350 fd13a9 67343->67350 67343->67362 67358 fd19b0 42 API calls 67344->67358 67370 fd123a 67344->67370 67349 fd1365 67345->67349 67347->67329 67349->67152 67354 100adc4 ___crtLCMapStringA 5 API calls 67350->67354 67356 fd0fe0 67351->67356 67456 fd4cc0 69 API calls 67353->67456 67355 fd13b6 67354->67355 67355->67152 67359 fd0fe9 67356->67359 67360 fd1012 67356->67360 67358->67370 67449 fcd340 68 API calls ___swprintf_l 67359->67449 67450 fd4cc0 69 API calls 67360->67450 67417 fd17f0 67362->67417 67363 fd12e3 67368 100adc4 ___crtLCMapStringA 5 API calls 67363->67368 67369 fd12f2 67368->67369 67369->67152 67370->67362 67370->67363 67372 fcd3e0 68 API calls 67371->67372 67373 fc186c 67372->67373 67526 fc1550 79 API calls 67373->67526 67375 fc1881 67376 fc18cc 67375->67376 67527 fc5fa0 67375->67527 67376->67154 67380 fc18bb 67380->67376 67535 fcfa10 67380->67535 67382->67151 67384 fd2344 67383->67384 67388 fd2396 67384->67388 67389 fd23da 67384->67389 67460 fd3870 95 API calls 67384->67460 67387 fd23fa 67387->67170 67388->67389 67461 fd3870 95 API calls 67388->67461 67389->67170 67462 fd8050 42 API calls ___swprintf_l 67390->67462 67392 fd19c1 67392->67215 67394 fd1c7c 67393->67394 67395 fd1c6a 67393->67395 67463 fd7530 27 API calls 67394->67463 67396 100adc4 ___crtLCMapStringA 5 API calls 67395->67396 67398 fd1c78 67396->67398 67398->67247 67399 fd1c92 67400 fd1cbc 67399->67400 67401 fd1c9b 67399->67401 67404 fd8030 ___swprintf_l 42 API calls 67400->67404 67464 fcd340 68 API calls ___swprintf_l 67401->67464 67403 fd1ca6 67405 100adc4 ___crtLCMapStringA 5 API calls 67403->67405 67407 fd1d00 67404->67407 67406 fd1cb8 67405->67406 67406->67247 67408 fd1d36 67407->67408 67409 fd19b0 42 API calls 67407->67409 67410 100adc4 ___crtLCMapStringA 5 API calls 67408->67410 67409->67408 67411 fd1d4a 67410->67411 67411->67247 67414 fd1a3f ___from_strstr_to_strchr 67412->67414 67413 fd1c2c 67413->67254 67414->67413 67415 108435e 42 API calls 67414->67415 67416 fd19b0 42 API calls 67414->67416 67415->67414 67416->67414 67419 fd1830 _Yarn 67417->67419 67465 fcd820 67419->67465 67425->67172 67426->67179 67427->67190 67428->67191 67429->67201 67430->67208 67431->67208 67432->67208 67433->67206 67434->67219 67435->67218 67436->67236 67437->67205 67438->67205 67439->67205 67440->67205 67441->67259 67442->67304 67443->67319 67444->67271 67445->67327 67446->67285 67447->67314 67448->67326 67449->67167 67450->67319 67451->67303 67452->67319 67453->67313 67454->67313 67456->67319 67525 fc4550 GetTickCount 67457->67525 67459 fd5deb 67459->67325 67460->67388 67461->67387 67462->67392 67463->67399 67464->67403 67470 fcd6c0 67465->67470 67466 fcd851 67480 fcd9a0 67470->67480 67473 fcd6fc WSAGetLastError 67475 fcd71c 67473->67475 67476 fcd70c 67473->67476 67474 fcd730 67474->67466 67476->67466 67481 fcd9d6 67480->67481 67486 fcd6da send 67480->67486 67481->67486 67489 fccc60 67481->67489 67486->67473 67486->67474 67491 fccc9e 67489->67491 67525->67459 67526->67375 67541 fc97c0 67527->67541 67530 fc5fe8 67533 fc18a6 67530->67533 67649 fc6150 75 API calls 67530->67649 67533->67376 67534 fc4800 78 API calls 67533->67534 67534->67380 67536 fcfa22 67535->67536 67537 fc8e20 122 API calls 67536->67537 67538 fcfa38 67537->67538 67539 fcfa49 67538->67539 68050 fc6150 75 API calls 67538->68050 67539->67376 67542 fc980d 67541->67542 67544 fc5fb9 67542->67544 67650 fc9040 67542->67650 67544->67530 67544->67533 67626 fc8e20 67544->67626 67545 fc983e 67545->67544 67655 fcb800 67545->67655 67547 fc9986 67547->67544 67549 fc99db ___from_strstr_to_strchr 67547->67549 67784 fd7f80 42 API calls ___swprintf_l 67547->67784 67549->67544 67554 fc9a6b 67549->67554 67786 fcb350 42 API calls 3 library calls 67549->67786 67552 fc99b0 67552->67544 67552->67549 67785 1079658 46 API calls UnDecorator::getTemplateConstant 67552->67785 67553 fc9ab0 67787 fcd340 68 API calls ___swprintf_l 67553->67787 67554->67544 67554->67553 67556 fc9ac3 67554->67556 67557 fc9b22 67556->67557 67565 fc9ae2 67556->67565 67788 fca300 47 API calls 2 library calls 67556->67788 67561 fc9b79 67557->67561 67557->67565 67789 fcaf30 68 API calls 3 library calls 67557->67789 67561->67544 67561->67565 67790 fcaf30 68 API calls 3 library calls 67561->67790 67563 fc9ce4 67563->67544 67739 fca860 67563->67739 67565->67544 67711 fcb430 67565->67711 67566 fc9d04 67566->67544 67746 fcab10 67566->67746 67571 fc9d6c 67573 fca5e0 68 API calls 67571->67573 67574 fc9d8b 67571->67574 67572 fca5e0 68 API calls 67572->67571 67573->67574 67574->67544 67575 fc9e49 67574->67575 67581 fc9ebb 67574->67581 67576 fc9ea9 67575->67576 67791 fd3cb0 42 API calls 67575->67791 67577 fc63c0 GetTickCount 67576->67577 67577->67544 67579 fc9e71 67580 fcc670 42 API calls 67579->67580 67582 fc9e77 67580->67582 67581->67544 67755 fcbf80 67581->67755 67582->67544 67584 fca035 67586 fca0d4 67584->67586 67793 fc5540 87 API calls 67584->67793 67862 fd5f20 67626->67862 67628 fc8e41 67628->67530 67629 fc8e8a 67639 fc8e97 67629->67639 67868 fc4550 GetTickCount 67629->67868 67631 fc8e32 67631->67628 67631->67629 67882 fd7f80 42 API calls ___swprintf_l 67631->67882 67632 fc8eb0 67634 fc8ec5 67632->67634 67635 fc8ee1 67632->67635 67869 fcdc10 67634->67869 67636 fd5f20 GetTickCount 67635->67636 67638 fc8ee9 67636->67638 67642 fd5f20 GetTickCount 67638->67642 67639->67530 67640 fc8edc 67640->67530 67641 fc8ed5 67641->67640 67926 fc4550 GetTickCount 67641->67926 67643 fc8ef1 67642->67643 67883 fce4a0 67643->67883 67646 fc8f15 67646->67530 67647 fc8f07 67925 fc8f30 68 API calls 67647->67925 67649->67533 67652 fc9051 67650->67652 67651 fc905a 67651->67545 67652->67651 67801 fc4550 GetTickCount 67652->67801 67654 fc90bb 67654->67545 67656 fcb871 _strpbrk 67655->67656 67657 fcb89c 67656->67657 67658 fcb878 67656->67658 67803 fc43f0 44 API calls 67657->67803 67802 fcd340 68 API calls ___swprintf_l 67658->67802 67661 fcb883 67663 100adc4 ___crtLCMapStringA 5 API calls 67661->67663 67662 fcb8b1 67664 fcb996 67662->67664 67679 fcb8d6 collate 67662->67679 67665 fcb898 67663->67665 67805 fc43f0 44 API calls 67664->67805 67665->67547 67667 fcb9b8 67668 fcb9e4 67667->67668 67669 fcb9c0 67667->67669 67670 fcb9ed 67668->67670 67678 fcbb50 67668->67678 67806 fcd340 68 API calls ___swprintf_l 67669->67806 67807 fc43f0 44 API calls 67670->67807 67672 fcb9cb 67674 100adc4 ___crtLCMapStringA 5 API calls 67672->67674 67676 fcb9e0 67674->67676 67675 fcba04 67677 fcba0c 67675->67677 67695 fcb958 _Yarn ___from_strstr_to_strchr collate 67675->67695 67676->67547 67808 fcd340 68 API calls ___swprintf_l 67677->67808 67681 fcd3e0 68 API calls 67678->67681 67678->67695 67684 fcb934 67679->67684 67679->67695 67683 fcbb87 67681->67683 67682 fcba17 67685 100adc4 ___crtLCMapStringA 5 API calls 67682->67685 67809 fd7f80 42 API calls ___swprintf_l 67683->67809 67804 fcd340 68 API calls ___swprintf_l 67684->67804 67687 fcba2c 67685->67687 67687->67547 67689 fcb93f 67691 100adc4 ___crtLCMapStringA 5 API calls 67689->67691 67690 fcbbc4 67692 100adc4 ___crtLCMapStringA 5 API calls 67690->67692 67693 fcb954 67691->67693 67694 fcbbd6 67692->67694 67693->67547 67694->67547 67695->67690 67709 fcbd87 _Yarn 67695->67709 67710 fcbde2 67695->67710 67697 100adc4 ___crtLCMapStringA 5 API calls 67698 fcbf10 67697->67698 67698->67547 67700 fcbe53 67811 1083fbd 42 API calls UnDecorator::getZName 67700->67811 67701 fcbe05 ___swprintf_l ___from_strstr_to_strchr 67701->67700 67702 fcbf00 67701->67702 67703 fcd3e0 68 API calls 67701->67703 67706 fcbe7e ___from_strstr_to_strchr collate 67701->67706 67702->67697 67703->67700 67705 fcbe70 67705->67706 67707 fcd3e0 68 API calls 67705->67707 67812 fca550 68 API calls 67706->67812 67707->67706 67708 fcd3e0 68 API calls 67708->67710 67709->67708 67810 fcb6b0 42 API calls ___from_strstr_to_strchr 67710->67810 67813 fc43f0 44 API calls 67711->67813 67713 fcb45d ___from_strstr_to_strchr _strrchr 67714 fcb614 67713->67714 67715 fcb4c6 67713->67715 67716 fcb5b2 67714->67716 67815 1083f65 42 API calls UnDecorator::getZName 67714->67815 67715->67716 67729 fd8030 ___swprintf_l 42 API calls 67715->67729 67733 fcb53b 67715->67733 67718 100adc4 ___crtLCMapStringA 5 API calls 67716->67718 67720 fcb610 67718->67720 67719 fcb627 67721 fcb631 67719->67721 67722 fcb683 67719->67722 67720->67563 67721->67716 67725 fcb657 67721->67725 67817 fcd340 68 API calls ___swprintf_l 67722->67817 67816 fcd340 68 API calls ___swprintf_l 67725->67816 67726 fcb68e 67730 100adc4 ___crtLCMapStringA 5 API calls 67726->67730 67727 fcb595 67727->67716 67731 fcb59e 67727->67731 67729->67733 67734 fcb6a3 67730->67734 67735 100adc4 ___crtLCMapStringA 5 API calls 67731->67735 67732 fcb662 67736 100adc4 ___crtLCMapStringA 5 API calls 67732->67736 67814 fd7f80 42 API calls ___swprintf_l 67733->67814 67734->67563 67737 fcb5ae 67735->67737 67738 fcb677 67736->67738 67737->67563 67738->67563 67741 fca874 67739->67741 67743 fca891 67741->67743 67818 fe90a0 73 API calls ___crtLCMapStringA 67741->67818 67742 fca915 67742->67743 67744 fcd3e0 68 API calls 67742->67744 67743->67566 67745 fca92d 67744->67745 67745->67566 67747 fc9d3a 67746->67747 67748 fcab2f ___from_strstr_to_strchr 67746->67748 67747->67544 67751 fca5e0 67747->67751 67748->67747 67750 fcd3e0 68 API calls 67748->67750 67819 fcac20 68 API calls 2 library calls 67748->67819 67750->67748 67752 fca600 67751->67752 67753 fc9d54 67752->67753 67754 fcd3e0 68 API calls 67752->67754 67753->67571 67753->67572 67754->67753 67820 fc4550 GetTickCount 67755->67820 67757 fcbf8b 67757->67584 67784->67552 67785->67552 67786->67554 67787->67544 67788->67557 67789->67561 67790->67565 67791->67579 67801->67654 67802->67661 67803->67662 67804->67689 67805->67667 67806->67672 67807->67675 67808->67682 67809->67695 67810->67701 67811->67705 67812->67702 67813->67713 67814->67727 67815->67719 67816->67732 67817->67726 67818->67742 67819->67748 67820->67757 67927 fc4550 GetTickCount 67862->67927 67864 fd5f28 67866 fd5f3d 67864->67866 67928 fc4550 GetTickCount 67864->67928 67866->67631 67867 fd5f66 67867->67631 67868->67632 67929 fc4550 GetTickCount 67869->67929 67871 fcdc26 67872 fce3b0 GetTickCount 67871->67872 67873 fcdc3d 67872->67873 67874 fcdc52 67873->67874 67875 fcdc6c 67873->67875 67997 fcd340 68 API calls ___swprintf_l 67874->67997 67878 fc0390 69 API calls 67875->67878 67877 fcdc5d 67877->67641 67880 fcdcac __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 67878->67880 67879 fcdd00 67879->67641 67880->67879 67930 fcebc0 67880->67930 67882->67629 67884 fce4c7 67883->67884 67886 fce670 67883->67886 67884->67886 67888 fce4e2 getpeername 67884->67888 67885 100adc4 ___crtLCMapStringA 5 API calls 67887 fce686 67885->67887 67886->67885 67887->67647 67889 fce538 __fread_nolock 67888->67889 67890 fce508 WSAGetLastError 67888->67890 67893 fce555 getsockname 67889->67893 68042 fd9850 46 API calls 3 library calls 67890->68042 67892 fce517 68043 fcd340 68 API calls ___swprintf_l 67892->68043 67895 fce5a1 67893->67895 67896 fce571 WSAGetLastError 67893->67896 67897 fceb60 45 API calls 67895->67897 68044 fd9850 46 API calls 3 library calls 67896->68044 67900 fce5bb 67897->67900 67898 fce524 67901 100adc4 ___crtLCMapStringA 5 API calls 67898->67901 67903 fce5f2 67900->67903 67904 fce5c2 GetLastError 67900->67904 67905 fce534 67901->67905 67902 fce580 68045 fcd340 68 API calls ___swprintf_l 67902->68045 67908 fceb60 45 API calls 67903->67908 68046 fd9850 46 API calls 3 library calls 67904->68046 67905->67647 67911 fce639 67908->67911 67909 fce58d 67912 100adc4 ___crtLCMapStringA 5 API calls 67909->67912 67910 fce5d1 68047 fcd340 68 API calls ___swprintf_l 67910->68047 67911->67886 67914 fce640 GetLastError 67911->67914 67915 fce59d 67912->67915 68048 fd9850 46 API calls 3 library calls 67914->68048 67915->67647 67916 fce5de 67918 100adc4 ___crtLCMapStringA 5 API calls 67916->67918 67920 fce5ee 67918->67920 67919 fce64f 68049 fcd340 68 API calls ___swprintf_l 67919->68049 67920->67647 67922 fce65c 67923 100adc4 ___crtLCMapStringA 5 API calls 67922->67923 67924 fce66c 67923->67924 67924->67647 67925->67641 67926->67646 67927->67864 67928->67867 67929->67871 67998 fce290 67930->67998 67933 100adc4 ___crtLCMapStringA 5 API calls 67935 fceedb 67933->67935 67935->67880 67936 fcec33 67937 fcec7e 67936->67937 67938 fcec3a GetLastError 67936->67938 67939 fcd3e0 68 API calls 67937->67939 68029 fd9850 46 API calls 3 library calls 67938->68029 67945 fcec8d 67939->67945 67941 fcec49 68030 fcd340 68 API calls ___swprintf_l 67941->68030 67943 fcec5c 68031 fcdad0 closesocket 67943->68031 67946 fcecce 67945->67946 68010 fce350 setsockopt 67945->68010 68019 fce1f0 67946->68019 67948 fcec68 67950 100adc4 ___crtLCMapStringA 5 API calls 67948->67950 67951 fcec7a 67950->67951 67951->67880 67953 fcecf9 67954 fced1f 67953->67954 67962 fced7e 67953->67962 67956 fced9e 67954->67956 67957 fced2f 67954->67957 68027 feb850 ioctlsocket 67956->68027 68033 fce690 96 API calls 3 library calls 67957->68033 67959 fceda6 68028 fc4550 GetTickCount 67959->68028 68035 fcdad0 closesocket 67962->68035 67964 fced49 67964->67956 67968 fced85 67972 100adc4 ___crtLCMapStringA 5 API calls 67968->67972 67971 fceec4 67971->67933 67975 fced9a 67972->67975 67975->67880 67997->67877 67999 fce2db _Yarn 67998->67999 68000 fce31b socket 67999->68000 68001 fce30b 67999->68001 68000->68001 68002 100adc4 ___crtLCMapStringA 5 API calls 68001->68002 68003 fce345 68002->68003 68003->67971 68004 fceb60 68003->68004 68005 fceba1 68004->68005 68006 fceb73 68004->68006 68005->67936 68039 fda0f0 44 API calls 68006->68039 68008 fceb81 68008->68005 68009 fceb88 htons 68008->68009 68009->67936 68011 fce398 68010->68011 68012 fce378 WSAGetLastError 68010->68012 68013 fcd3e0 68 API calls 68011->68013 68040 fd9850 46 API calls 3 library calls 68012->68040 68015 fce3a3 68013->68015 68015->67946 68016 fce385 68017 fcd3e0 68 API calls 68016->68017 68018 fce391 68017->68018 68018->67946 68020 fce214 68019->68020 68021 fce220 68019->68021 68041 feb9d0 11 API calls 2 library calls 68020->68041 68023 fce227 68021->68023 68024 fce246 getsockopt 68021->68024 68023->67953 68032 fceee0 71 API calls ___crtLCMapStringA 68023->68032 68025 fce26d setsockopt 68024->68025 68026 fce265 68024->68026 68025->68023 68026->68023 68026->68025 68027->67959 68029->67941 68030->67943 68031->67948 68032->67953 68033->67964 68035->67968 68039->68008 68040->68016 68041->68021 68042->67892 68043->67898 68044->67902 68045->67909 68046->67910 68047->67916 68048->67919 68049->67922 68050->67539 68051 fc4590 68084 fd7de0 68051->68084 68053 fc45c4 68054 fc45ec 68053->68054 68055 fc45cc 68053->68055 68057 fd8030 ___swprintf_l 42 API calls 68054->68057 68098 fd9760 htons 68055->68098 68059 fc4617 68057->68059 68058 fc45d8 68060 100adc4 ___crtLCMapStringA 5 API calls 68058->68060 68087 fc4a70 68059->68087 68062 fc45e8 68060->68062 68063 fc4623 68064 fc462a 68063->68064 68065 fc4646 GetLastError 68063->68065 68066 100adc4 ___crtLCMapStringA 5 API calls 68064->68066 68099 fd9850 46 API calls 3 library calls 68065->68099 68068 fc4642 68066->68068 68069 fc4653 68070 fcd3e0 68 API calls 68069->68070 68071 fc4661 68070->68071 68072 fd94b0 3 API calls 68071->68072 68073 fc4673 68072->68073 68074 fc46ac 68073->68074 68075 fc467a WSAGetLastError 68073->68075 68076 100adc4 ___crtLCMapStringA 5 API calls 68074->68076 68100 fd9850 46 API calls 3 library calls 68075->68100 68078 fc46bc 68076->68078 68079 fc4687 68080 fcd3e0 68 API calls 68079->68080 68081 fc4696 68080->68081 68082 100adc4 ___crtLCMapStringA 5 API calls 68081->68082 68083 fc46a8 68082->68083 68085 fd7df9 68084->68085 68086 fd7de9 SetLastError 68084->68086 68085->68053 68086->68053 68088 fc4a80 68087->68088 68097 fc4b13 68088->68097 68101 fc4b40 68088->68101 68091 fc4b21 SetLastError 68091->68063 68092 fc4ace 68092->68097 68108 fda060 68092->68108 68095 fc4b32 68095->68063 68112 fc48b0 EnterCriticalSection LeaveCriticalSection DeleteCriticalSection CloseHandle WaitForSingleObject 68097->68112 68098->68058 68099->68069 68100->68079 68102 fc4b55 __fread_nolock 68101->68102 68103 fc4b81 InitializeCriticalSection 68102->68103 68106 fc4b98 68102->68106 68103->68106 68105 fc4bb1 68105->68092 68107 fc4ba2 68106->68107 68113 fc4930 DeleteCriticalSection __fread_nolock 68106->68113 68107->68092 68109 1084d44 61 API calls 68108->68109 68110 fc4b05 68109->68110 68110->68095 68111 107da27 20 API calls _Atexit 68110->68111 68111->68097 68112->68091 68113->68105 68114 fcdd30 68115 fcdd68 68114->68115 68116 fcdd7a 68114->68116 68117 100adc4 ___crtLCMapStringA 5 API calls 68115->68117 68160 fc4550 GetTickCount 68116->68160 68120 fcdd76 68117->68120 68119 fcdd81 68121 fce3b0 GetTickCount 68119->68121 68122 fcdd99 68121->68122 68123 fcddae 68122->68123 68157 fcddd4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 68122->68157 68174 fcd340 68 API calls ___swprintf_l 68123->68174 68125 fcddbb 68128 100adc4 ___crtLCMapStringA 5 API calls 68125->68128 68126 fccc60 16 API calls 68126->68157 68127 fcdfcc 68138 fcdff3 68127->68138 68147 fce0f7 68127->68147 68177 fcefc0 116 API calls 68127->68177 68129 fcddd0 68128->68129 68131 100adc4 ___crtLCMapStringA 5 API calls 68133 fce10c 68131->68133 68132 fcdfe5 68132->68138 68158 fce09b 68132->68158 68135 fcf090 SleepEx getsockopt WSAGetLastError 68135->68157 68136 fce00b 68148 fce04a 68136->68148 68178 fcdad0 closesocket 68136->68178 68137 fcdf09 WSASetLastError 68137->68157 68180 fd9850 46 API calls 3 library calls 68138->68180 68139 fce0e2 68181 fcd340 68 API calls ___swprintf_l 68139->68181 68140 100adc4 ___crtLCMapStringA 5 API calls 68144 fce0ad 68140->68144 68141 fcd3e0 68 API calls 68141->68157 68147->68131 68161 fc6030 68148->68161 68149 fce05e 68149->68147 68151 fce069 68149->68151 68152 fce085 68151->68152 68153 fd5f20 GetTickCount 68151->68153 68154 fce4a0 81 API calls 68152->68154 68153->68152 68155 fce095 68154->68155 68179 fc8f30 68 API calls 68155->68179 68157->68126 68157->68127 68157->68135 68157->68136 68157->68137 68157->68141 68159 fcefc0 116 API calls 68157->68159 68175 fc5140 44 API calls 68157->68175 68176 fd9850 46 API calls 3 library calls 68157->68176 68158->68140 68159->68157 68160->68119 68162 fc612e 68161->68162 68163 fc6044 68161->68163 68162->68149 68164 fc610f 68163->68164 68165 fc60c8 68163->68165 68184 fcd340 68 API calls ___swprintf_l 68164->68184 68167 fc60cf 68165->68167 68168 fc60f2 68165->68168 68182 fea0c0 104 API calls 3 library calls 68167->68182 68183 fe9b20 103 API calls 2 library calls 68168->68183 68169 fc611b 68169->68149 68172 fc60e4 68172->68149 68173 fc6101 68173->68149 68174->68125 68175->68157 68176->68157 68177->68132 68178->68148 68179->68158 68180->68139 68181->68147 68182->68172 68183->68173 68184->68169 68185 fd48d0 68186 fd4908 68185->68186 68187 fccc60 16 API calls 68186->68187 68190 fd494f 68186->68190 68187->68190 68188 fd495c 68260 fcd340 68 API calls ___swprintf_l 68188->68260 68189 fd4976 68197 fd499f 68189->68197 68225 fd50c0 68189->68225 68190->68188 68190->68189 68192 fd49cf 68200 fd4bc9 68192->68200 68262 fc4550 GetTickCount 68192->68262 68193 fd4967 68197->68192 68197->68200 68261 fd5800 86 API calls 68197->68261 68198 fd6070 72 API calls 68199 fd4a69 68198->68199 68199->68200 68263 fd6c70 69 API calls 68199->68263 68201 fd49df 68203 fcd3e0 68 API calls 68201->68203 68205 fd49eb 68201->68205 68203->68205 68204 fd4a80 68204->68200 68206 fd4a97 68204->68206 68212 fd4b3d 68204->68212 68205->68198 68208 fce3b0 GetTickCount 68206->68208 68207 fd4bc3 68211 fd6070 72 API calls 68207->68211 68210 fd4aa2 68208->68210 68209 fd4b91 68209->68207 68217 fd4ba9 68209->68217 68210->68200 68214 fd4ac5 68210->68214 68215 fd4b02 68210->68215 68211->68200 68212->68207 68212->68209 68213 fd4b70 68212->68213 68266 fcd340 68 API calls ___swprintf_l 68213->68266 68264 fcd340 68 API calls ___swprintf_l 68214->68264 68265 fcd340 68 API calls ___swprintf_l 68215->68265 68267 fcd340 68 API calls ___swprintf_l 68217->68267 68218 fd4b82 68220 fd4bb4 68223 fd4af3 68224 fd4b2e 68230 fd50f0 68225->68230 68227 fd5f20 GetTickCount 68227->68230 68228 fd51f5 68228->68197 68229 fd51b7 68229->68228 68231 fcd3e0 68 API calls 68229->68231 68230->68227 68230->68228 68230->68229 68234 fd567a 68230->68234 68235 fcd260 68 API calls 68230->68235 68241 fd5762 68230->68241 68244 fd5d00 GetTickCount 68230->68244 68246 fd56d8 68230->68246 68250 fcd3e0 68 API calls 68230->68250 68252 fd5733 68230->68252 68268 fcd460 68230->68268 68273 fc4550 GetTickCount 68230->68273 68274 fd2420 75 API calls ___swprintf_l 68230->68274 68275 fd4600 68 API calls 68230->68275 68276 fec7c0 42 API calls _Mpunct 68230->68276 68231->68228 68234->68229 68237 fd56bc 68234->68237 68238 fd56a0 68234->68238 68235->68230 68240 fcd3e0 68 API calls 68237->68240 68239 fcd3e0 68 API calls 68238->68239 68239->68229 68240->68229 68242 fd5767 68241->68242 68243 fd5781 68241->68243 68278 fcd340 68 API calls ___swprintf_l 68242->68278 68279 fcd340 68 API calls ___swprintf_l 68243->68279 68244->68230 68248 fd5719 68246->68248 68253 fd56ed 68246->68253 68277 fcd340 68 API calls ___swprintf_l 68248->68277 68249 fd5772 68249->68197 68250->68230 68258 fcd3e0 68 API calls 68252->68258 68255 fcd3e0 68 API calls 68253->68255 68255->68228 68256 fd5793 68256->68197 68257 fd5724 68257->68197 68259 fd574e 68258->68259 68259->68197 68260->68193 68261->68192 68262->68201 68263->68204 68264->68223 68265->68224 68266->68218 68267->68220 68269 fcd47d 68268->68269 68270 fcd4d8 _Yarn 68269->68270 68280 fcd610 68269->68280 68270->68230 68271 fcd545 _Yarn 68271->68230 68273->68230 68274->68230 68275->68230 68276->68230 68277->68257 68278->68249 68279->68256 68281 fcd635 68280->68281 68282 fcd63c 68281->68282 68283 fcd64a recv 68281->68283 68282->68271 68284 fcd668 WSAGetLastError 68283->68284 68290 fcd69a 68283->68290 68285 fcd678 68284->68285 68286 fcd686 68284->68286 68285->68271 68291 fd9850 46 API calls 3 library calls 68286->68291 68288 fcd68d 68292 fcd340 68 API calls ___swprintf_l 68288->68292 68290->68271 68291->68288 68292->68290 68293 107eef7 68296 107ed48 68293->68296 68295 107ef09 68299 107ed54 ___unDName 68296->68299 68297 107ed62 68313 107da27 20 API calls _Atexit 68297->68313 68299->68297 68301 107ed8f 68299->68301 68300 107ed67 68314 1079211 26 API calls _Mpunct 68300->68314 68303 107ed94 68301->68303 68304 107eda1 68301->68304 68315 107da27 20 API calls _Atexit 68303->68315 68305 10930ac 23 API calls 68304->68305 68307 107edaa 68305->68307 68308 107edb1 68307->68308 68309 107edbe 68307->68309 68316 107da27 20 API calls _Atexit 68308->68316 68317 107edf2 LeaveCriticalSection __fread_nolock 68309->68317 68311 107ed72 ___unDName 68311->68295 68313->68300 68314->68311 68315->68311 68316->68311 68317->68311 68318 1014450 68323 f9acd0 77 API calls 6 library calls 68318->68323 68320 101445a 68324 1013fe0 68320->68324 68323->68320 68328 1014058 68324->68328 68336 101419c 68324->68336 68325 100adc4 ___crtLCMapStringA 5 API calls 68326 10141b6 68325->68326 68327 10141c7 68330 10141c5 68327->68330 68333 10141cc 68327->68333 68328->68327 68329 10141bd 68328->68329 68334 f8b130 29 API calls std::invalid_argument::invalid_argument 68328->68334 68328->68336 68337 f991d0 29 API calls 68328->68337 68329->68330 68329->68336 68339 102bef0 29 API calls 2 library calls 68330->68339 68338 1014320 29 API calls 2 library calls 68333->68338 68334->68328 68336->68325 68337->68328 68338->68336 68340 f83fa0 CoInitializeEx 68341 f83fed 68340->68341 68342 f8472d 68340->68342 68438 f8e900 68341->68438 68343 100adc4 ___crtLCMapStringA 5 API calls 68342->68343 68345 f84769 68343->68345 68439 f8e937 68438->68439 68440 f8f250 5 API calls 68439->68440 68441 f8400d 68440->68441 68442 f87150 68441->68442 68443 f89f40 29 API calls 68442->68443 68444 f871a5 68443->68444 68445 f89f40 29 API calls 68444->68445 68446 f871cf 68445->68446 68447 f89f40 29 API calls 68446->68447 68448 f871f6 68447->68448 68449 f89f40 29 API calls 68448->68449 68450 f8721d 68449->68450 69114 f872e0 CoCreateInstance 68450->69114 68453 f8724f 68455 f87278 68453->68455 69184 f8ada0 26 API calls collate 68453->69184 68457 f872a1 68455->68457 69185 f8ada0 26 API calls collate 68455->69185 68459 f84018 68457->68459 69186 f8ada0 26 API calls collate 68457->69186 68461 f86d60 68459->68461 68462 f89f40 29 API calls 68461->68462 68463 f86dca 68462->68463 68464 f89f40 29 API calls 68463->68464 68465 f86dff 68464->68465 68466 f89f40 29 API calls 68465->68466 68467 f86e32 68466->68467 68468 f89f40 29 API calls 68467->68468 68469 f86e5f 68468->68469 68470 f89f40 29 API calls 68469->68470 68471 f86e85 68470->68471 68472 f89f40 29 API calls 68471->68472 68473 f86eab 68472->68473 68474 f89f40 29 API calls 68473->68474 68475 f86ed2 68474->68475 68476 f89f40 29 API calls 68475->68476 68477 f86ef9 68476->68477 68478 f872e0 39 API calls 68477->68478 68479 f86f23 68478->68479 68480 f872e0 39 API calls 68479->68480 68481 f86f43 68480->68481 68482 f8c530 29 API calls 68481->68482 68483 f86f4f 68482->68483 68484 f86f70 68483->68484 69211 f8ada0 26 API calls collate 68483->69211 68486 f86fab 68484->68486 69212 f8ada0 26 API calls collate 68484->69212 68488 f86fdd 68486->68488 69213 f8ada0 26 API calls collate 68486->69213 68490 f87006 68488->68490 69214 f8ada0 26 API calls collate 68488->69214 68492 f8702f 68490->68492 69215 f8ada0 26 API calls collate 68490->69215 68494 f87058 68492->68494 69216 f8ada0 26 API calls collate 68492->69216 68496 f87087 68494->68496 69217 f8ada0 26 API calls collate 68494->69217 69115 f87368 69114->69115 69116 f873ac 69114->69116 69118 f89f40 29 API calls 69115->69118 69187 f83620 69116->69187 69172 f87394 69118->69172 69119 f873d0 69192 f836d0 69119->69192 69120 100adc4 ___crtLCMapStringA 5 API calls 69123 f87237 69120->69123 69122 f87418 69124 f8745a CoSetProxyBlanket 69122->69124 69125 f87421 69122->69125 69123->68453 69183 f8ada0 26 API calls collate 69123->69183 69124->69125 69127 f87475 69124->69127 69126 f889d0 29 API calls 69125->69126 69126->69172 69128 f8749f 69127->69128 69129 f874c1 69127->69129 69131 f8c240 29 API calls 69128->69131 69130 f8c240 29 API calls 69129->69130 69132 f874cc 69130->69132 69133 f874aa 69131->69133 69134 f8c3a0 29 API calls 69132->69134 69206 f88950 26 API calls 69133->69206 69137 f874e2 69134->69137 69136 f874b6 69139 f88910 26 API calls 69136->69139 69138 f8c4e0 29 API calls 69137->69138 69140 f874fc 69138->69140 69141 f8756c 69139->69141 69142 f8c3a0 29 API calls 69140->69142 69143 f83620 10 API calls 69141->69143 69144 f87515 69142->69144 69145 f87597 69143->69145 69146 f8c4e0 29 API calls 69144->69146 69197 f83580 69145->69197 69148 f8752c 69146->69148 69207 f88950 26 API calls 69148->69207 69150 f87538 69151 f88910 26 API calls 69150->69151 69153 f87543 69151->69153 69152 f875a6 69158 f836d0 2 API calls 69152->69158 69154 f88910 26 API calls 69153->69154 69155 f8754e 69154->69155 69156 f88910 26 API calls 69155->69156 69157 f87559 69156->69157 69159 f88910 26 API calls 69157->69159 69160 f875e8 69158->69160 69159->69136 69161 f836d0 2 API calls 69160->69161 69162 f875f7 69161->69162 69163 f875fb 69162->69163 69164 f87625 69162->69164 69165 f889d0 29 API calls 69163->69165 69169 f876da 69164->69169 69202 f8e9d0 69164->69202 69166 f87607 69165->69166 69168 f88910 26 API calls 69166->69168 69168->69172 69170 f88910 26 API calls 69169->69170 69170->69172 69172->69120 69173 f876a3 69175 f876d2 69173->69175 69176 f83320 29 API calls 69173->69176 69174 f8770a 69174->69175 69209 f888c0 29 API calls 69174->69209 69177 f83470 27 API calls 69175->69177 69179 f876be 69176->69179 69177->69169 69208 f88950 26 API calls 69179->69208 69181 f876c7 69183->68453 69184->68455 69185->68457 69186->68459 69188 100ade3 new 9 API calls 69187->69188 69189 f8364e 69188->69189 69190 f83661 SysAllocString 69189->69190 69191 f8368c _com_issue_error 69189->69191 69190->69191 69191->69119 69193 f836da InterlockedDecrement 69192->69193 69195 f836ff std::ios_base::_Tidy 69192->69195 69194 f836e8 69193->69194 69193->69195 69194->69195 69196 f836f2 SysFreeString 69194->69196 69195->69122 69196->69195 69198 100ade3 new 9 API calls 69197->69198 69199 f835ae 69198->69199 69201 f835e7 _com_issue_error 69199->69201 69210 10061c0 10 API calls 3 library calls 69199->69210 69201->69152 69203 f8ea07 69202->69203 69204 f8f250 5 API calls 69203->69204 69205 f87675 69204->69205 69205->69173 69205->69174 69206->69136 69207->69150 69208->69181 69209->69175 69210->69201 69211->68484 69212->68486 69213->68488 69214->68490 69215->68492 69216->68494 69217->68496 69403 1003b19 69404 1003b25 __EH_prolog3 69403->69404 69516 1002a59 69404->69516 69518 1002a65 __EH_prolog3_GS 69516->69518 69517 1002af6 69565 100bd58 69517->69565 69518->69517 69520 100ade3 new 9 API calls 69518->69520 69522 1002a82 69520->69522 69523 1002ac9 69522->69523 69568 10021fe 29 API calls 2 library calls 69522->69568 69525 1002ae5 69523->69525 69571 f826a0 74 API calls 2 library calls 69523->69571 69525->69517 69572 f8a1d0 26 API calls 2 library calls 69525->69572 69526 1002a9b 69569 f825b0 75 API calls 5 library calls 69526->69569 69530 1002ab7 69570 1005af2 38 API calls 3 library calls 69530->69570 69566 100adc4 ___crtLCMapStringA 5 API calls 69565->69566 69567 100bd63 69566->69567 69567->69567 69568->69526 69569->69530 69570->69523 69571->69525 69572->69517 69676 facd00 69677 facd36 69676->69677 69678 facd8b 69677->69678 69679 facda3 69677->69679 69684 facd42 69677->69684 69697 107da81 69678->69697 69683 107da81 28 API calls 69679->69683 69680 100adc4 ___crtLCMapStringA 5 API calls 69682 facebd 69680->69682 69687 facdc4 69683->69687 69684->69680 69685 f8a490 28 API calls 69685->69687 69687->69685 69688 facece 69687->69688 69689 face24 69687->69689 69691 face4c 69687->69691 69693 107da81 28 API calls 69687->69693 69719 f8b130 29 API calls 3 library calls 69687->69719 69688->69691 69721 107dd9f 29 API calls 3 library calls 69688->69721 69689->69691 69717 107da27 20 API calls _Atexit 69689->69717 69691->69684 69720 f8a9f0 26 API calls collate 69691->69720 69693->69687 69695 face41 69718 1079211 26 API calls _Mpunct 69695->69718 69698 107da8d ___unDName 69697->69698 69699 107dab6 69698->69699 69700 107da9e 69698->69700 69722 107e996 EnterCriticalSection 69699->69722 69730 107da27 20 API calls _Atexit 69700->69730 69703 107daa3 69731 1079211 26 API calls _Mpunct 69703->69731 69704 107dac0 69706 107db56 69704->69706 69707 10913dd __fread_nolock 26 API calls 69704->69707 69723 107da3a 69706->69723 69713 107dad9 69707->69713 69709 107db5c 69734 107db79 LeaveCriticalSection __fread_nolock 69709->69734 69711 107daae ___unDName @_EH4_CallFilterFunc@8 69711->69684 69712 107db2e 69732 107da27 20 API calls _Atexit 69712->69732 69713->69706 69713->69712 69715 107db33 69733 1079211 26 API calls _Mpunct 69715->69733 69717->69695 69718->69691 69719->69687 69720->69684 69721->69688 69722->69704 69724 107da46 69723->69724 69727 107da5b __fread_nolock 69723->69727 69735 107da27 20 API calls _Atexit 69724->69735 69726 107da4b 69736 1079211 26 API calls _Mpunct 69726->69736 69727->69709 69729 107da56 69729->69709 69730->69703 69731->69711 69732->69715 69733->69711 69734->69711 69735->69726 69736->69729 69737 fda1c0 69796 fc4550 GetTickCount 69737->69796 69739 fda205 69797 fd5ec0 GetTickCount 69739->69797 69741 fda21b 69742 fda22a 69741->69742 69745 fda244 69741->69745 69832 fda8b0 101 API calls 2 library calls 69742->69832 69744 fda230 69746 100adc4 ___crtLCMapStringA 5 API calls 69744->69746 69749 fda2bc 69745->69749 69833 fd4600 68 API calls 69745->69833 69747 fda240 69746->69747 69748 fda3d9 69798 fda7b0 42 API calls 69748->69798 69749->69748 69752 fda2fb 69749->69752 69754 fd8030 ___swprintf_l 42 API calls 69752->69754 69753 fda29c 69753->69749 69755 fda2a3 69753->69755 69772 fda313 69754->69772 69759 100adc4 ___crtLCMapStringA 5 API calls 69755->69759 69756 fda3e1 69757 fda424 69756->69757 69762 fda400 69756->69762 69758 fda603 69757->69758 69768 fda458 69757->69768 69837 fcd340 68 API calls ___swprintf_l 69758->69837 69761 fda2b8 69759->69761 69835 fcd340 68 API calls ___swprintf_l 69762->69835 69764 fda60e 69767 100adc4 ___crtLCMapStringA 5 API calls 69764->69767 69765 fda40b 69766 100adc4 ___crtLCMapStringA 5 API calls 69765->69766 69769 fda420 69766->69769 69770 fda623 69767->69770 69771 fda4ec 69768->69771 69799 1084f5a 69768->69799 69775 fd5f20 GetTickCount 69771->69775 69772->69764 69834 fd7530 27 API calls 69772->69834 69794 fda4f4 69775->69794 69777 fda354 69777->69764 69779 fda35f 69777->69779 69778 fda4d6 69780 100adc4 ___crtLCMapStringA 5 API calls 69778->69780 69782 fd8030 ___swprintf_l 42 API calls 69779->69782 69781 fda4e8 69780->69781 69785 fda3a3 69782->69785 69784 fda5d1 69787 fd6070 72 API calls 69784->69787 69786 100adc4 ___crtLCMapStringA 5 API calls 69785->69786 69788 fda3d5 69786->69788 69789 fda5dc 69787->69789 69790 100adc4 ___crtLCMapStringA 5 API calls 69789->69790 69791 fda5f8 69790->69791 69792 fd5d00 GetTickCount 69792->69794 69793 fd6070 72 API calls 69793->69794 69794->69764 69794->69784 69794->69792 69794->69793 69802 fd6bf0 69794->69802 69836 fd6c70 69 API calls 69794->69836 69796->69739 69797->69741 69798->69756 69838 1084dd7 69799->69838 69801 fda4c3 69801->69771 69801->69778 69803 fd6bfb ___unDName 69802->69803 69804 108c6af 69803->69804 69805 108c697 69803->69805 69807 108c775 69804->69807 69811 108c6e8 69804->69811 69949 107da14 20 API calls _Atexit 69805->69949 69956 107da14 20 API calls _Atexit 69807->69956 69808 108c69c 69950 107da27 20 API calls _Atexit 69808->69950 69813 108c70c 69811->69813 69814 108c6f7 69811->69814 69812 108c77a 69957 107da27 20 API calls _Atexit 69812->69957 69883 1093d1c EnterCriticalSection 69813->69883 69951 107da14 20 API calls _Atexit 69814->69951 69816 108c704 69958 1079211 26 API calls _Mpunct 69816->69958 69819 108c712 69821 108c72e 69819->69821 69822 108c743 69819->69822 69820 108c6fc 69952 107da27 20 API calls _Atexit 69820->69952 69953 107da27 20 API calls _Atexit 69821->69953 69884 108c796 69822->69884 69824 108c6a4 ___unDName 69824->69794 69828 108c733 69954 107da14 20 API calls _Atexit 69828->69954 69829 108c73e 69955 108c76d LeaveCriticalSection 69829->69955 69832->69744 69833->69753 69834->69777 69835->69765 69836->69794 69837->69764 69839 1084de3 ___unDName 69838->69839 69840 1084deb 69839->69840 69841 1084e03 69839->69841 69873 107da14 20 API calls _Atexit 69840->69873 69842 1084eb7 69841->69842 69847 1084e3b 69841->69847 69878 107da14 20 API calls _Atexit 69842->69878 69845 1084df0 69874 107da27 20 API calls _Atexit 69845->69874 69863 1093d1c EnterCriticalSection 69847->69863 69848 1084ebc 69879 107da27 20 API calls _Atexit 69848->69879 69849 1084df8 ___unDName 69849->69801 69852 1084e41 69854 1084e7a 69852->69854 69855 1084e65 69852->69855 69853 1084ec4 69880 1079211 26 API calls _Mpunct 69853->69880 69864 1084edc 69854->69864 69875 107da27 20 API calls _Atexit 69855->69875 69859 1084e6a 69876 107da14 20 API calls _Atexit 69859->69876 69860 1084e75 69877 1084eaf LeaveCriticalSection 69860->69877 69863->69852 69865 1093f99 __fread_nolock 26 API calls 69864->69865 69866 1084eee 69865->69866 69867 1084ef6 69866->69867 69868 1084f07 SetFilePointerEx 69866->69868 69881 107da27 20 API calls _Atexit 69867->69881 69870 1084efb 69868->69870 69871 1084f1f GetLastError 69868->69871 69870->69860 69882 107d9f1 20 API calls 2 library calls 69871->69882 69873->69845 69874->69849 69875->69859 69876->69860 69877->69849 69878->69848 69879->69853 69880->69849 69881->69870 69882->69870 69883->69819 69885 108c7a8 69884->69885 69886 108c7c0 69884->69886 69968 107da14 20 API calls _Atexit 69885->69968 69888 108cb2a 69886->69888 69893 108c805 69886->69893 69983 107da14 20 API calls _Atexit 69888->69983 69889 108c7ad 69969 107da27 20 API calls _Atexit 69889->69969 69892 108cb2f 69984 107da27 20 API calls _Atexit 69892->69984 69895 108c810 69893->69895 69897 108c7b5 69893->69897 69901 108c840 69893->69901 69970 107da14 20 API calls _Atexit 69895->69970 69897->69829 69898 108c81d 69985 1079211 26 API calls _Mpunct 69898->69985 69899 108c815 69971 107da27 20 API calls _Atexit 69899->69971 69903 108c859 69901->69903 69904 108c89b 69901->69904 69905 108c87f 69901->69905 69903->69905 69909 108c866 69903->69909 69907 1086524 ___crtLCMapStringA 21 API calls 69904->69907 69972 107da14 20 API calls _Atexit 69905->69972 69910 108c8b2 69907->69910 69908 108c884 69973 107da27 20 API calls _Atexit 69908->69973 69959 109a006 69909->69959 69913 10872f5 _free 20 API calls 69910->69913 69916 108c8bb 69913->69916 69914 108ca04 69917 108ca7a 69914->69917 69919 108ca1d GetConsoleMode 69914->69919 69915 108c88b 69974 1079211 26 API calls _Mpunct 69915->69974 69920 10872f5 _free 20 API calls 69916->69920 69921 108ca7e ReadFile 69917->69921 69919->69917 69922 108ca2e 69919->69922 69923 108c8c2 69920->69923 69924 108ca98 69921->69924 69925 108caf2 GetLastError 69921->69925 69922->69921 69926 108ca34 ReadConsoleW 69922->69926 69927 108c8cc 69923->69927 69928 108c8e7 69923->69928 69924->69925 69931 108ca6f 69924->69931 69929 108caff 69925->69929 69930 108ca56 69925->69930 69926->69931 69933 108ca50 GetLastError 69926->69933 69975 107da27 20 API calls _Atexit 69927->69975 69977 1084f75 28 API calls __fread_nolock 69928->69977 69981 107da27 20 API calls _Atexit 69929->69981 69946 108c896 __fread_nolock 69930->69946 69978 107d9f1 20 API calls 2 library calls 69930->69978 69941 108cabd 69931->69941 69942 108cad4 69931->69942 69931->69946 69933->69930 69934 10872f5 _free 20 API calls 69934->69897 69937 108cb04 69982 107da14 20 API calls _Atexit 69937->69982 69939 108c8d1 69976 107da14 20 API calls _Atexit 69939->69976 69979 108c4b2 31 API calls 3 library calls 69941->69979 69945 108caeb 69942->69945 69942->69946 69980 108c2f2 29 API calls __fread_nolock 69945->69980 69946->69934 69948 108caf0 69948->69946 69949->69808 69950->69824 69951->69820 69952->69816 69953->69828 69954->69829 69955->69824 69956->69812 69957->69816 69958->69824 69960 109a020 69959->69960 69961 109a013 69959->69961 69964 109a02c 69960->69964 69987 107da27 20 API calls _Atexit 69960->69987 69986 107da27 20 API calls _Atexit 69961->69986 69963 109a018 69963->69914 69964->69914 69966 109a04d 69988 1079211 26 API calls _Mpunct 69966->69988 69968->69889 69969->69897 69970->69899 69971->69898 69972->69908 69973->69915 69974->69946 69975->69939 69976->69946 69977->69909 69978->69946 69979->69946 69980->69948 69981->69937 69982->69946 69983->69892 69984->69898 69985->69897 69986->69963 69987->69966 69988->69963
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr_strstr
                                          • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%x$/$0$1.0$1.1$100-continue$;type=$;type=%c$Accept-Encoding:$Accept-Encoding: %s$Accept:$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length:$Content-Length: %I64d$Content-Length: 0$Content-Range:$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type:$Content-Type: application/x-www-form-urlencoded$Cookie:$Cookie: $Could not get Content-Type header line!$Could not seek stream$Could only read %I64d bytes from the input$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host:$Host: %s%s%s$Host: %s%s%s:%hu$Internal HTTP POST error!$POST$PUT$Proxy-Connection:$Proxy-Connection: Keep-Alive$Range:$Range: bytes=%s$Referer:$Referer: %s$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent:$chunked$ftp://$ftp://%s:%s@%s$upload completely sent off: %I64d out of %I64d bytes
                                          • API String ID: 223351431-3874905768
                                          • Opcode ID: c6e2e364933ca2559600ee4855ad8559a678c109aa0e88005a617a23eadae6b8
                                          • Instruction ID: 9a63d2e8017b36befa4ae83a1e1850ede262eea553ceb712a0b7620f8dc641e5
                                          • Opcode Fuzzy Hash: c6e2e364933ca2559600ee4855ad8559a678c109aa0e88005a617a23eadae6b8
                                          • Instruction Fuzzy Hash: 19E20771E00205ABDF14DB64DC85BEEB7B6FF04314F1C416AE849AB342DB35A950EBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 629 fbe920-fbe980 call 10706c0 GetVersionExW 632 fbedd9-fbede9 call 100adc4 629->632 633 fbe986-fbe99f GetModuleHandleW GetProcAddress 629->633 634 fbe9ac-fbe9b3 GetSystemInfo 633->634 635 fbe9a1-fbe9aa GetNativeSystemInfo 633->635 637 fbe9b9-fbe9c0 634->637 635->637 639 fbedcc-fbedd6 call fbe7b0 637->639 640 fbe9c6-fbe9cd 637->640 639->632 640->639 642 fbe9d3-fbe9f3 call fbe8d0 640->642 646 fbea21-fbea24 642->646 647 fbe9f5-fbe9fc 642->647 650 fbea2a-fbea32 646->650 651 fbeb79-fbeb7c 646->651 648 fbed19-fbed1f 647->648 649 fbea02-fbea0b 647->649 652 fbed22-fbed2b 648->652 653 fbea0d-fbea12 649->653 654 fbea17-fbea1c 649->654 655 fbea4d-fbea50 650->655 656 fbea34-fbea3d 650->656 651->648 657 fbeb82-fbeb8b 651->657 652->652 658 fbed2d-fbed31 652->658 659 fbed14 call fbe7e0 653->659 654->659 662 fbea6a-fbea6d 655->662 663 fbea52-fbea5a 655->663 660 fbea3f-fbea44 656->660 661 fbea46-fbea4b 656->661 664 fbeb91-fbeb9b GetSystemMetrics 657->664 665 fbeca4-fbeca7 657->665 668 fbed4d-fbed7e call fbe850 call fbe7e0 658->668 669 fbed33-fbed48 call fbe7e0 * 2 658->669 659->648 670 fbeaa4 call fbe7e0 660->670 661->670 666 fbea88-fbea8b 662->666 667 fbea6f-fbea78 662->667 671 fbea5c-fbea61 663->671 672 fbea63-fbea68 663->672 673 fbeb9d-fbeba2 664->673 674 fbeba4-fbebaf 664->674 675 fbeca9-fbecc1 call fbe7e0 665->675 676 fbecd1-fbecd3 665->676 680 fbeaa9-fbeae3 GetModuleHandleW GetProcAddress 666->680 681 fbea8d-fbea96 666->681 678 fbea7a-fbea7f 667->678 679 fbea81-fbea86 667->679 719 fbedbb-fbedcb call 100adc4 668->719 720 fbed80-fbed8b 668->720 669->668 670->680 671->670 672->670 686 fbebe5-fbebf3 call fbe7e0 673->686 687 fbebb8-fbebbd 674->687 688 fbebb1-fbebb6 674->688 699 fbecca-fbeccf 675->699 700 fbecc3-fbecc8 675->700 676->648 683 fbecd5-fbece8 call fbe7e0 676->683 678->670 679->670 680->648 713 fbeae9-fbeaf0 680->713 693 fbea98-fbea9d 681->693 694 fbea9f 681->694 709 fbecea-fbecef 683->709 710 fbecf1-fbecf9 683->710 686->648 711 fbebf9-fbec04 686->711 691 fbebbf-fbebc4 687->691 692 fbebc6-fbebcd 687->692 688->686 691->686 701 fbebcf-fbebd7 692->701 702 fbebe0 692->702 693->670 694->670 699->659 700->659 701->702 708 fbebd9-fbebde 701->708 702->686 708->686 714 fbed12 709->714 715 fbecfb-fbed00 710->715 716 fbed02-fbed04 710->716 717 fbec2c-fbec36 711->717 718 fbec06-fbec0e 711->718 713->648 713->709 721 fbeb5b-fbeb60 713->721 722 fbeb1f-fbeb24 713->722 723 fbeb3d-fbeb42 713->723 724 fbeb33-fbeb38 713->724 725 fbeb51-fbeb56 713->725 726 fbeaf7-fbeafc 713->726 727 fbeb15-fbeb1a 713->727 728 fbec75-fbec7a 713->728 729 fbeb0b-fbeb10 713->729 730 fbeb29-fbeb2e 713->730 731 fbeb6f-fbeb74 713->731 732 fbec83-fbec88 713->732 733 fbec22-fbec27 713->733 734 fbeb01-fbeb06 713->734 735 fbeb47-fbeb4c 713->735 736 fbeb65-fbeb6a 713->736 714->659 715->714 738 fbed0d 716->738 739 fbed06-fbed0b 716->739 742 fbec38-fbec3a 717->742 743 fbec60-fbec65 717->743 740 fbec1a-fbec1c 718->740 741 fbec10-fbec15 718->741 744 fbedaa-fbedad 720->744 745 fbed8d-fbeda9 call fbe7e0 call 100adc4 720->745 721->714 722->714 723->714 724->714 725->714 726->714 727->714 728->714 729->714 730->714 731->714 732->714 733->714 734->714 735->714 736->714 738->714 739->714 740->648 740->733 741->714 746 fbec3c-fbec41 742->746 747 fbec46-fbec4a 742->747 749 fbec71-fbec73 743->749 750 fbec67-fbec6c 743->750 744->719 748 fbedaf-fbedb6 call fbe7e0 744->748 746->714 754 fbec4c-fbec51 747->754 755 fbec56-fbec5b 747->755 748->719 749->728 756 fbec7f-fbec81 749->756 750->714 754->659 755->659 756->732 759 fbec8d-fbec94 756->759 761 fbec9d-fbeca2 759->761 762 fbec96-fbec9b 759->762 761->659 762->659
                                          APIs
                                          • GetVersionExW.KERNEL32(0000011C), ref: 00FBE978
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo), ref: 00FBE990
                                          • GetProcAddress.KERNEL32(00000000), ref: 00FBE997
                                          • GetNativeSystemInfo.KERNELBASE(?), ref: 00FBE9A8
                                          • GetSystemInfo.KERNEL32(?), ref: 00FBE9B3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: InfoSystem$AddressHandleModuleNativeProcVersion
                                          • String ID: (build %d)$, 32-bit$, 64-bit$Advanced Server$Business Edition$Cluster Server Edition$Compute Cluster Edition$Datacenter Edition$Datacenter Edition (core installation)$Datacenter Edition for Itanium-based Systems$Datacenter Server$Datacenter x64 Edition$Enterprise Edition$Enterprise Edition (core installation)$Enterprise Edition for Itanium-based Systems$Enterprise x64 Edition$GetNativeSystemInfo$GetProductInfo$Home Basic Edition$Home Edition$Home Premium Edition$Microsoft $Professional$Server$Small Business Server$Small Business Server Premium Edition$Standard Edition$Standard Edition (core installation)$Standard x64 Edition$Starter Edition$This sample does not support this version of Windows.$Ultimate Edition$Web Edition$Web Server Edition$Windows 10 $Windows 2000 $Windows 7 $Windows 8 $Windows 8.1 $Windows Home Server$Windows Server 2003 R2, $Windows Server 2003, $Windows Server 2008 $Windows Server 2008 R2 $Windows Server 2012 $Windows Server 2012 R2 $Windows Server 2016 $Windows Storage Server 2003$Windows Vista $Windows XP $Windows XP Professional x64 Edition$kernel32.dll
                                          • API String ID: 374719553-4026996278
                                          • Opcode ID: 4f6da6c796b00481cfdf45a05e30b4ae3808d19aa3cc4c3c15cba1922739d5b8
                                          • Instruction ID: 8e3e05d68b829d7f24c693787b97dd9de56f0896192a375297e8b1461e19659c
                                          • Opcode Fuzzy Hash: 4f6da6c796b00481cfdf45a05e30b4ae3808d19aa3cc4c3c15cba1922739d5b8
                                          • Instruction Fuzzy Hash: 58B1B131B44317A6DF209713CD46FED762AAB05F14F20458EF886AA141CAF94E85BF53
                                          APIs
                                          • CreateMutexW.KERNELBASE(00000000,00000001,?), ref: 00FA9DD3
                                          • GetLastError.KERNEL32 ref: 00FA9DE6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CreateErrorLastMutex
                                          • String ID: .$.$.$3.5$4.0 Client$4.0 Full$4.5$4.5.1$4.5.2$4.6$4.6.1$4.6.2$<xmlattr>.BundleId$<xmlattr>.key$<xmlattr>.value$BA002$BundleBypass$BundleConfig$BundleConfig.xml$BundleId=$EventServiceUrl$GenericSetup.exe$GenericSetupInstaller_$InstallId$Message$StubError$]: $bundle config file path=$carrier path=$configuration.appSettings$event service url=$generic setup config file path=$generic setup path=$install id=$installer$run installer complete. exit code=$wWinMain$}
                                          • API String ID: 1925916568-2272459019
                                          • Opcode ID: c2a35d668fe3888732704dce28897a4502471b3223de8b328496533d3c3de1c8
                                          • Instruction ID: 33908d58e187a4e98f2bb11d0a8fae352f052382e026b7f45c7aa26efcb1f567
                                          • Opcode Fuzzy Hash: c2a35d668fe3888732704dce28897a4502471b3223de8b328496533d3c3de1c8
                                          • Instruction Fuzzy Hash: 0603A070D00258DAEF25EBA4CC45BEDBBB4AF15304F104199E4496B282DF786F89EF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2063 f87e70-f87eec call f8c5a0 CryptAcquireContextW 2066 f87fc0-f87fd8 CryptCreateHash 2063->2066 2067 f87ef2-f87f44 call 10706c0 call f88d70 call f8c5c0 call f88c60 2063->2067 2068 f880ac-f880de call fbfd90 CryptHashData 2066->2068 2069 f87fde-f88030 call 10706c0 call f88d70 call f8c5c0 call f88c60 2066->2069 2104 f87f48-f87fbb call 106f8c4 call f8c870 2067->2104 2105 f87f46 2067->2105 2077 f881b2-f881d9 2068->2077 2078 f880e4-f88136 call 10706c0 call f88d70 call f8c5c0 call f88c60 2068->2078 2109 f88032 2069->2109 2110 f88034-f880a7 call 106f8c4 call f8c870 2069->2110 2081 f881db-f881dd 2077->2081 2082 f881df 2077->2082 2122 f88138 2078->2122 2123 f8813a-f881ad call 106f8c4 call f8c870 2078->2123 2086 f881e1-f881f2 2081->2086 2082->2086 2090 f88211-f8821e call f8a490 2086->2090 2091 f881f4-f881ff 2086->2091 2101 f88223-f88227 2090->2101 2095 f88209-f8820f 2091->2095 2096 f88201-f88207 2091->2096 2095->2101 2096->2101 2107 f88229-f8822b 2101->2107 2108 f8822d 2101->2108 2104->2066 2105->2104 2113 f8822f-f88243 CryptGetHashParam 2107->2113 2108->2113 2109->2110 2110->2068 2117 f882b9-f882e5 call f88b10 call f83470 call 100adc4 2113->2117 2118 f88245-f882b4 call 10706c0 call f88d70 call f8c5c0 call f88c60 call f947f0 call f8c870 2113->2118 2118->2117 2122->2123 2123->2077
                                          APIs
                                          • CryptAcquireContextW.ADVAPI32(?,00000000,Microsoft Strong Cryptographic Provider,00000001,F0000000,?,00000000,05CEC6CE,00000000,00000000), ref: 00F87EE4
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00F87F78
                                          • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,00000000), ref: 00F87FD0
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00F88064
                                          • CryptHashData.ADVAPI32(00000000,?,?,00000000), ref: 00F880D6
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00F8816A
                                          • CryptGetHashParam.ADVAPI32(00000000,00000002,?,00000010,00000000,?,00000000), ref: 00F8823B
                                          Strings
                                          • couldn't acquire crypt context, xrefs: 00F87F20
                                          • couldn't crypt hash data, xrefs: 00F88112
                                          • class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> > __cdecl Generator::Md5Hash(const class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> > &), xrefs: 00F87FAC, 00F88098, 00F8819E, 00F882A9
                                          • Microsoft Strong Cryptographic Provider, xrefs: 00F87ED9
                                          • src\generator.cpp, xrefs: 00F87FA7, 00F88093, 00F88199, 00F882A4
                                          • couldn't create hash, xrefs: 00F8800C
                                          • couldn't crypt get hash param, xrefs: 00F88273
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash___std_exception_copy$AcquireContextCreateDataParam
                                          • String ID: Microsoft Strong Cryptographic Provider$class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> > __cdecl Generator::Md5Hash(const class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> > &)$couldn't acquire crypt context$couldn't create hash$couldn't crypt get hash param$couldn't crypt hash data$src\generator.cpp
                                          • API String ID: 2846258822-2439808906
                                          • Opcode ID: 9165e7233c04b206c4e3681a2351a84bc1eead75c6bdfc7502bd0d11d7a4c1cd
                                          • Instruction ID: d8b7f07d9d2b387e9173c394cabde369e9036aadde43bc8b096d7c7292e7ddb5
                                          • Opcode Fuzzy Hash: 9165e7233c04b206c4e3681a2351a84bc1eead75c6bdfc7502bd0d11d7a4c1cd
                                          • Instruction Fuzzy Hash: 6EC1AB70D003189BDB21EB60DC86BDEB7B8AF14704F504199F585B7281EBB56B88CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3106 1091b5d-1091b85 call 109179c call 10917fa 3111 1091b8b-1091b97 call 10917a2 3106->3111 3112 1091d25-1091d5a call 107923e call 109179c call 10917fa 3106->3112 3111->3112 3117 1091b9d-1091ba8 3111->3117 3134 1091d60-1091d6c call 10917a2 3112->3134 3135 1091e82-1091ede call 107923e call 1085bb1 3112->3135 3119 1091baa-1091bac 3117->3119 3120 1091bde-1091be7 call 10872f5 3117->3120 3123 1091bae-1091bb2 3119->3123 3129 1091bea-1091bef 3120->3129 3126 1091bce-1091bd0 3123->3126 3127 1091bb4-1091bb6 3123->3127 3132 1091bd3-1091bd5 3126->3132 3130 1091bb8-1091bbe 3127->3130 3131 1091bca-1091bcc 3127->3131 3129->3129 3136 1091bf1-1091c12 call 1086524 call 10872f5 3129->3136 3130->3126 3137 1091bc0-1091bc8 3130->3137 3131->3132 3138 1091bdb 3132->3138 3139 1091d1f-1091d24 3132->3139 3134->3135 3146 1091d72-1091d7e call 10917ce 3134->3146 3156 1091ee8-1091eeb 3135->3156 3157 1091ee0-1091ee6 3135->3157 3136->3139 3154 1091c18-1091c1b 3136->3154 3137->3123 3137->3131 3138->3120 3146->3135 3155 1091d84-1091da5 call 10872f5 GetTimeZoneInformation 3146->3155 3158 1091c1e-1091c23 3154->3158 3170 1091dab-1091dcc 3155->3170 3171 1091e5e-1091e81 call 1091796 call 109178a call 1091790 3155->3171 3159 1091eed-1091efd call 1086524 3156->3159 3160 1091f2e-1091f40 3156->3160 3157->3160 3158->3158 3162 1091c25-1091c37 call 108fc34 3158->3162 3175 1091eff 3159->3175 3176 1091f07-1091f20 call 1085bb1 3159->3176 3164 1091f50 3160->3164 3165 1091f42-1091f45 3160->3165 3162->3112 3182 1091c3d-1091c50 call 1093bca 3162->3182 3172 1091f55-1091f6c call 10872f5 call 100adc4 3164->3172 3173 1091f50 call 1091d32 3164->3173 3165->3164 3169 1091f47-1091f4e call 1091b5d 3165->3169 3169->3172 3178 1091dce-1091dd3 3170->3178 3179 1091dd6-1091ddd 3170->3179 3173->3172 3183 1091f00-1091f05 call 10872f5 3175->3183 3203 1091f22-1091f23 3176->3203 3204 1091f25-1091f2b call 10872f5 3176->3204 3178->3179 3186 1091ddf-1091de6 3179->3186 3187 1091df5-1091df8 3179->3187 3182->3112 3200 1091c56-1091c59 3182->3200 3209 1091f2d 3183->3209 3186->3187 3194 1091de8-1091df3 3186->3194 3196 1091dfb-1091e1c call 1086034 WideCharToMultiByte 3187->3196 3194->3196 3211 1091e2a-1091e2c 3196->3211 3212 1091e1e-1091e21 3196->3212 3207 1091c5b-1091c5f 3200->3207 3208 1091c61-1091c6a 3200->3208 3203->3183 3204->3209 3207->3200 3207->3208 3214 1091c6d-1091c7a call 107d308 3208->3214 3215 1091c6c 3208->3215 3209->3160 3218 1091e2e-1091e4a WideCharToMultiByte 3211->3218 3212->3211 3217 1091e23-1091e28 3212->3217 3224 1091c7d-1091c81 3214->3224 3215->3214 3217->3218 3220 1091e59-1091e5c 3218->3220 3221 1091e4c-1091e4f 3218->3221 3220->3171 3221->3220 3223 1091e51-1091e57 3221->3223 3223->3171 3225 1091c8b-1091c8c 3224->3225 3226 1091c83-1091c85 3224->3226 3225->3224 3227 1091c8e-1091c91 3226->3227 3228 1091c87-1091c89 3226->3228 3229 1091c93-1091ca6 call 107d308 3227->3229 3230 1091cd5-1091cd7 3227->3230 3228->3225 3228->3227 3237 1091cad-1091cb1 3229->3237 3231 1091cd9-1091cdb 3230->3231 3232 1091cde-1091ced 3230->3232 3231->3232 3234 1091cef-1091d01 call 1093bca 3232->3234 3235 1091d05-1091d08 3232->3235 3238 1091d0b-1091d1d call 1091796 call 109178a 3234->3238 3244 1091d03 3234->3244 3235->3238 3240 1091ca8-1091caa 3237->3240 3241 1091cb3-1091cb6 3237->3241 3238->3139 3240->3241 3245 1091cac 3240->3245 3241->3230 3246 1091cb8-1091cc8 call 107d308 3241->3246 3244->3112 3245->3237 3252 1091ccf-1091cd3 3246->3252 3252->3230 3253 1091cca-1091ccc 3252->3253 3253->3230 3254 1091cce 3253->3254 3254->3252
                                          APIs
                                          • _free.LIBCMT ref: 01091BDF
                                          • _free.LIBCMT ref: 01091C03
                                          • _free.LIBCMT ref: 01091D8A
                                          • GetTimeZoneInformation.KERNELBASE(?,00000000,00000000,00000000,?,010C3258), ref: 01091D9C
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,Eastern Standard Time,000000FF,00000000,0000003F,00000000,?,?), ref: 01091E14
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,Eastern Summer Time,000000FF,?,0000003F,00000000,?), ref: 01091E41
                                          • _free.LIBCMT ref: 01091F56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                          • API String ID: 314583886-239921721
                                          • Opcode ID: 999733936e3ff879c86a0b41eac96f4dc4e53918b022bdb362a7b1c09aae6b49
                                          • Instruction ID: 1bbe4db921480bb605c303acb8e9be58336797455313bd04fecbf079a0dbc547
                                          • Opcode Fuzzy Hash: 999733936e3ff879c86a0b41eac96f4dc4e53918b022bdb362a7b1c09aae6b49
                                          • Instruction Fuzzy Hash: 25C12571B0424BABDF21AF7C8860BEEBBF9EF41230F1441DAE5C597285E7318A019B50
                                          APIs
                                          • CoCreateInstance.OLE32(010BB8B4,00000000,00000001,010BB7E4,00000000,05CEC6CE,?,?), ref: 00F8735E
                                          • CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?), ref: 00F8746B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: BlanketCreateInstanceProxy
                                          • String ID: WHERE $ROOT\CIMV2$SELECT * FROM
                                          • API String ID: 1899829610-2498882015
                                          • Opcode ID: 77afc2d2999f59c118aa822852f4eb77fa72eae9bd2f387dd89457e3499fff84
                                          • Instruction ID: a035852696a3717d6f06c0e81010546bcedafeb79729d3d6c870bb8e13e2ce27
                                          • Opcode Fuzzy Hash: 77afc2d2999f59c118aa822852f4eb77fa72eae9bd2f387dd89457e3499fff84
                                          • Instruction Fuzzy Hash: AFE14D70E04308DFDB24EFA4CC55BEEB7B4AF04704F244499E405AB281DB79AA45DF61
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastselect
                                          • String ID:
                                          • API String ID: 215497628-0
                                          • Opcode ID: 70435f240adeec93b4ac2cc6d4b79810453218875fbd55e994e8d423d3e57de5
                                          • Instruction ID: bf1c1b02b7914983f41e8eed3aef1621699fe9bab9fe18bcecf7f9c4229ccdce
                                          • Opcode Fuzzy Hash: 70435f240adeec93b4ac2cc6d4b79810453218875fbd55e994e8d423d3e57de5
                                          • Instruction Fuzzy Hash: E9B1A271E0021A8BCF25CF28D996BA9B7B9EF88320F1445EDD85DD7241DB349E809F80
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastrecv
                                          • String ID: Recv failure: %s
                                          • API String ID: 2514157807-4276829032
                                          • Opcode ID: bdfd0051b292ca3f5587ee40a1c86741a5ae238bd1e79f1f6ff18e0d7fd6bcd3
                                          • Instruction ID: 0e6cad323de86f24ea1efda5373a5e12f5a2b1588eb0f31be3c2c52a6fdb3a98
                                          • Opcode Fuzzy Hash: bdfd0051b292ca3f5587ee40a1c86741a5ae238bd1e79f1f6ff18e0d7fd6bcd3
                                          • Instruction Fuzzy Hash: 9F114276601209AFDB109F59EC81FDA7BACFF48365F20402AF94C87341D7759950DBA0
                                          APIs
                                          • GetSystemTimeAsFileTime.KERNEL32(0109F433,05CEC6CE,00000000,?,00000000), ref: 00F97755
                                          • __aulldiv.LIBCMT ref: 00F97772
                                          • __aulldiv.LIBCMT ref: 00F97782
                                            • Part of subcall function 00F95220: ___std_exception_copy.LIBVCRUNTIME ref: 00F9527E
                                            • Part of subcall function 00F99E40: __CxxThrowException@8.LIBVCRUNTIME ref: 00F99E8E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Time__aulldiv$Exception@8FileSystemThrow___std_exception_copy
                                          • String ID:
                                          • API String ID: 1498349571-0
                                          • Opcode ID: 9a84132a871f4fca37e79f6844d64c9468ab9ab3ec5509bcad2d6dff1eb93901
                                          • Instruction ID: b10f21fcc230276c91addb2d7aa24720da600581866c55c63366642e8207fc80
                                          • Opcode Fuzzy Hash: 9a84132a871f4fca37e79f6844d64c9468ab9ab3ec5509bcad2d6dff1eb93901
                                          • Instruction Fuzzy Hash: 73417F71904209ABEF15EFA4CC42BEEB7B9EF08700F50452AF406E7281DB79A904DB65
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000008), ref: 00F83F76
                                          • HeapFree.KERNEL32(00000000), ref: 00F83F7D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Heap$FreeProcess
                                          • String ID:
                                          • API String ID: 3859560861-0
                                          • Opcode ID: 75beda3bbcac00c8683bdf93e6ec93beacef0dde6fb67b27eda7ba4c8184e6fd
                                          • Instruction ID: b88cf52636fd2fd579e3cb0c6cc1fec9bfe9026a0ef76a612809f82af97f4b21
                                          • Opcode Fuzzy Hash: 75beda3bbcac00c8683bdf93e6ec93beacef0dde6fb67b27eda7ba4c8184e6fd
                                          • Instruction Fuzzy Hash: A5314BB0E04209DBDB14EF94C555BEEBBB4FF44B14F10461EE456A7280DBB96B08CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1631 fa8360-fa83c1 1632 fa83ce-fa83e8 call f94880 1631->1632 1633 fa83c3-fa83c8 call f93880 1631->1633 1638 fa857e-fa858d 1632->1638 1639 fa83ee-fa8419 call f92f20 1632->1639 1633->1632 1640 fa85ae-fa85bc 1638->1640 1641 fa858f-fa8596 1638->1641 1649 fa8420-fa842a 1639->1649 1643 fa85c2-fa85fb call fbfeb0 call fb2640 call f82460 1640->1643 1644 fa9316-fa9331 call 100adc4 1640->1644 1641->1640 1645 fa8598-fa85a5 1641->1645 1668 fa8601-fa8717 call fc0280 * 3 call fbff10 * 2 call 100ade3 * 2 call fb1a40 call f8a260 call faf5f0 1643->1668 1669 fa9116-fa9126 1643->1669 1645->1640 1657 fa85a7-fa85a9 1645->1657 1653 fa8430-fa84fe call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 call fb23e0 call f911b0 call fae230 1649->1653 1654 fa8554-fa8556 1649->1654 1653->1649 1761 fa8504-fa851c call 1014490 1653->1761 1654->1638 1656 fa8558-fa8561 call 1013200 1654->1656 1656->1638 1657->1640 1750 fa8719-fa8727 call f8a9f0 1668->1750 1751 fa872c-fa8826 call 10706c0 call f8bb70 call f8b2b0 call fb26f0 1668->1751 1672 fa9128-fa912d call f93880 1669->1672 1673 fa9133-fa9146 call f94880 1669->1673 1672->1673 1682 fa914c-fa917d call f92f20 1673->1682 1683 fa92b6-fa92bf 1673->1683 1696 fa9180-fa918a 1682->1696 1689 fa92e0-fa92ec 1683->1689 1690 fa92c1-fa92c8 1683->1690 1689->1644 1692 fa92ee-fa92fa 1689->1692 1690->1689 1695 fa92ca-fa92d7 1690->1695 1692->1644 1697 fa92fc-fa930d 1692->1697 1695->1689 1706 fa92d9-fa92db 1695->1706 1701 fa9190-fa9235 call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 1696->1701 1702 fa9297-fa9299 1696->1702 1697->1644 1714 fa930f-fa9311 1697->1714 1701->1696 1786 fa923b-fa9253 call 1014490 1701->1786 1709 fa929b-fa92a4 call 1013200 1702->1709 1710 fa92af 1702->1710 1706->1689 1709->1710 1710->1683 1714->1644 1750->1751 1781 fa883b-fa885e call fad2b0 1751->1781 1782 fa8828-fa8836 call f8a9f0 1751->1782 1770 fa851e-fa853a call f8e1f0 call 1013740 1761->1770 1771 fa853f-fa854f call 10159f0 1761->1771 1770->1771 1771->1649 1790 fa886b-fa887e call f94880 1781->1790 1791 fa8860-fa8865 call f93880 1781->1791 1782->1781 1793 fa9282-fa9292 call 10159f0 1786->1793 1794 fa9255-fa927d call f8e1f0 call 1013740 1786->1794 1800 fa89fb-fa8a04 1790->1800 1801 fa8884-fa88b1 call f92f20 1790->1801 1791->1790 1793->1696 1794->1793 1806 fa8a06-fa8a0d 1800->1806 1807 fa8a25-fa8a6d call fbff10 * 2 1800->1807 1811 fa88b5-fa88bf 1801->1811 1806->1807 1808 fa8a0f-fa8a1c 1806->1808 1823 fa8a6f-fa8a7b call f8a260 1807->1823 1824 fa8a7d-fa8a86 call f8a360 1807->1824 1808->1807 1817 fa8a1e-fa8a20 1808->1817 1814 fa89d0-fa89d2 1811->1814 1815 fa88c5-fa8974 call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 call fb23e0 1811->1815 1820 fa89f4 1814->1820 1821 fa89d4-fa89dd call 1013200 1814->1821 1815->1811 1912 fa897a-fa8992 call 1014490 1815->1912 1817->1807 1820->1800 1821->1820 1832 fa8a8b-fa8acc call faf880 call faf8d0 call f8a670 1823->1832 1824->1832 1846 fa8ace-fa8adc call f8a9f0 1832->1846 1847 fa8ae1-fa8b0c 1832->1847 1846->1847 1850 fa8b19-fa8b2c call f94880 1847->1850 1851 fa8b0e-fa8b13 call f93880 1847->1851 1859 fa8c9d-fa8ca6 1850->1859 1860 fa8b32-fa8b5f call f92f20 1850->1860 1851->1850 1863 fa8ca8-fa8caf 1859->1863 1864 fa8cc7-fa8d01 call fbff10 call fbfef0 1859->1864 1869 fa8b63-fa8b6d 1860->1869 1863->1864 1868 fa8cb1-fa8cbe 1863->1868 1884 fa8e99-fa8e9b 1864->1884 1885 fa8d07-fa8d09 1864->1885 1868->1864 1877 fa8cc0-fa8cc2 1868->1877 1872 fa8c7e-fa8c80 1869->1872 1873 fa8b73-fa8c22 call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 call fb23e0 1869->1873 1880 fa8c82-fa8c8b call 1013200 1872->1880 1881 fa8c96 1872->1881 1873->1869 2017 fa8c28-fa8c40 call 1014490 1873->2017 1877->1864 1880->1881 1881->1859 1892 fa8ea8-fa8ebb call f94880 1884->1892 1893 fa8e9d-fa8ea2 call f93880 1884->1893 1889 fa8d0b-fa8d10 call f93880 1885->1889 1890 fa8d16-fa8d29 call f94880 1885->1890 1889->1890 1910 fa8d2f-fa8d5c call f92f20 1890->1910 1911 fa8e90-fa8e94 1890->1911 1907 fa901f 1892->1907 1908 fa8ec1-fa8eee call f92f20 1892->1908 1893->1892 1915 fa9023-fa9028 1907->1915 1927 fa8ef2-fa8efc 1908->1927 1924 fa8d60-fa8d6a 1910->1924 1911->1915 1925 fa89bb-fa89cb call 10159f0 1912->1925 1926 fa8994-fa89b6 call f8e1f0 call 1013740 1912->1926 1922 fa902a-fa9031 1915->1922 1923 fa9049-fa905a call fc02c0 1915->1923 1922->1923 1930 fa9033-fa9040 1922->1930 1945 fa9069-fa9081 1923->1945 1946 fa905c-fa9064 call f8a9f0 1923->1946 1931 fa8d70-fa8e15 call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 1924->1931 1932 fa8e71-fa8e73 1924->1932 1925->1811 1926->1925 1934 fa9008-fa900a 1927->1934 1935 fa8f02-fa8fb2 call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 call f915a0 1927->1935 1930->1923 1951 fa9042-fa9044 1930->1951 1931->1924 2041 fa8e1b-fa8e33 call 1014490 1931->2041 1941 fa8e89 1932->1941 1942 fa8e75-fa8e7e call 1013200 1932->1942 1947 fa900c-fa9012 call 1013200 1934->1947 1948 fa9015-fa9018 1934->1948 1935->1927 2046 fa8fb8-fa8fd0 call 1014490 1935->2046 1941->1911 1942->1941 1958 fa9083-fa908b call f8a9f0 1945->1958 1959 fa9090-fa90cf call fad2d0 call ff2b79 1945->1959 1946->1945 1947->1948 1948->1907 1951->1923 1958->1959 1980 fa90ec-fa90f2 1959->1980 1981 fa90d1-fa90e9 call fb1df0 call 100adbf call 100add5 1959->1981 1980->1689 1987 fa90f8-fa910b call f8a9f0 1980->1987 1981->1980 1987->1689 2026 fa8c69-fa8c79 call 10159f0 2017->2026 2027 fa8c42-fa8c64 call f8e1f0 call 1013740 2017->2027 2026->1869 2027->2026 2047 fa8e5c-fa8e6c call 10159f0 2041->2047 2048 fa8e35-fa8e57 call f8e1f0 call 1013740 2041->2048 2053 fa8fd2-fa8fee call f8e1f0 call 1013740 2046->2053 2054 fa8ff3-fa9003 call 10159f0 2046->2054 2047->1924 2048->2047 2053->2054 2054->1927
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .$. disable stub events=$/v1/event-stat?ProductID=IS&Type=$9$Accept: application/json$Content-Type: application/json$Data$H$SendEvent$]: $charsets: utf-8$curl easy init failed$data=$https://flow.lavasoft.com$installer$send event failed. curl returned error=$send event succeeded$send event. event name=$url=
                                          • API String ID: 0-1052238508
                                          • Opcode ID: 5e4a3022e502859118265e259e3425d33d054c852d63a74f8fe1ed006e62b5fc
                                          • Instruction ID: 30c41550a7762f8dbd93a81ed1762af589b86d32f7a029915fe70acd92820623
                                          • Opcode Fuzzy Hash: 5e4a3022e502859118265e259e3425d33d054c852d63a74f8fe1ed006e62b5fc
                                          • Instruction Fuzzy Hash: E592FF70E00219EBEF21EBA5CC05BDDBBB4AF05740F0441A8E8857B281DB786E45EF95
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FC9A2A
                                            • Part of subcall function 00FCD340: ___swprintf_l.LIBCMT ref: 00FCD382
                                          Strings
                                          • memory shortage, xrefs: 00FC9AB0
                                          • %s://%s, xrefs: 00FC99A6
                                          • Found connection %ld, with requests in the pipe (%zu), xrefs: 00FCA09F
                                          • NTLM picked AND auth done set, clear picked!, xrefs: 00FCA21E
                                          • We can reuse, but we want a new connection anyway, xrefs: 00FCA0C9
                                          • No connections available., xrefs: 00FCA2C7
                                          • No more connections allowed to host: %d, xrefs: 00FCA2B9
                                          • Re-using existing connection! (#%ld) with %s %s, xrefs: 00FCA170
                                          • NTLM-proxy picked AND auth done set, clear picked!, xrefs: 00FCA24F
                                          • host, xrefs: 00FCA15E
                                          • No connections available in cache, xrefs: 00FCA2EE
                                          • proxy, xrefs: 00FCA164, 00FCA16C
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr___swprintf_l
                                          • String ID: %s://%s$Found connection %ld, with requests in the pipe (%zu)$NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host: %d$Re-using existing connection! (#%ld) with %s %s$We can reuse, but we want a new connection anyway$host$memory shortage$proxy
                                          • API String ID: 1035537661-616786730
                                          • Opcode ID: 3fbb6c367512f22ad5f8e9f2fe683638aa852e90e5d39e171f63048eb685a1bf
                                          • Instruction ID: 49162680897f09bb08899320b46d90235795744c32a5fff9916d7cc8af1c1b90
                                          • Opcode Fuzzy Hash: 3fbb6c367512f22ad5f8e9f2fe683638aa852e90e5d39e171f63048eb685a1bf
                                          • Instruction Fuzzy Hash: 34620570A04747AFDB25CF74C98AFDABBE4BF05308F04012CE85997242D7B96914EB92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2417 fa7460-fa74ba 2418 fa74bc-fa74c1 call f93880 2417->2418 2419 fa74c7-fa74e1 call f94880 2417->2419 2418->2419 2424 fa766c-fa7678 2419->2424 2425 fa74e7-fa750e call f92f20 2419->2425 2426 fa767a-fa7684 2424->2426 2427 fa769c-fa76d2 call 10706c0 2424->2427 2432 fa7512-fa751c 2425->2432 2426->2427 2429 fa7686-fa7693 2426->2429 2437 fa76fd-fa7704 2427->2437 2438 fa76d4-fa76ea call 100b307 2427->2438 2429->2427 2443 fa7695-fa7697 2429->2443 2435 fa7642-fa7644 2432->2435 2436 fa7522-fa75e6 call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 call fb2400 call f911b0 call fb2400 2432->2436 2435->2424 2440 fa7646-fa764f call 1013200 2435->2440 2436->2432 2532 fa75ec-fa7604 call 1014490 2436->2532 2441 fa7708-fa7729 CreateProcessW 2437->2441 2442 fa7706 2437->2442 2450 fa76ee-fa76fa call 107de0f 2438->2450 2451 fa76ec 2438->2451 2440->2424 2447 fa792e-fa797b WaitForSingleObject GetExitCodeProcess CloseHandle * 2 2441->2447 2448 fa772f-fa7748 GetLastError 2441->2448 2442->2441 2443->2427 2453 fa797d-fa7983 call 100ae39 2447->2453 2454 fa7986 2447->2454 2455 fa774a-fa774f call f93880 2448->2455 2456 fa7755-fa7768 call f94880 2448->2456 2450->2437 2451->2450 2453->2454 2461 fa7988-fa79a3 call 100adc4 2454->2461 2455->2456 2470 fa776e-fa77a1 call f92f20 2456->2470 2471 fa78ed-fa78f9 2456->2471 2484 fa77a5-fa77af 2470->2484 2476 fa791a-fa791c 2471->2476 2477 fa78fb-fa7900 2471->2477 2480 fa791e-fa7924 call 100ae39 2476->2480 2481 fa7927-fa792c 2476->2481 2477->2476 2482 fa7902-fa7911 2477->2482 2480->2481 2481->2461 2482->2476 2491 fa7913-fa7915 2482->2491 2488 fa78c7-fa78c9 2484->2488 2489 fa77b5-fa7865 call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 call fae090 2484->2489 2494 fa78cb-fa78d1 call 1013200 2488->2494 2495 fa78d4-fa78db 2488->2495 2489->2484 2548 fa786b-fa7883 call 1014490 2489->2548 2491->2476 2494->2495 2495->2471 2538 fa762d-fa763d call 10159f0 2532->2538 2539 fa7606-fa7622 call f8e1f0 call 1013740 2532->2539 2538->2432 2549 fa7627 2539->2549 2552 fa78b2-fa78c2 call 10159f0 2548->2552 2553 fa7885-fa78ad call f8e1f0 call 1013740 2548->2553 2549->2538 2552->2484 2553->2552
                                          APIs
                                            • Part of subcall function 00F93880: new.LIBCMT ref: 00F93896
                                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 00FA7721
                                          • GetLastError.KERNEL32 ref: 00FA772F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CreateErrorLastProcess
                                          • String ID: . cmd=$D$RunInstallerWithoutUAC$]: $couldn't create process. error=$installer$run installer without uac. path=
                                          • API String ID: 2919029540-2793288024
                                          • Opcode ID: 0bb8083a7064e3c14468cdcd2b3ceeea8dad32eb2ae8521a04d963dfb6d8f91f
                                          • Instruction ID: 929c780f299ea315bb942b754060fe56e61021365d9403a2c06aa43f8b8603a9
                                          • Opcode Fuzzy Hash: 0bb8083a7064e3c14468cdcd2b3ceeea8dad32eb2ae8521a04d963dfb6d8f91f
                                          • Instruction Fuzzy Hash: 6FE1DDB1E002199BEF20EB65CC05BAEB7B5BF45710F1441ADE849BB381DB386E40DB95

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcessId.KERNEL32(05CEC6CE), ref: 00F95E67
                                            • Part of subcall function 00FBF7F0: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,05CEC6CE), ref: 00FBF852
                                            • Part of subcall function 00FBF7F0: GetLastError.KERNEL32(00000003,00000001,?,?,?,?,05CEC6CE), ref: 00FBF88B
                                            • Part of subcall function 00FBF7F0: ___std_exception_copy.LIBVCRUNTIME ref: 00FBF8F7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CurrentErrorFileLastModuleNameProcess___std_exception_copy
                                          • String ID: $$%Y.%m.%d_%H.%M.%S.%f_$.txt$LineID$ProcessID$Severity$ThreadID$TimeStamp$UpTime$_pid=$en_US.UTF-8
                                          • API String ID: 1340941257-1227853842
                                          • Opcode ID: 939f0ab24b77c6627bbb4073177348eeac0a25c62784b02636f12e5b48158601
                                          • Instruction ID: 2f391363ed9c2080544fd8442c7583c9fb6c2bb9d1d711235ae704739f3c3f11
                                          • Opcode Fuzzy Hash: 939f0ab24b77c6627bbb4073177348eeac0a25c62784b02636f12e5b48158601
                                          • Instruction Fuzzy Hash: 6312F174D152AC8ADB21DBA4CC84BCEBBB4AF29304F1081DAD44DA3251EB745B88DF56

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2847 108dd76-108dda6 call 108dac1 2850 108dda8-108ddb3 call 107da14 2847->2850 2851 108ddc1-108ddcd call 1093df6 2847->2851 2858 108ddb5-108ddbc call 107da27 2850->2858 2856 108ddcf-108dde4 call 107da14 call 107da27 2851->2856 2857 108dde6-108de2f call 108da2c 2851->2857 2856->2858 2866 108de9c-108dea5 GetFileType 2857->2866 2867 108de31-108de3a 2857->2867 2868 108e098-108e09e 2858->2868 2869 108deee-108def1 2866->2869 2870 108dea7-108ded8 GetLastError call 107d9f1 CloseHandle 2866->2870 2872 108de3c-108de40 2867->2872 2873 108de71-108de97 GetLastError call 107d9f1 2867->2873 2875 108defa-108df00 2869->2875 2876 108def3-108def8 2869->2876 2870->2858 2884 108dede-108dee9 call 107da27 2870->2884 2872->2873 2877 108de42-108de6f call 108da2c 2872->2877 2873->2858 2881 108df04-108df52 call 1093d3f 2875->2881 2882 108df02 2875->2882 2876->2881 2877->2866 2877->2873 2890 108df62-108df86 call 108d7df 2881->2890 2891 108df54-108df60 call 108dc3d 2881->2891 2882->2881 2884->2858 2897 108df88 2890->2897 2898 108df99-108dfdc 2890->2898 2891->2890 2896 108df8a-108df94 call 108d4fb 2891->2896 2896->2868 2897->2896 2900 108dffd-108e00b 2898->2900 2901 108dfde-108dfe2 2898->2901 2904 108e011-108e015 2900->2904 2905 108e096 2900->2905 2901->2900 2903 108dfe4-108dff8 2901->2903 2903->2900 2904->2905 2906 108e017-108e04a CloseHandle call 108da2c 2904->2906 2905->2868 2909 108e04c-108e078 GetLastError call 107d9f1 call 1093f08 2906->2909 2910 108e07e-108e092 2906->2910 2909->2910 2910->2905
                                          APIs
                                            • Part of subcall function 0108DA2C: CreateFileW.KERNELBASE(00000000,00000000,?,0108DE1F,?,?,00000000,?,0108DE1F,00000000,0000000C), ref: 0108DA49
                                          • GetLastError.KERNEL32 ref: 0108DE8A
                                          • __dosmaperr.LIBCMT ref: 0108DE91
                                          • GetFileType.KERNELBASE(00000000), ref: 0108DE9D
                                          • GetLastError.KERNEL32 ref: 0108DEA7
                                          • __dosmaperr.LIBCMT ref: 0108DEB0
                                          • CloseHandle.KERNEL32(00000000), ref: 0108DED0
                                          • CloseHandle.KERNEL32(00008109), ref: 0108E01A
                                          • GetLastError.KERNEL32 ref: 0108E04C
                                          • __dosmaperr.LIBCMT ref: 0108E053
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                          • String ID: H
                                          • API String ID: 4237864984-2852464175
                                          • Opcode ID: e0e79ca0bf3b1c52b2b960dcc91343813578896f80b44812ff56c2aa5fede732
                                          • Instruction ID: 3ea1f2c33757d8e0b68e9ddab577c40027b81e806268336a9b9fe8f4d810111b
                                          • Opcode Fuzzy Hash: e0e79ca0bf3b1c52b2b960dcc91343813578896f80b44812ff56c2aa5fede732
                                          • Instruction Fuzzy Hash: 49A12432A181459FDF29BFBCD8517AE7BE0AB06324F14029DF8D19B2D2DB359812CB51

                                          Control-flow Graph

                                          APIs
                                          • getpeername.WS2_32(?,?,?), ref: 00FCE4FE
                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,00000000), ref: 00FCE508
                                            • Part of subcall function 00FD9850: GetLastError.KERNEL32(00000010,00000000,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9856
                                            • Part of subcall function 00FD9850: _strncpy.LIBCMT ref: 00FD988A
                                            • Part of subcall function 00FD9850: _strrchr.LIBCMT ref: 00FD98DF
                                            • Part of subcall function 00FD9850: _strrchr.LIBCMT ref: 00FD98FA
                                            • Part of subcall function 00FD9850: GetLastError.KERNEL32(?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9912
                                            • Part of subcall function 00FD9850: SetLastError.KERNEL32(00000000,?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?), ref: 00FD991D
                                            • Part of subcall function 00FCD340: ___swprintf_l.LIBCMT ref: 00FCD382
                                          • getsockname.WS2_32(?,?,00000080), ref: 00FCE567
                                          • WSAGetLastError.WS2_32(?,?,?), ref: 00FCE571
                                          Strings
                                          • ssloc inet_ntop() failed with errno %d: %s, xrefs: 00FCE651
                                          • getpeername() failed with errno %d: %s, xrefs: 00FCE519
                                          • ssrem inet_ntop() failed with errno %d: %s, xrefs: 00FCE5D3
                                          • getsockname() failed with errno %d: %s, xrefs: 00FCE582
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_strrchr$___swprintf_l_strncpygetpeernamegetsockname
                                          • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                          • API String ID: 978289777-670633250
                                          • Opcode ID: 8d6f3c42b82bbedf7e1ab8d73982e722540c89403a5e70eb659aa8f5dc61858b
                                          • Instruction ID: dc9e1059c0fab8bbbdec6d0df824ecf604cb0eccc5c3746c56fc2a9cc1914fd6
                                          • Opcode Fuzzy Hash: 8d6f3c42b82bbedf7e1ab8d73982e722540c89403a5e70eb659aa8f5dc61858b
                                          • Instruction Fuzzy Hash: 5351E572A0010AABDB20EB659D46FEAB7BCEF55320F40019AFD8D93101EB396954D7A0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2962 f83fa0-f83fe7 CoInitializeEx 2963 f83fed-f841b0 call f8e900 call f87150 call f86d60 call f86550 call f85c90 call f84ef0 call f84790 call f8c350 call f8c3a0 call f8c530 call f8c3a0 call f8c530 call f8c3a0 call f8c530 call f8c3a0 call f8c530 call f8c3a0 call f8c530 call f8c3a0 call f8c4e0 2962->2963 2964 f84751-f8476c call 100adc4 2962->2964 3007 f841b2-f841c0 call f8ada0 2963->3007 3008 f841c5-f841eb 2963->3008 3007->3008 3010 f841ed-f841fb call f8ada0 3008->3010 3011 f84200-f84226 3008->3011 3010->3011 3013 f84228-f84236 call f8ada0 3011->3013 3014 f8423b-f84261 3011->3014 3013->3014 3016 f84263-f84271 call f8ada0 3014->3016 3017 f84276-f8429c 3014->3017 3016->3017 3019 f8429e-f842ac call f8ada0 3017->3019 3020 f842b1-f842d7 3017->3020 3019->3020 3021 f842d9-f842e7 call f8ada0 3020->3021 3022 f842ec-f84312 3020->3022 3021->3022 3025 f84314-f84322 call f8ada0 3022->3025 3026 f84327-f8434d 3022->3026 3025->3026 3028 f8434f-f8435d call f8ada0 3026->3028 3029 f84362-f84388 3026->3029 3028->3029 3031 f8438a-f84398 call f8ada0 3029->3031 3032 f8439d-f843c3 3029->3032 3031->3032 3034 f843d8-f843fe 3032->3034 3035 f843c5-f843d3 call f8ada0 3032->3035 3036 f84400-f8440e call f8ada0 3034->3036 3037 f84413-f84439 3034->3037 3035->3034 3036->3037 3040 f8443b-f84449 call f8ada0 3037->3040 3041 f8444e-f84474 3037->3041 3040->3041 3043 f84489-f844af 3041->3043 3044 f84476-f84484 call f8ada0 3041->3044 3046 f844b1-f844bf call f8ada0 3043->3046 3047 f844c4-f844ea 3043->3047 3044->3043 3046->3047 3049 f844ec-f844fa call f8ada0 3047->3049 3050 f844ff-f84525 3047->3050 3049->3050 3052 f8453a-f84560 3050->3052 3053 f84527-f84535 call f8ada0 3050->3053 3055 f84562-f84570 call f8ada0 3052->3055 3056 f84575-f8459f 3052->3056 3053->3052 3055->3056 3058 f845a1-f845af call f8ada0 3056->3058 3059 f845b4-f84606 call f87e70 call f877d0 call f87960 3056->3059 3058->3059 3067 f84608-f8460c 3059->3067 3068 f84643-f84650 3059->3068 3071 f8461c-f8462e 3067->3071 3072 f8460e-f84617 call f8ada0 3067->3072 3069 f84652-f84660 call f8ada0 3068->3069 3070 f84665-f8466b 3068->3070 3069->3070 3077 f8466d-f8466f 3070->3077 3078 f84671 3070->3078 3074 f84630-f84632 3071->3074 3075 f84634 3071->3075 3072->3071 3079 f84636-f8463e call f8a160 3074->3079 3075->3079 3080 f84673-f84677 3077->3080 3078->3080 3079->3068 3082 f84679-f8467b 3080->3082 3083 f8467d 3080->3083 3084 f8467f-f84689 3082->3084 3083->3084 3085 f8468b 3084->3085 3086 f8468d-f846a7 call f8f720 3084->3086 3085->3086 3089 f846a9-f846b1 call f8ada0 3086->3089 3090 f846b6-f846d0 3086->3090 3089->3090 3092 f846df-f846f7 3090->3092 3093 f846d2-f846da call f8a9f0 3090->3093 3095 f846f9-f84701 call f8ada0 3092->3095 3096 f84706-f84723 3092->3096 3093->3092 3095->3096 3098 f84730-f84736 3096->3098 3099 f84725-f84728 call f88630 3096->3099 3098->2964 3100 f84738-f8473a 3098->3100 3103 f8472d 3099->3103 3100->2964 3102 f8473c-f84743 3100->3102 3102->2964 3104 f84745-f8474e 3102->3104 3103->3098 3104->2964
                                          APIs
                                          • CoInitializeEx.OLE32(00000000,00000000,05CEC6CE), ref: 00F83FDF
                                            • Part of subcall function 00F87E70: CryptAcquireContextW.ADVAPI32(?,00000000,Microsoft Strong Cryptographic Provider,00000001,F0000000,?,00000000,05CEC6CE,00000000,00000000), ref: 00F87EE4
                                            • Part of subcall function 00F87E70: ___std_exception_copy.LIBVCRUNTIME ref: 00F87F78
                                            • Part of subcall function 00F87E70: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,00000000), ref: 00F87FD0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Crypt$AcquireContextCreateHashInitialize___std_exception_copy
                                          • String ID: BASE >> $BIOS >> $DISK >> $MAC >> $VIDEO >> $WCID >> $+$WCID20
                                          • API String ID: 1990730815-2905442241
                                          • Opcode ID: 540a2647d237a3f69599f348e6757f9000fc81c7ceb35930bf221045da2f0887
                                          • Instruction ID: d69325170f78c0b1eb038a0e377fa89ebf9d1870f0a2a75a8ec3355fe84b27a6
                                          • Opcode Fuzzy Hash: 540a2647d237a3f69599f348e6757f9000fc81c7ceb35930bf221045da2f0887
                                          • Instruction Fuzzy Hash: 00225671D002589AEB61EB64CC85BDEBBB4FF15308F1041D9E409E7251EB396E88DFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3255 fcdd30-fcdd66 3256 fcdd68-fcdd79 call 100adc4 3255->3256 3257 fcdd7a-fcdda6 call fc4550 call fce3b0 3255->3257 3264 fcdda8 3257->3264 3265 fcddd4-fcddd9 3257->3265 3266 fcddae-fcddd3 call fcd340 call 100adc4 3264->3266 3267 fcddaa-fcddac 3264->3267 3268 fcdde0-fcddf9 3265->3268 3267->3265 3267->3266 3270 fcdfbc 3268->3270 3271 fcddff-fcde12 call fccc60 3268->3271 3272 fcdfbf-fcdfc6 3270->3272 3281 fcde18-fcde4b call fc44b0 3271->3281 3282 fcdeb3-fcdeb6 3271->3282 3272->3268 3275 fcdfcc-fcdfce 3272->3275 3278 fce0fd 3275->3278 3279 fcdfd4-fcdfd8 3275->3279 3288 fce0ff-fce10f call 100adc4 3278->3288 3286 fcdfda-fcdfed call fcefc0 3279->3286 3287 fcdff3-fcdffa 3279->3287 3296 fcde4d-fcde50 3281->3296 3297 fcde70-fcde75 3281->3297 3284 fcdeb8-fcdebf 3282->3284 3285 fcded5-fcdee8 call fcf090 3282->3285 3284->3285 3290 fcdec1-fcdec3 3284->3290 3312 fcdeee-fcdef6 call fcd3e0 3285->3312 3313 fce00b-fce041 3285->3313 3286->3287 3310 fce09e-fce0b0 call 100adc4 3286->3310 3292 fce000-fce006 3287->3292 3293 fce0b1-fce0b8 3287->3293 3298 fcdefe-fcdf03 3290->3298 3299 fcdec5-fcded3 call fcf090 3290->3299 3301 fce0d9-fce0fa call fd9850 call fcd340 3292->3301 3304 fce0ba-fce0c0 3293->3304 3305 fce0c2-fce0c9 3293->3305 3307 fcde57-fcde69 call fcd3e0 3296->3307 3308 fcde52-fcde55 3296->3308 3297->3298 3311 fcde7b-fcde7e 3297->3311 3314 fcdfb9 3298->3314 3315 fcdf09-fcdf29 WSASetLastError 3298->3315 3330 fcdefb 3299->3330 3301->3278 3304->3301 3316 fce0cb-fce0d1 3305->3316 3317 fce0d3 3305->3317 3307->3297 3308->3297 3308->3307 3311->3298 3322 fcde80-fcde98 call fc44b0 3311->3322 3312->3330 3323 fce057-fce063 call fc6030 3313->3323 3324 fce043-fce04d call fcdad0 3313->3324 3314->3270 3315->3270 3326 fcdf2f-fcdf68 call fc5140 call fd9850 call fcd3e0 3315->3326 3316->3301 3317->3301 3322->3298 3341 fcde9a 3322->3341 3323->3288 3342 fce069-fce079 3323->3342 3324->3323 3357 fcdf6a-fcdf70 3326->3357 3358 fcdf72-fcdf7c call 100b540 3326->3358 3330->3298 3346 fcde9c-fcdea1 3341->3346 3347 fcdea3-fcdeb1 call fcefc0 3341->3347 3343 fce088-fce090 call fce4a0 3342->3343 3344 fce07b-fce085 call fd5f20 3342->3344 3354 fce095-fce09b call fc8f30 3343->3354 3344->3343 3346->3298 3346->3347 3347->3298 3354->3310 3360 fcdf81-fcdfa0 call fcefc0 3357->3360 3358->3360 3364 fcdfaf-fcdfb7 3360->3364 3365 fcdfa2-fcdfad 3360->3365 3364->3272 3365->3314 3365->3364
                                          Strings
                                          • L', xrefs: 00FCDE69
                                          • Connection failed, xrefs: 00FCDEEE
                                          • After %ldms connect time, move on!, xrefs: 00FCDE59
                                          • Failed to connect to %s port %ld: %s, xrefs: 00FCE0EA
                                          • connect to %s port %ld failed: %s, xrefs: 00FCDF4F
                                          • Connection time-out, xrefs: 00FCDDAE
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: After %ldms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$L'$connect to %s port %ld failed: %s
                                          • API String ID: 0-47163629
                                          • Opcode ID: 9372bdaccc61c0c9567efc7d9d5bd81736b96ea1b2ce70f6ef5ceee5c30a1ffd
                                          • Instruction ID: 4b6d4c7e0d85154bbbe270e2ebe431edfa29f6cb4288ab708977a6725fa5f30e
                                          • Opcode Fuzzy Hash: 9372bdaccc61c0c9567efc7d9d5bd81736b96ea1b2ce70f6ef5ceee5c30a1ffd
                                          • Instruction Fuzzy Hash: 30C19E71E0020AAFDF14DFA4DD82FAD7BB5AF05314F14017DE809AB296EB35A841EB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3366 fa80b0-fa80fb 3367 fa8108-fa8122 call f94880 3366->3367 3368 fa80fd-fa8102 call f93880 3366->3368 3373 fa82aa-fa82b6 3367->3373 3374 fa8128-fa814f call f92f20 3367->3374 3368->3367 3376 fa82b8-fa82c2 3373->3376 3377 fa82d9-fa82e8 3373->3377 3382 fa8153-fa815d 3374->3382 3376->3377 3379 fa82c4-fa82d0 3376->3379 3380 fa82ea-fa82ef call fa7460 3377->3380 3381 fa82f6-fa82f9 3377->3381 3379->3377 3394 fa82d2-fa82d4 3379->3394 3390 fa82f4 3380->3390 3384 fa82fb-fa82fd 3381->3384 3385 fa82ff-fa830d call fa79b0 3381->3385 3387 fa8163-fa823b call f92f60 call f911b0 * 7 call f915a0 call f911b0 * 2 call fb2400 call f911b0 call fb2400 call f911b0 call f915a0 3382->3387 3388 fa8285-fa8287 3382->3388 3384->3385 3391 fa833a 3384->3391 3398 fa830f-fa8311 3385->3398 3399 fa8313-fa831b 3385->3399 3387->3382 3439 fa8241-fa8253 call 1014490 3387->3439 3388->3373 3396 fa8289-fa8299 call 1013200 3388->3396 3395 fa833f-fa835a call 100adc4 3390->3395 3391->3395 3394->3377 3396->3373 3398->3395 3403 fa8328-fa832a 3399->3403 3404 fa831d-fa8326 call fa7460 3399->3404 3403->3391 3409 fa832c-fa8334 MessageBoxW 3403->3409 3404->3395 3409->3391 3442 fa8270-fa8280 call 10159f0 3439->3442 3443 fa8255-fa826b call f8e1f0 call 1013740 3439->3443 3442->3382 3443->3442
                                          APIs
                                            • Part of subcall function 00F93880: new.LIBCMT ref: 00F93896
                                          • MessageBoxW.USER32(00000002,Administrator rights required for this setup,00000002,00000002), ref: 00FA8334
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Message
                                          • String ID: . cmd=$. uac=$Administrator rights required for this setup$RunInstaller$]: $installer$run installer. path=
                                          • API String ID: 2030045667-2644114103
                                          • Opcode ID: ab25b13ab5bdddd6025f1d72377a51963521b138d049f2f474e3d697916a56e5
                                          • Instruction ID: 552b9dedbd82c419ca177dcb337f71e9fe167d852f81e8608e62a6a5fb48967e
                                          • Opcode Fuzzy Hash: ab25b13ab5bdddd6025f1d72377a51963521b138d049f2f474e3d697916a56e5
                                          • Instruction Fuzzy Hash: D571C270E006199BDF10EBA5CC41BAEB7B5AF45BA4F10411DF842BB391DF78AD029B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3600 108c796-108c7a6 3601 108c7a8-108c7bb call 107da14 call 107da27 3600->3601 3602 108c7c0-108c7c2 3600->3602 3618 108cb42 3601->3618 3604 108c7c8-108c7ce 3602->3604 3605 108cb2a-108cb37 call 107da14 call 107da27 3602->3605 3604->3605 3608 108c7d4-108c7ff 3604->3608 3623 108cb3d call 1079211 3605->3623 3608->3605 3611 108c805-108c80e 3608->3611 3614 108c828-108c82a 3611->3614 3615 108c810-108c823 call 107da14 call 107da27 3611->3615 3616 108c830-108c834 3614->3616 3617 108cb26-108cb28 3614->3617 3615->3623 3616->3617 3621 108c83a-108c83e 3616->3621 3622 108cb45-108cb4a 3617->3622 3618->3622 3621->3615 3626 108c840-108c857 3621->3626 3623->3618 3629 108c859-108c85c 3626->3629 3630 108c874-108c87d 3626->3630 3631 108c85e-108c864 3629->3631 3632 108c866-108c86f 3629->3632 3633 108c89b-108c8a5 3630->3633 3634 108c87f-108c896 call 107da14 call 107da27 call 1079211 3630->3634 3631->3632 3631->3634 3637 108c910-108c92a 3632->3637 3635 108c8ac-108c8ca call 1086524 call 10872f5 * 2 3633->3635 3636 108c8a7-108c8a9 3633->3636 3662 108ca5d 3634->3662 3670 108c8cc-108c8e2 call 107da27 call 107da14 3635->3670 3671 108c8e7-108c90d call 1084f75 3635->3671 3636->3635 3639 108c9fe-108ca07 call 109a006 3637->3639 3640 108c930-108c940 3637->3640 3653 108ca09-108ca1b 3639->3653 3654 108ca7a 3639->3654 3640->3639 3643 108c946-108c948 3640->3643 3643->3639 3647 108c94e-108c974 3643->3647 3647->3639 3651 108c97a-108c98d 3647->3651 3651->3639 3658 108c98f-108c991 3651->3658 3653->3654 3656 108ca1d-108ca2c GetConsoleMode 3653->3656 3660 108ca7e-108ca96 ReadFile 3654->3660 3656->3654 3661 108ca2e-108ca32 3656->3661 3658->3639 3663 108c993-108c9be 3658->3663 3665 108ca98-108ca9e 3660->3665 3666 108caf2-108cafd GetLastError 3660->3666 3661->3660 3667 108ca34-108ca4e ReadConsoleW 3661->3667 3668 108ca60-108ca6a call 10872f5 3662->3668 3663->3639 3669 108c9c0-108c9d3 3663->3669 3665->3666 3674 108caa0 3665->3674 3672 108caff-108cb11 call 107da27 call 107da14 3666->3672 3673 108cb16-108cb19 3666->3673 3677 108ca6f-108ca78 3667->3677 3678 108ca50 GetLastError 3667->3678 3668->3622 3669->3639 3682 108c9d5-108c9d7 3669->3682 3670->3662 3671->3637 3672->3662 3679 108cb1f-108cb21 3673->3679 3680 108ca56-108ca5c call 107d9f1 3673->3680 3676 108caa3-108cab5 3674->3676 3676->3668 3687 108cab7-108cabb 3676->3687 3677->3676 3678->3680 3679->3668 3680->3662 3682->3639 3690 108c9d9-108c9f9 3682->3690 3693 108cabd-108cacd call 108c4b2 3687->3693 3694 108cad4-108cadf 3687->3694 3690->3639 3705 108cad0-108cad2 3693->3705 3699 108caeb-108caf0 call 108c2f2 3694->3699 3700 108cae1 call 108c602 3694->3700 3706 108cae6-108cae9 3699->3706 3700->3706 3705->3668 3706->3705
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b59a11e735bf5de2f38d3e51bcfd413ba375e2899ab1af70c57a52beef0eb39
                                          • Instruction ID: 848e33bd991c97e59f97da5e17850ef33bdaa2b541e822a732b5b7804c3daa34
                                          • Opcode Fuzzy Hash: 1b59a11e735bf5de2f38d3e51bcfd413ba375e2899ab1af70c57a52beef0eb39
                                          • Instruction Fuzzy Hash: 3EC1AF74D0824AAFEB61EFACD944BEDBBB0BF59314F084188E5C0A7281C7359941CB74

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3708 1091d32-1091d5a call 109179c call 10917fa 3713 1091d60-1091d6c call 10917a2 3708->3713 3714 1091e82-1091ede call 107923e call 1085bb1 3708->3714 3713->3714 3719 1091d72-1091d7e call 10917ce 3713->3719 3726 1091ee8-1091eeb 3714->3726 3727 1091ee0-1091ee6 3714->3727 3719->3714 3725 1091d84-1091da5 call 10872f5 GetTimeZoneInformation 3719->3725 3737 1091dab-1091dcc 3725->3737 3738 1091e5e-1091e81 call 1091796 call 109178a call 1091790 3725->3738 3728 1091eed-1091efd call 1086524 3726->3728 3729 1091f2e-1091f40 3726->3729 3727->3729 3741 1091eff 3728->3741 3742 1091f07-1091f20 call 1085bb1 3728->3742 3732 1091f50 3729->3732 3733 1091f42-1091f45 3729->3733 3739 1091f55-1091f6c call 10872f5 call 100adc4 3732->3739 3740 1091f50 call 1091d32 3732->3740 3733->3732 3736 1091f47-1091f4e call 1091b5d 3733->3736 3736->3739 3744 1091dce-1091dd3 3737->3744 3745 1091dd6-1091ddd 3737->3745 3740->3739 3748 1091f00-1091f05 call 10872f5 3741->3748 3765 1091f22-1091f23 3742->3765 3766 1091f25-1091f2b call 10872f5 3742->3766 3744->3745 3751 1091ddf-1091de6 3745->3751 3752 1091df5-1091df8 3745->3752 3769 1091f2d 3748->3769 3751->3752 3757 1091de8-1091df3 3751->3757 3759 1091dfb-1091e1c call 1086034 WideCharToMultiByte 3752->3759 3757->3759 3771 1091e2a-1091e2c 3759->3771 3772 1091e1e-1091e21 3759->3772 3765->3748 3766->3769 3769->3729 3776 1091e2e-1091e4a WideCharToMultiByte 3771->3776 3772->3771 3775 1091e23-1091e28 3772->3775 3775->3776 3777 1091e59-1091e5c 3776->3777 3778 1091e4c-1091e4f 3776->3778 3777->3738 3778->3777 3779 1091e51-1091e57 3778->3779 3779->3738
                                          APIs
                                          • GetTimeZoneInformation.KERNELBASE(?,00000000,00000000,00000000,?,010C3258), ref: 01091D9C
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,Eastern Standard Time,000000FF,00000000,0000003F,00000000,?,?), ref: 01091E14
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,Eastern Summer Time,000000FF,?,0000003F,00000000,?), ref: 01091E41
                                          • _free.LIBCMT ref: 01091D8A
                                            • Part of subcall function 010872F5: RtlFreeHeap.NTDLL(00000000,00000000,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?), ref: 0108730B
                                            • Part of subcall function 010872F5: GetLastError.KERNEL32(?,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?,?), ref: 0108731D
                                          • _free.LIBCMT ref: 01091F56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                          • API String ID: 1286116820-239921721
                                          • Opcode ID: 0ecd71c1c89a649b8953a4680919208abd834a51ab38791e33f31c238663c7bd
                                          • Instruction ID: 6b9ab2e19f8cf815c6074bc02b851de1860773bbf1430c51dcaf11bc1be31eef
                                          • Opcode Fuzzy Hash: 0ecd71c1c89a649b8953a4680919208abd834a51ab38791e33f31c238663c7bd
                                          • Instruction Fuzzy Hash: E2510971A0020BDBDF20EF699D919EEB7FCFB40334B10029AF5D497684D7318A459B50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3780 fccc60-fccc9c 3781 fccc9e 3780->3781 3782 fcccba 3780->3782 3783 fcccab-fcccb8 3781->3783 3784 fccca0-fccca9 3781->3784 3785 fcccbd-fcccc4 3782->3785 3783->3785 3784->3783 3784->3785 3786 fccce9-fccceb 3785->3786 3787 fcccc6-fcccc9 3785->3787 3789 fccced 3786->3789 3790 fccd0a-fccd24 3786->3790 3787->3786 3788 fccccb-fcccce 3787->3788 3788->3786 3791 fcccd0-fccce8 call fcd020 call 100adc4 3788->3791 3792 fcccef-fcccf1 3789->3792 3793 fcccf3-fccd04 call fc4550 3789->3793 3794 fccd26-fccd41 3790->3794 3795 fccd47-fccd4a 3790->3795 3792->3790 3792->3793 3793->3790 3794->3795 3796 fccd4c-fccd50 3795->3796 3797 fccdb3-fccdc3 3795->3797 3800 fccd60-fccd62 3796->3800 3801 fccd52-fccd59 3796->3801 3804 fccdc5-fccdd9 3797->3804 3805 fcce11-fcce19 3797->3805 3807 fccd7d-fccd81 3800->3807 3808 fccd64-fccd67 3800->3808 3801->3800 3806 fccd5b-fccd5e 3801->3806 3812 fccddb-fccdde 3804->3812 3813 fccdf1-fccdf3 3804->3813 3810 fcce2d-fcce33 3805->3810 3811 fcce1b 3805->3811 3806->3800 3806->3801 3819 fccd91-fccd93 3807->3819 3820 fccd83-fccd8a 3807->3820 3808->3807 3817 fccd69-fccd77 3808->3817 3823 fcce39-fcce3c 3810->3823 3821 fcce1d-fcce1f 3811->3821 3822 fcce21-fcce2b 3811->3822 3814 fccde0-fccde7 3812->3814 3815 fcce0a-fcce0d 3813->3815 3816 fccdf5-fccdf8 3813->3816 3824 fccdee 3814->3824 3825 fccde9-fccdec 3814->3825 3815->3805 3816->3815 3826 fccdfa-fcce04 3816->3826 3817->3807 3828 fccdae-fccdb0 3819->3828 3829 fccd95-fccd98 3819->3829 3820->3819 3827 fccd8c-fccd8f 3820->3827 3821->3810 3821->3822 3822->3823 3830 fcce42-fcce44 3823->3830 3824->3813 3825->3814 3825->3824 3826->3815 3827->3819 3827->3820 3828->3797 3829->3828 3831 fccd9a-fccda8 3829->3831 3832 fcce7f-fcce83 3830->3832 3833 fcce46 3830->3833 3831->3828 3834 fcce85-fcce8b 3832->3834 3835 fcce91-fccecb select 3832->3835 3836 fcce4c-fcce7d 3833->3836 3837 fcce48-fcce4a 3833->3837 3834->3835 3838 fccecd-fcced5 WSAGetLastError 3835->3838 3839 fccf45-fccf47 3835->3839 3836->3835 3837->3832 3837->3836 3842 fccee7-fcceef 3838->3842 3843 fcced7-fccede 3838->3843 3840 fccf5d 3839->3840 3841 fccf49-fccf5c call 100adc4 3839->3841 3846 fccf5f-fccf71 call 100adc4 3840->3846 3847 fccf72-fccf7a 3840->3847 3848 fccf00-fccf06 3842->3848 3849 fccef1 3842->3849 3843->3841 3845 fccee0-fccee5 3843->3845 3845->3841 3845->3842 3854 fccf7c-fccfa2 __WSAFDIsSet * 2 3847->3854 3855 fccfa7-fccfaa 3847->3855 3848->3830 3852 fccf0b-fccf32 call fc4550 call fc44b0 3849->3852 3853 fccef3-fccef5 3849->3853 3852->3846 3875 fccf34-fccf40 3852->3875 3853->3852 3857 fccef7 3853->3857 3854->3855 3858 fccfa4 3854->3858 3860 fccfac-fccfbb __WSAFDIsSet 3855->3860 3861 fccfd4-fccfda 3855->3861 3857->3848 3858->3855 3865 fccfbd 3860->3865 3866 fccfc0-fccfcf __WSAFDIsSet 3860->3866 3862 fccfdc-fccfeb __WSAFDIsSet 3861->3862 3863 fcd004-fcd016 call 100adc4 3861->3863 3868 fccfed 3862->3868 3869 fccff0-fccfff __WSAFDIsSet 3862->3869 3865->3866 3866->3861 3867 fccfd1 3866->3867 3867->3861 3868->3869 3869->3863 3873 fcd001 3869->3873 3873->3863 3875->3830
                                          APIs
                                          • select.WS2_32(?,?,00000000,?,?), ref: 00FCCEC2
                                          • WSAGetLastError.WS2_32 ref: 00FCCECD
                                          • __WSAFDIsSet.WS2_32(000000FF,?), ref: 00FCCF84
                                          • __WSAFDIsSet.WS2_32(000000FF,?), ref: 00FCCF9B
                                          • __WSAFDIsSet.WS2_32(00FC56EF,?), ref: 00FCCFB4
                                          • __WSAFDIsSet.WS2_32(00FC56EF,?), ref: 00FCCFC8
                                          • __WSAFDIsSet.WS2_32(?,00000000), ref: 00FCCFE4
                                          • __WSAFDIsSet.WS2_32(?,?), ref: 00FCCFF8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastselect
                                          • String ID:
                                          • API String ID: 215497628-0
                                          • Opcode ID: a8414d204af38aae79709f3b0e09239c99c1aae3e13d95b32e7c95a1874d180a
                                          • Instruction ID: 3988521feea07f2f742a927e981c40a6b41e4eb07d26f0654c1bb2b289c9a155
                                          • Opcode Fuzzy Hash: a8414d204af38aae79709f3b0e09239c99c1aae3e13d95b32e7c95a1874d180a
                                          • Instruction Fuzzy Hash: 59B16471E0021A8BDF25DF288D51BAD77B9AB49320F1046BED86ED7181D7349E819FD0
                                          APIs
                                            • Part of subcall function 0105CC80: ___std_exception_copy.LIBVCRUNTIME ref: 0105CDB4
                                            • Part of subcall function 0104F660: new.LIBCMT ref: 0104F662
                                            • Part of subcall function 0105E060: new.LIBCMT ref: 0105E062
                                            • Part of subcall function 0106E6F0: LoadLibraryA.KERNEL32(?), ref: 0106E70C
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 0105D1AC
                                          • ___std_exception_destroy.LIBVCRUNTIME ref: 0105D201
                                          • __Init_thread_footer.LIBCMT ref: 0105D4BE
                                          • std::_Xinvalid_argument.LIBCPMT ref: 0105D5C9
                                            • Part of subcall function 00FF2308: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00FF2314
                                            • Part of subcall function 00FF2308: __CxxThrowException@8.LIBVCRUNTIME ref: 00FF2322
                                          Strings
                                          • Unable to open message catalog: , xrefs: 0105D161
                                          • string too long, xrefs: 0105D5C4
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_exception_copy$Exception@8Init_thread_footerLibraryLoadThrowXinvalid_argument___std_exception_destroystd::_std::invalid_argument::invalid_argument
                                          • String ID: Unable to open message catalog: $string too long
                                          • API String ID: 1682877864-52554103
                                          • Opcode ID: 337f0bd2945a8bd1cd2934c4e9a7376ab802394f2a8e8a3110e8072fa80270b7
                                          • Instruction ID: 3948ee2011d2ed4ac3947c9997e7d99208366558080e9aeeab42ec1d06c408b9
                                          • Opcode Fuzzy Hash: 337f0bd2945a8bd1cd2934c4e9a7376ab802394f2a8e8a3110e8072fa80270b7
                                          • Instruction Fuzzy Hash: 6D02BA70900248EFDF55DFA8C980BDE7BE5EF18308F14815AEC9597291D778EA48CBA1
                                          APIs
                                            • Part of subcall function 00FCEB60: htons.WS2_32(?), ref: 00FCEB8D
                                          • GetLastError.KERNEL32(?,?,?,?,00000010,000001B8,00000007), ref: 00FCEC3A
                                            • Part of subcall function 00FD9850: GetLastError.KERNEL32(00000010,00000000,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9856
                                            • Part of subcall function 00FD9850: _strncpy.LIBCMT ref: 00FD988A
                                            • Part of subcall function 00FD9850: _strrchr.LIBCMT ref: 00FD98DF
                                            • Part of subcall function 00FD9850: _strrchr.LIBCMT ref: 00FD98FA
                                            • Part of subcall function 00FD9850: GetLastError.KERNEL32(?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9912
                                            • Part of subcall function 00FD9850: SetLastError.KERNEL32(00000000,?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?), ref: 00FD991D
                                            • Part of subcall function 00FCD340: ___swprintf_l.LIBCMT ref: 00FCD382
                                            • Part of subcall function 00FCDAD0: closesocket.WS2_32(00FC94A9), ref: 00FCDB08
                                          Strings
                                          • Trying %s..., xrefs: 00FCEC82
                                          • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 00FCEC51
                                          • Immediate connect fail for %s: %s, xrefs: 00FCEE6E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_strrchr$___swprintf_l_strncpyclosesockethtons
                                          • String ID: Trying %s...$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                          • API String ID: 2012154964-3338264681
                                          • Opcode ID: 5b6fe4697508290caaaec9c2a620b51166aa995b768de2cd5c2e5086dc3f8028
                                          • Instruction ID: 1f90a20a1c9a01b2a50c4d835b988ecc57000e4e3dc7a7a963136fe44067b27c
                                          • Opcode Fuzzy Hash: 5b6fe4697508290caaaec9c2a620b51166aa995b768de2cd5c2e5086dc3f8028
                                          • Instruction Fuzzy Hash: 3981A371E0111A9BDB24DB64DD86FEEB7B8EF15320F0401AEF90D93241DA395E44DB61
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\NET Framework Setup\NDP\v3.5,00000000,00020019,?), ref: 00F946B5
                                          • RegQueryValueExW.KERNELBASE(?,Version,00000000,?,?,00000104), ref: 00F946E4
                                          • RegCloseKey.ADVAPI32(?), ref: 00F946F4
                                          • RegCloseKey.ADVAPI32(?), ref: 00F946FF
                                          Strings
                                          • Version, xrefs: 00F946D9
                                          • Software\Microsoft\NET Framework Setup\NDP\v3.5, xrefs: 00F94699
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Software\Microsoft\NET Framework Setup\NDP\v3.5$Version
                                          • API String ID: 1607946009-2487358979
                                          • Opcode ID: a2756a70a4b31f225b327e26977eed9468a7ad3bb2f69b8af327ed0cd4f38bda
                                          • Instruction ID: f015d4aa2e972e646b48d69d6f1315bfad991d71a5d7a90c10cf891809fe322c
                                          • Opcode Fuzzy Hash: a2756a70a4b31f225b327e26977eed9468a7ad3bb2f69b8af327ed0cd4f38bda
                                          • Instruction Fuzzy Hash: BE41B471A4011DABDF24EBE4DCC4EEE77B9AB25311F0005A9E84996140D735AE429B51
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Client,00000000,00020019,?), ref: 00F940FA
                                          • RegQueryValueExW.KERNELBASE(?,Install,00000000,00000000,00000000,00000004), ref: 00F9411A
                                          • RegCloseKey.ADVAPI32(?), ref: 00F94127
                                          • RegCloseKey.ADVAPI32(?), ref: 00F9413D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Install$Software\Microsoft\NET Framework Setup\NDP\v4\Client
                                          • API String ID: 1607946009-4260260141
                                          • Opcode ID: a25cbc989bc30528775288adb540cb6902dc93eec7fe5ae5ea551f3833068a20
                                          • Instruction ID: 2bf32799264ba1595a1e6ab984f7e4c0d88b204fef7392b6cf697b261736e0d7
                                          • Opcode Fuzzy Hash: a25cbc989bc30528775288adb540cb6902dc93eec7fe5ae5ea551f3833068a20
                                          • Instruction Fuzzy Hash: A8118FB0E0020CEBEF20EF90DC46FEEB7B8AB14705F500059FA46BA185DA766A44DB50
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\NET Framework Setup\NDP\v3.5,00000000,00020019,?), ref: 00F9403A
                                          • RegQueryValueExW.KERNELBASE(?,Install,00000000,00000000,00000000,00000004), ref: 00F9405A
                                          • RegCloseKey.ADVAPI32(?), ref: 00F94067
                                          • RegCloseKey.KERNELBASE(?), ref: 00F9407D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Install$Software\Microsoft\NET Framework Setup\NDP\v3.5
                                          • API String ID: 1607946009-1679568285
                                          • Opcode ID: c84cc10bcf7f0c0414e58d0dcb4da9fd34b88beb6325943b89672c7608530785
                                          • Instruction ID: 6c40eb00c86d1dff2b7a39b061029a5133a3f0aac5b59da911ec9642a682e835
                                          • Opcode Fuzzy Hash: c84cc10bcf7f0c0414e58d0dcb4da9fd34b88beb6325943b89672c7608530785
                                          • Instruction Fuzzy Hash: 1B116D70E4020CABEF20DF90CC4AFEEB7B8AB14705F004159FA467A181EB766A04DB51
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Full,00000000,00020019,?), ref: 00F941BA
                                          • RegQueryValueExW.KERNELBASE(?,Install,00000000,00000000,00000000,00000004), ref: 00F941DA
                                          • RegCloseKey.ADVAPI32(?), ref: 00F941E7
                                          • RegCloseKey.ADVAPI32(?), ref: 00F941FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Install$Software\Microsoft\NET Framework Setup\NDP\v4\Full
                                          • API String ID: 1607946009-105569139
                                          • Opcode ID: a4c14a6722535f4f40b7edc545ae8112b11c35cf886dec77452fcebfe2f2b317
                                          • Instruction ID: 2577a16c9d42f9bab232737c3ba83f9a29a2cee9bfe3567e0d1779d278d4b3c1
                                          • Opcode Fuzzy Hash: a4c14a6722535f4f40b7edc545ae8112b11c35cf886dec77452fcebfe2f2b317
                                          • Instruction Fuzzy Hash: 7611BF74A0020DABEF21EF90DC46FEEB7B8AB10705F100059FA467A1C0DA766A44DB50
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Full,00000000,00020019,?), ref: 00F9432D
                                          • RegQueryValueExW.KERNELBASE(?,Release,00000000,00000000,00000000,00000004), ref: 00F9434D
                                          • RegCloseKey.ADVAPI32(?), ref: 00F9435A
                                          • RegCloseKey.ADVAPI32(?), ref: 00F94371
                                          Strings
                                          • Release, xrefs: 00F94345
                                          • Software\Microsoft\NET Framework Setup\NDP\v4\Full, xrefs: 00F94313
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Release$Software\Microsoft\NET Framework Setup\NDP\v4\Full
                                          • API String ID: 1607946009-1522824743
                                          • Opcode ID: c1ead7f3eca9adc6f2fd229c0a79897f8a2f65c52bc24912b66b1e07784b6589
                                          • Instruction ID: 520f1025cbff4b8aa4c5f17a18c4b2dbe009774fbc80d2f99d686a93ca5a5fef
                                          • Opcode Fuzzy Hash: c1ead7f3eca9adc6f2fd229c0a79897f8a2f65c52bc24912b66b1e07784b6589
                                          • Instruction Fuzzy Hash: 82118E71A4020DEFEF10DFA0DC96FEEB7B8EB04701F50405AF946A6184DB769A08DB60
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Full,00000000,00020019,?), ref: 00F9427D
                                          • RegQueryValueExW.KERNELBASE(?,Release,00000000,00000000,00000000,00000004), ref: 00F9429D
                                          • RegCloseKey.ADVAPI32(?), ref: 00F942AA
                                          • RegCloseKey.ADVAPI32(?), ref: 00F942C1
                                          Strings
                                          • Release, xrefs: 00F94295
                                          • Software\Microsoft\NET Framework Setup\NDP\v4\Full, xrefs: 00F94263
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Release$Software\Microsoft\NET Framework Setup\NDP\v4\Full
                                          • API String ID: 1607946009-1522824743
                                          • Opcode ID: 33f4fff0fc65aa040c7da6f03a79e9b02d6918b925d979045c0f7f8ef283c453
                                          • Instruction ID: 5808a15eb44025db832a7d75ed0d90294d7d9389ac5d7a40c8d711f02d86207a
                                          • Opcode Fuzzy Hash: 33f4fff0fc65aa040c7da6f03a79e9b02d6918b925d979045c0f7f8ef283c453
                                          • Instruction Fuzzy Hash: 78118271A4020DEFDF10DFA0DC55BFEB7B8EB04306F50405AF946A6180DB765A08DB60
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Full,00000000,00020019,?), ref: 00F945ED
                                          • RegQueryValueExW.KERNELBASE(?,Release,00000000,00000000,00000000,00000004), ref: 00F9460D
                                          • RegCloseKey.ADVAPI32(?), ref: 00F9461A
                                          • RegCloseKey.ADVAPI32(?), ref: 00F94631
                                          Strings
                                          • Release, xrefs: 00F94605
                                          • Software\Microsoft\NET Framework Setup\NDP\v4\Full, xrefs: 00F945D3
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Release$Software\Microsoft\NET Framework Setup\NDP\v4\Full
                                          • API String ID: 1607946009-1522824743
                                          • Opcode ID: 194b9350eebdc490a3b564fc60d0fadaca9ed5ca0174703fb8563059b8146fb0
                                          • Instruction ID: 113407fc7d869531de92c25dd6de0d9b2e60f6b71504d4954fb51a34d30547b2
                                          • Opcode Fuzzy Hash: 194b9350eebdc490a3b564fc60d0fadaca9ed5ca0174703fb8563059b8146fb0
                                          • Instruction Fuzzy Hash: 19115EB1A4020DEBDF10DFA0DC95BEEB7B8EB04705F50405AF946A6185DB7A9A04DB60
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Full,00000000,00020019,?), ref: 00F9453D
                                          • RegQueryValueExW.KERNELBASE(?,Release,00000000,00000000,00000000,00000004), ref: 00F9455D
                                          • RegCloseKey.ADVAPI32(?), ref: 00F9456A
                                          • RegCloseKey.ADVAPI32(?), ref: 00F94581
                                          Strings
                                          • Release, xrefs: 00F94555
                                          • Software\Microsoft\NET Framework Setup\NDP\v4\Full, xrefs: 00F94523
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Release$Software\Microsoft\NET Framework Setup\NDP\v4\Full
                                          • API String ID: 1607946009-1522824743
                                          • Opcode ID: e21625658d475c71eeaf141e2a5d1a96831ab6300091fbb7e33b48bf2c462f16
                                          • Instruction ID: feafe9043c6e1fdaff9d71bc1f7c7561138fbd12dd8a436ff21da0d57cfeb055
                                          • Opcode Fuzzy Hash: e21625658d475c71eeaf141e2a5d1a96831ab6300091fbb7e33b48bf2c462f16
                                          • Instruction Fuzzy Hash: 01118EB1A4020DEBDF20DFA0DC95BEEB7B8EB04701F50405AF946A6184EB769A04DB60
                                          APIs
                                          • __allrem.LIBCMT ref: 0107D87F
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0107D89B
                                          • __allrem.LIBCMT ref: 0107D8B2
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0107D8D0
                                          • __allrem.LIBCMT ref: 0107D8E7
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0107D905
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1992179935-0
                                          • Opcode ID: 751f8abe2008aafb220b056cd60e34a4dd8e55c36b13598ae224ddcb7106dd44
                                          • Instruction ID: abd5aff089e75328886ac9200bc3a64a20749ba084a95ad6a073d92fd640f3fb
                                          • Opcode Fuzzy Hash: 751f8abe2008aafb220b056cd60e34a4dd8e55c36b13598ae224ddcb7106dd44
                                          • Instruction Fuzzy Hash: 8781C472E00B07ABE725AAADCC40BAAB7E9FF54734F14416AE5D5D7280F770E9008758
                                          APIs
                                          • ___swprintf_l.LIBCMT ref: 00FC49DA
                                            • Part of subcall function 00FD94B0: getaddrinfo.WS2_32(?,00000000,?,?), ref: 00FD94CE
                                            • Part of subcall function 00FD94B0: freeaddrinfo.WS2_32(?,?), ref: 00FD95BF
                                          • WSAGetLastError.WS2_32 ref: 00FC4A02
                                          • WSAGetLastError.WS2_32 ref: 00FC4A08
                                          • EnterCriticalSection.KERNEL32(?), ref: 00FC4A1E
                                          • LeaveCriticalSection.KERNEL32(?), ref: 00FC4A2C
                                          • LeaveCriticalSection.KERNEL32(?), ref: 00FC4A4B
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CriticalSection$ErrorLastLeave$Enter___swprintf_lfreeaddrinfogetaddrinfo
                                          • String ID:
                                          • API String ID: 2327269287-0
                                          • Opcode ID: 08d6aa653d5ad2309756e1db44d207f73912d3b5e50d07dd94d40eb50cbe2bca
                                          • Instruction ID: 4886c8d03f4ce8288ee0cecd1ebded0190f80d359360ffba0fc501a687352dd3
                                          • Opcode Fuzzy Hash: 08d6aa653d5ad2309756e1db44d207f73912d3b5e50d07dd94d40eb50cbe2bca
                                          • Instruction Fuzzy Hash: 4E116D71900209EFC720EFA4DD85FABB7F9EF48300F14492EF59693605DB39A9049B65
                                          APIs
                                            • Part of subcall function 00FD7DE0: SetLastError.KERNEL32(0000273F,?,00FC41D2,00000002,00FC300A,?), ref: 00FD7DEE
                                          • ___swprintf_l.LIBCMT ref: 00FC4612
                                          Strings
                                          • getaddrinfo() failed for %s:%d; %s, xrefs: 00FC468A
                                          • init_resolve_thread() failed for %s; %s, xrefs: 00FC4655
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast___swprintf_l
                                          • String ID: getaddrinfo() failed for %s:%d; %s$init_resolve_thread() failed for %s; %s
                                          • API String ID: 2990598187-1389973398
                                          • Opcode ID: 0e738bf742c39f88a9f80e658ec24e67983b8aaaa6a2c4f2eae27f28ff563f09
                                          • Instruction ID: 1ad6e13c5365d455ecc9c982cf7563427d984936decf6e21db4f9361a290c846
                                          • Opcode Fuzzy Hash: 0e738bf742c39f88a9f80e658ec24e67983b8aaaa6a2c4f2eae27f28ff563f09
                                          • Instruction Fuzzy Hash: B1318672E00109ABDB00EFA5DD82EFFB7BCEF49211F54006AF909E7241EA356915D7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: invalid string position$string too long
                                          • API String ID: 0-4289949731
                                          • Opcode ID: bc94e81014372a6ad7893128fa3c4f1fdd81d8a023952fb9a31f31472fbe8042
                                          • Instruction ID: 06631d7ccf7c3035224fc5a24ec5f5b0440d6fc21efe0ba2703f077601e081c8
                                          • Opcode Fuzzy Hash: bc94e81014372a6ad7893128fa3c4f1fdd81d8a023952fb9a31f31472fbe8042
                                          • Instruction Fuzzy Hash: 1C710732B04205AFEF24CF5CDC80A6EB7EAEF94710B15852DE89587381D7B1DD50A7A0
                                          APIs
                                            • Part of subcall function 00FBF7F0: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,05CEC6CE), ref: 00FBF852
                                            • Part of subcall function 00FBF7F0: GetLastError.KERNEL32(00000003,00000001,?,?,?,?,05CEC6CE), ref: 00FBF88B
                                            • Part of subcall function 00FBF7F0: ___std_exception_copy.LIBVCRUNTIME ref: 00FBF8F7
                                          • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00FA9C59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorFileIos_base_dtorLastModuleName___std_exception_copystd::ios_base::_
                                          • String ID: .$BundleConfig.<xmlattr>.BundleId$BundleConfig.xml
                                          • API String ID: 2185223521-2168995269
                                          • Opcode ID: 55f7eb94d9cb42dd566ec8ea93fe9ddff4fd85108a47508c54c1cb23b5cd4df7
                                          • Instruction ID: 62da717213d2c592803db96f124e2b8907505c246dac524f6f97c6fc44699171
                                          • Opcode Fuzzy Hash: 55f7eb94d9cb42dd566ec8ea93fe9ddff4fd85108a47508c54c1cb23b5cd4df7
                                          • Instruction Fuzzy Hash: 5CA159B08042589BEB25DB54CC85BEEBBB4FF19304F1041E9E449A7281DBB85BC8DF91
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,00FF309B,?,0108D419,00FF309B,010ED620,0000000C), ref: 0108D551
                                          • GetLastError.KERNEL32(?,0108D419,00FF309B,010ED620,0000000C), ref: 0108D55B
                                          • __dosmaperr.LIBCMT ref: 0108D586
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                          • String ID: Pyi
                                          • API String ID: 490808831-1500441825
                                          • Opcode ID: 23a3532394d67992271113d07010a7ffc864d27c57de4bc83d34b8628e3db692
                                          • Instruction ID: d780e94247c42c348bbcd132fff7a9fc566dd9925c883672b80ee93dd26d8d46
                                          • Opcode Fuzzy Hash: 23a3532394d67992271113d07010a7ffc864d27c57de4bc83d34b8628e3db692
                                          • Instruction Fuzzy Hash: 1B016F3351C21059EF6576B874657BE3BDA5B81638F15039EF5C48B2C1CA35C48147B0
                                          APIs
                                          • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 00FCE36E
                                          • WSAGetLastError.WS2_32(?,00FCECCE,?,?), ref: 00FCE378
                                            • Part of subcall function 00FD9850: GetLastError.KERNEL32(00000010,00000000,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9856
                                            • Part of subcall function 00FD9850: _strncpy.LIBCMT ref: 00FD988A
                                            • Part of subcall function 00FD9850: _strrchr.LIBCMT ref: 00FD98DF
                                            • Part of subcall function 00FD9850: _strrchr.LIBCMT ref: 00FD98FA
                                            • Part of subcall function 00FD9850: GetLastError.KERNEL32(?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9912
                                            • Part of subcall function 00FD9850: SetLastError.KERNEL32(00000000,?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?), ref: 00FD991D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_strrchr$_strncpysetsockopt
                                          • String ID: Could not set TCP_NODELAY: %s$TCP_NODELAY set
                                          • API String ID: 4037253127-1562148346
                                          • Opcode ID: 3a32aabe5d2c448f5eaf2d35de485449e0283e3917b5295bbcb11deb30cdcd84
                                          • Instruction ID: bae513e9e9b9964ca70ad4052507a461a0826b1697f07ce05ecfdac2f98eceac
                                          • Opcode Fuzzy Hash: 3a32aabe5d2c448f5eaf2d35de485449e0283e3917b5295bbcb11deb30cdcd84
                                          • Instruction Fuzzy Hash: FFF082762402197ADA102A85EC82FEF7B2CDF817A9F044026FE0C9A181E6BA655556A1
                                          APIs
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F8B8B4
                                            • Part of subcall function 0100BF2B: __CxxThrowException@8.LIBVCRUNTIME ref: 0100BF42
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F8B8C9
                                          • new.LIBCMT ref: 00F8B8CF
                                          • new.LIBCMT ref: 00F8B8E3
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$Exception@8Throw
                                          • String ID:
                                          • API String ID: 3339364867-0
                                          • Opcode ID: 6266601a088d40801e29021931ab7db2609b9113c76d0bcbfb8ab9962be113f5
                                          • Instruction ID: 583ce3f61a3248c1075482f677aef252846aa512b83694298920f701393c7c10
                                          • Opcode Fuzzy Hash: 6266601a088d40801e29021931ab7db2609b9113c76d0bcbfb8ab9962be113f5
                                          • Instruction Fuzzy Hash: A941D671A00701DBDB24FF24D8856AAB7F9EB44760F100A2DE567C7390E734E905EBA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _com_issue_error$AllocString
                                          • String ID:
                                          • API String ID: 245909816-0
                                          • Opcode ID: 60aa41d80f345070d566bf8c1b269acea4306d44e78ffc13a4e79bc559b81818
                                          • Instruction ID: 764335ef5e0f69f12c065d3010b7f5421ec28b70d77256ad3c0adcaf7ab21624
                                          • Opcode Fuzzy Hash: 60aa41d80f345070d566bf8c1b269acea4306d44e78ffc13a4e79bc559b81818
                                          • Instruction Fuzzy Hash: 7911C271901756EBE7219F59C804B9AFBE8EF54B20F10872EE854AB780E7B59940CB90
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,01092695,?,00000000,00000000,00000000,?,010929C1,00000006,FlsSetValue), ref: 01092720
                                          • GetLastError.KERNEL32(?,01092695,?,00000000,00000000,00000000,?,010929C1,00000006,FlsSetValue,010C3750,010C3758,00000000,00000364,?,010900D2), ref: 0109272C
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,01092695,?,00000000,00000000,00000000,?,010929C1,00000006,FlsSetValue,010C3750,010C3758,00000000), ref: 0109273A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: 81bdb59c47090a3f0a312b10e02a75e3bc1266d91a76564055768549c1e86032
                                          • Instruction ID: 14b7732f823c97001abe74df7ce2b62227b6873408dcf32a92acf62c6477e462
                                          • Opcode Fuzzy Hash: 81bdb59c47090a3f0a312b10e02a75e3bc1266d91a76564055768549c1e86032
                                          • Instruction Fuzzy Hash: 8201F732615222BBCF314A6C9C94A9FFBE9BF05BA0B104520F985E7184D735D801D7E0
                                          APIs
                                          • LCMapStringW.KERNELBASE(00000000,00000400,00000000,?,00000000,00000000,05CEC6CE), ref: 0106E8C5
                                          • LCMapStringW.KERNEL32(00000000,00000400,00000000,?,00000000,?,00000001,00000000), ref: 0106E934
                                          Strings
                                          • invalid string position, xrefs: 0106EA06
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: String
                                          • String ID: invalid string position
                                          • API String ID: 2568140703-1799206989
                                          • Opcode ID: 2e2d1b26f46f8ed4bddde7aab3ebda3ae261244c138522ba1d1b234e3eb90337
                                          • Instruction ID: 6df4df4c298993ea7564e964eb4f48818a1ceb17d6c3676a2306ecb688a69d46
                                          • Opcode Fuzzy Hash: 2e2d1b26f46f8ed4bddde7aab3ebda3ae261244c138522ba1d1b234e3eb90337
                                          • Instruction Fuzzy Hash: 50713570A00248DFEB24CF98C885BAEBBF9FF48714F14051DE546A7281D774AA45CBA1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8A155
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: cce338d983c3b90f2414b244ea36df9e293e4f7854656ad9a6712ef536f50e2d
                                          • Instruction ID: 8b6d0900a2095589f0f04245cfcb3d7ebb2d9259d9dfa0894b4d9f0e669e7072
                                          • Opcode Fuzzy Hash: cce338d983c3b90f2414b244ea36df9e293e4f7854656ad9a6712ef536f50e2d
                                          • Instruction Fuzzy Hash: B631AF323047149B9724AF69E88589BF3E9FFD4B21310092FE596C7210DB7198159BA6
                                          APIs
                                          • send.WS2_32(?,?,?,00000000), ref: 00FCD6E6
                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?), ref: 00FCD6FC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastsend
                                          • String ID: Send failure: %s
                                          • API String ID: 1802528911-857917747
                                          • Opcode ID: f31035a578ad9b9f1cc9c9842fdc1aa0b63a13a6f0c86707d54d3c04441a7b51
                                          • Instruction ID: d36b1edacfb71cfd66d139d4a709a171a3d181c19d8dd6cc5b36a582e5f5c4f3
                                          • Opcode Fuzzy Hash: f31035a578ad9b9f1cc9c9842fdc1aa0b63a13a6f0c86707d54d3c04441a7b51
                                          • Instruction Fuzzy Hash: BC019E76601105AFDB119F5CEC86EDABBA8EF59375F100176F90897350C375AC209BA1
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 828498ee31cd09fbc4e6a9e3a5590fc162009d6449e8e284ea9683baf598a8e1
                                          • Instruction ID: 91e33636cebea6eaa9778d0b564e75d9a4c993ce29fa88b1de69d5a720a08f9d
                                          • Opcode Fuzzy Hash: 828498ee31cd09fbc4e6a9e3a5590fc162009d6449e8e284ea9683baf598a8e1
                                          • Instruction Fuzzy Hash: E351BF71E1820AABDB21BFE8C844FEEBBB4AF55324F044299E5C1B72D1D7359901CB60
                                          APIs
                                          • getaddrinfo.WS2_32(?,00000000,?,?), ref: 00FD94CE
                                          • freeaddrinfo.WS2_32(?,?), ref: 00FD95BF
                                          • WSASetLastError.WS2_32(00002AF9,?), ref: 00FD961D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastfreeaddrinfogetaddrinfo
                                          • String ID:
                                          • API String ID: 1817844550-0
                                          • Opcode ID: b005753a3c33e118fbf1d352ddd2f5b4f68fc0cabba841d074b2cc1cc4458aa9
                                          • Instruction ID: 0d000391a17af53b2133f0d733bed90e1e56ebebb3c7f5a58d559a2d15dcc3c5
                                          • Opcode Fuzzy Hash: b005753a3c33e118fbf1d352ddd2f5b4f68fc0cabba841d074b2cc1cc4458aa9
                                          • Instruction Fuzzy Hash: 1241AAB1A047019FDB21CFA9E984B5AB7F6BF44320F08413AE849C7305D7B6E954DBA1
                                          APIs
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F8BA68
                                            • Part of subcall function 0100BF2B: __CxxThrowException@8.LIBVCRUNTIME ref: 0100BF42
                                          • new.LIBCMT ref: 00F8BA6E
                                          • new.LIBCMT ref: 00F8BA82
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_taskException@8Throw
                                          • String ID:
                                          • API String ID: 3598223435-0
                                          • Opcode ID: fec12bd33f0df5e0d5d6032f5c4101b8fdf14038854a89215527f2f4cdc6bbc0
                                          • Instruction ID: 464ecfc5fe6733a35fc4a7487af5708aeecaeb1a2f606579db9714b94dc6b384
                                          • Opcode Fuzzy Hash: fec12bd33f0df5e0d5d6032f5c4101b8fdf14038854a89215527f2f4cdc6bbc0
                                          • Instruction Fuzzy Hash: 0831B371A046019FD728EF28D8807AAB7E9EB45760F500B2DE863CB781D779ED04D7A1
                                          APIs
                                          • new.LIBCMT ref: 00FB3D28
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00FB3DAE
                                            • Part of subcall function 0100BF2B: __CxxThrowException@8.LIBVCRUNTIME ref: 0100BF42
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_taskException@8Throw
                                          • String ID:
                                          • API String ID: 3598223435-0
                                          • Opcode ID: 0ac733429f234322b33af8aae44a144107b1436c45ed342b3070bb472d8897e5
                                          • Instruction ID: 57b76b2d43da6ac1623b651e68494e8df14afefc5a259cf7e6a3f2175eb43dea
                                          • Opcode Fuzzy Hash: 0ac733429f234322b33af8aae44a144107b1436c45ed342b3070bb472d8897e5
                                          • Instruction Fuzzy Hash: 4F210872F0011AAFDB05FF79C880AFDB7A5EF593507154139D849CB205E620EE049AE1
                                          APIs
                                          • _free.LIBCMT ref: 01091F00
                                          • _free.LIBCMT ref: 01091F56
                                            • Part of subcall function 01091D32: _free.LIBCMT ref: 01091D8A
                                            • Part of subcall function 01091D32: GetTimeZoneInformation.KERNELBASE(?,00000000,00000000,00000000,?,010C3258), ref: 01091D9C
                                            • Part of subcall function 01091D32: WideCharToMultiByte.KERNEL32(00000000,00000000,Eastern Standard Time,000000FF,00000000,0000003F,00000000,?,?), ref: 01091E14
                                            • Part of subcall function 01091D32: WideCharToMultiByte.KERNEL32(00000000,00000000,Eastern Summer Time,000000FF,?,0000003F,00000000,?), ref: 01091E41
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID:
                                          • API String ID: 314583886-0
                                          • Opcode ID: 83bfc556b8b96868d57b468993b5d0bf6d6f89101e0709101c8488d7cc5ab0ab
                                          • Instruction ID: 88a02f3c0151ab802c99822ba287950d8af0341dc79d4b280e72383a99a74070
                                          • Opcode Fuzzy Hash: 83bfc556b8b96868d57b468993b5d0bf6d6f89101e0709101c8488d7cc5ab0ab
                                          • Instruction Fuzzy Hash: 9C212932A0411F57DF31A7289C60EEE77B9DB61370F1002D9E4D8A2185EF7049859A90
                                          APIs
                                          • UuidCreate.RPCRT4(00000000), ref: 00FA968C
                                          • UuidToStringA.RPCRT4(00000000,?), ref: 00FA96A1
                                          • RpcStringFreeA.RPCRT4(00000000), ref: 00FA96D6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: StringUuid$CreateFree
                                          • String ID:
                                          • API String ID: 3044360575-0
                                          • Opcode ID: 0ab06dae4db5993175347b9316f8ed16427b3672315f500378671001b269c6f0
                                          • Instruction ID: 63e035911a208fcbb58bc4cf077ec941649a788d4f36669dd8a73add9e02aff1
                                          • Opcode Fuzzy Hash: 0ab06dae4db5993175347b9316f8ed16427b3672315f500378671001b269c6f0
                                          • Instruction Fuzzy Hash: 89317FB1904248DFDB24CFA4D948BEEBBF8EF49714F10465EE442A7240D7B95908CBA0
                                          APIs
                                          • CreateThread.KERNELBASE(05CEC6CE,00F83CDE,Function_00104BF0,00000000,?,05CEC6CE), ref: 01084D8D
                                          • GetLastError.KERNEL32(?,?,?,?,?,01009DAB,00000000,00000000,01009FC0,?,00000004,?), ref: 01084D99
                                          • __dosmaperr.LIBCMT ref: 01084DA0
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CreateErrorLastThread__dosmaperr
                                          • String ID:
                                          • API String ID: 2744730728-0
                                          • Opcode ID: ab17b9b5f74e77b75176cb3dbba52664b8e976c839e39f942858b4ccdceb18f6
                                          • Instruction ID: a088b412f4eed8d499dfb854e4157d011822e903587a6c4042d2f422e844c53e
                                          • Opcode Fuzzy Hash: ab17b9b5f74e77b75176cb3dbba52664b8e976c839e39f942858b4ccdceb18f6
                                          • Instruction Fuzzy Hash: AF019E3650821BABDB65BFA5DC04EDF7BAAEF90320F010168F9C5D6110DF318911C7A0
                                          APIs
                                          • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,01084E89,?,?,?,?), ref: 01084F15
                                          • GetLastError.KERNEL32(?,?,?,?,01084E89,?,?,?,?,?,?,?,?,?,010ED458,0000001C), ref: 01084F1F
                                          • __dosmaperr.LIBCMT ref: 01084F26
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastPointer__dosmaperr
                                          • String ID:
                                          • API String ID: 2336955059-0
                                          • Opcode ID: 7e6700fd5107d32a0b8fbe03f4e8a0249c584ca1d76efa9918c6da81ce165536
                                          • Instruction ID: 8d22cc6595674298519ad10f217961a25fcab38f8f6bc78498f55671c6045c63
                                          • Opcode Fuzzy Hash: 7e6700fd5107d32a0b8fbe03f4e8a0249c584ca1d76efa9918c6da81ce165536
                                          • Instruction Fuzzy Hash: 2A014033614516AFCB159F99DC0899E3B69EFC5330B24024CF9D4D7181EA72D9018B90
                                          APIs
                                          • SleepEx.KERNELBASE(00000000,00000000), ref: 00FCF0A8
                                          • getsockopt.WS2_32(00000004,0000FFFF,00001007,00000000,00000004), ref: 00FCF0C3
                                          • WSAGetLastError.WS2_32 ref: 00FCF0CD
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleepgetsockopt
                                          • String ID:
                                          • API String ID: 3033474312-0
                                          • Opcode ID: 97b4607cb31a350a291f7a72cd95e6f2a673f36d694faaa09fd196dd03f0d2ef
                                          • Instruction ID: efc7e1e6962e696ea77b02f71e50323aaf3eb030da21d20b22661e01f161103d
                                          • Opcode Fuzzy Hash: 97b4607cb31a350a291f7a72cd95e6f2a673f36d694faaa09fd196dd03f0d2ef
                                          • Instruction Fuzzy Hash: 8FF09C3164410BEBDB208F50D946FFEB7BDAB00B11F208079F94596184D776990CAB50
                                          APIs
                                            • Part of subcall function 01090084: GetLastError.KERNEL32(?,?,?,0107DA2C,01085FA2,?,0109002E,00000001,00000364,?,01084C15,010ED438,00000010), ref: 01090089
                                            • Part of subcall function 01090084: _free.LIBCMT ref: 010900BE
                                            • Part of subcall function 01090084: SetLastError.KERNEL32(00000000), ref: 010900F2
                                          • ExitThread.KERNEL32 ref: 01084CB6
                                          • CloseHandle.KERNEL32(?,?,?,01084DD6,?,?,01084C4D,00000000), ref: 01084CDE
                                          • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,01084DD6,?,?,01084C4D,00000000), ref: 01084CF4
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                          • String ID:
                                          • API String ID: 1198197534-0
                                          • Opcode ID: 13d9ec8d4ec058cb111506686786a9d030d0b7fce4146bec8f4e0ba1aaaab884
                                          • Instruction ID: 416cbab285078ca1cf5dc0287b5ed87a29c6aeb3a04aea5f4c437805dcef199d
                                          • Opcode Fuzzy Hash: 13d9ec8d4ec058cb111506686786a9d030d0b7fce4146bec8f4e0ba1aaaab884
                                          • Instruction Fuzzy Hash: 29F0893040460AA7EBB57B39C948B977EECAF00270F084B55FDE4D21A5D735D8418750
                                          APIs
                                          • __EH_prolog3_catch.LIBCMT ref: 01003AD6
                                          • _Getvals.LIBCPMT ref: 01003AF2
                                            • Part of subcall function 010024C0: __Getcvt.LIBCPMT ref: 010024D2
                                            • Part of subcall function 010024C0: std::_Locinfo::_Getdays.LIBCPMT ref: 010024EB
                                            • Part of subcall function 010024C0: std::_Locinfo::_Getmonths.LIBCPMT ref: 01002504
                                          • __Getdateorder.LIBCPMT ref: 01003AF7
                                            • Part of subcall function 01005BA6: ___crtGetLocaleInfoEx.LIBCPMT ref: 01005BC2
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Locinfo::_std::_$GetcvtGetdateorderGetdaysGetmonthsGetvalsH_prolog3_catchInfoLocale___crt
                                          • String ID:
                                          • API String ID: 4028787925-0
                                          • Opcode ID: 9033dddff95d67c7d36393df540ac6a4bec3b7fa1f07bd20f805fc64041a8287
                                          • Instruction ID: 6793c59e727c839ba04b1856a017aa39f54e04cd7978130385cca4ff6ab230ca
                                          • Opcode Fuzzy Hash: 9033dddff95d67c7d36393df540ac6a4bec3b7fa1f07bd20f805fc64041a8287
                                          • Instruction Fuzzy Hash: E7E0ECB4C017019FDB61FFB9850468ABEF0FF28250F51892EA099DB640EB709600CF62
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FBAB3A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 909987262-3788999226
                                          • Opcode ID: 8894608b2b806145ab5d30daf92cd251959b3b5cfdb60c53a995d4e7fda99f3b
                                          • Instruction ID: 984e3d31a44c2f20e855f22b7464dd954387e7e99955e13152d49cfacd146e56
                                          • Opcode Fuzzy Hash: 8894608b2b806145ab5d30daf92cd251959b3b5cfdb60c53a995d4e7fda99f3b
                                          • Instruction Fuzzy Hash: 5041D075B042499FCB14CF2AC490BA9BBA6BF85320F24C269E825CB381D735DD41DF91
                                          APIs
                                            • Part of subcall function 00FC4550: GetTickCount.KERNEL32 ref: 00FC4551
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FCDCC4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CountTickUnothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: Connection time-out
                                          • API String ID: 2079752757-165637984
                                          • Opcode ID: fdb360bac6b460311097cf95c439d44e6d82f07a0e58c41f657d1b45feb8474a
                                          • Instruction ID: ec5da28a20ca0ac4f04245979b660cd92a6884778af8b8c80f0a65a843902a4a
                                          • Opcode Fuzzy Hash: fdb360bac6b460311097cf95c439d44e6d82f07a0e58c41f657d1b45feb8474a
                                          • Instruction Fuzzy Hash: 6C31CC71B01606AFEB10DF68D942FAABBE4FF44324F10427DE9589B281D775A911ABC0
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00F9A4D0
                                          • SetEvent.KERNEL32(00000000,?,00000000,?), ref: 00F9A54C
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CurrentEventThread
                                          • String ID:
                                          • API String ID: 2592414440-0
                                          • Opcode ID: 561dc9983923268333805758d73636e376a88c528cf114668167a3415771b925
                                          • Instruction ID: 74c390519e5dfa2c39df04165f6681d4b57155ce32151878cef69f39eb98f155
                                          • Opcode Fuzzy Hash: 561dc9983923268333805758d73636e376a88c528cf114668167a3415771b925
                                          • Instruction Fuzzy Hash: 08319E75A0460ADFEF21CF68D840BAEF7F4FB44324F21452EE85A97240D736A900DB91
                                          APIs
                                          • WriteFile.KERNELBASE(7408458B,?,?,?,00000000,?,0107E49E,E0830C40,?,0108D31D,00FF30C1,0107E49E,?,0107E49E,0107E49E,00FF30C1), ref: 0108CE7C
                                          • GetLastError.KERNEL32(?,0108D31D,00FF30C1,0107E49E,?,0107E49E,0107E49E,00FF30C1,0107E49E,?,010ED600,00000014,0107DEB2,00000000,8304488B,00FF30C1), ref: 0108CEA5
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastWrite
                                          • String ID:
                                          • API String ID: 442123175-0
                                          • Opcode ID: c9073f9e98ede55415e1183f13a0c649a218ff7dd91216fd076720158056fb06
                                          • Instruction ID: a1288d90499e496a880bf4b505338dab17c3151e5158509375f8442ac7df3ac1
                                          • Opcode Fuzzy Hash: c9073f9e98ede55415e1183f13a0c649a218ff7dd91216fd076720158056fb06
                                          • Instruction Fuzzy Hash: F321D135A00219DFDB25DF59C980AE9B7F9FB48311F1448AAE9C6D7281D730AE81CF20
                                          APIs
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 010926B2
                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 010926BF
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AddressProc__crt_fast_encode_pointer
                                          • String ID:
                                          • API String ID: 2279764990-0
                                          • Opcode ID: 8c15dfc604e4b6e3dddb214470b6aec98543927dc5e9b252cfcf4f77f4e90f1f
                                          • Instruction ID: c175483cbce9ab7877060bcbc46564b56a8aa0c12de5f12aee026b22fc702181
                                          • Opcode Fuzzy Hash: 8c15dfc604e4b6e3dddb214470b6aec98543927dc5e9b252cfcf4f77f4e90f1f
                                          • Instruction Fuzzy Hash: DE112C37600121BB9F329D1CEC6199E77D5AB88260B078161FDD5FBA4CDA32DC0197D0
                                          APIs
                                          • CloseHandle.KERNEL32(?,?,?,?,?,00F83CDE,05CEC6CE), ref: 01009DD1
                                          • ResumeThread.KERNELBASE(?,?,?,?,?,00F83CDE,05CEC6CE), ref: 01009DDF
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CloseHandleResumeThread
                                          • String ID:
                                          • API String ID: 3265327148-0
                                          • Opcode ID: 19d974ff608cae4d723fe86ec1dd8e2b68d3101c92ddb7a5f1160fdc54da10a5
                                          • Instruction ID: a7a140618a1869ea9d2e20ff08b25f4c22a1fcdb5c27601f04faa85a898a89e2
                                          • Opcode Fuzzy Hash: 19d974ff608cae4d723fe86ec1dd8e2b68d3101c92ddb7a5f1160fdc54da10a5
                                          • Instruction Fuzzy Hash: 8FF09C712402019FE7119F59DCC0F96B3E8EF44325F14405BFA58D7291D770E8529A50
                                          APIs
                                          • GetLastError.KERNEL32(010ED438,00000010), ref: 01084C03
                                          • ExitThread.KERNEL32 ref: 01084C0A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorExitLastThread
                                          • String ID:
                                          • API String ID: 1611280651-0
                                          • Opcode ID: bcd4ea9708a7ea1854312624571ad6a5b5f9a25a3f8cacc8f141dceefd8ecb9f
                                          • Instruction ID: 36440f1dfd758df39c408bebdb7dcd540304a451ee05adbb77a3e9cbb05a7648
                                          • Opcode Fuzzy Hash: bcd4ea9708a7ea1854312624571ad6a5b5f9a25a3f8cacc8f141dceefd8ecb9f
                                          • Instruction Fuzzy Hash: 4DF08C71500206AFDF05BFB0D958BEE3BB8AF54610F100589F4C19B255DB76A910DBA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CleanupStartup
                                          • String ID:
                                          • API String ID: 915672949-0
                                          • Opcode ID: 4e6a3e3028d458aaea00a1fbf50c865e48f8fe5ca4fb9e71072910991532283e
                                          • Instruction ID: f45ffa591aa6b9929982a6508e30d0379e8b8a72c76664c28adc8c6ebd1689be
                                          • Opcode Fuzzy Hash: 4e6a3e3028d458aaea00a1fbf50c865e48f8fe5ca4fb9e71072910991532283e
                                          • Instruction Fuzzy Hash: E5F05431B4010EDBDF60DF64D95ABEAB3B9DB04311F40059DE84AC7285DD355D06CB40
                                          APIs
                                          • WSASetLastError.WS2_32(00002726,?,00FCC8D8,00FC1205,00000000), ref: 00FCD031
                                          • Sleep.KERNELBASE(00FC1205,?,00FCC8D8,00FC1205,00000000), ref: 00FCD03D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: b7e37a9bdc420964ff3894a2eab44459cfe8671d6980b258df4d8ccfd261a5e0
                                          • Instruction ID: d3de8b5c3086c96ef6b7086b28157885cd35d8a3a7cd7227e68d5e9dda17e0d3
                                          • Opcode Fuzzy Hash: b7e37a9bdc420964ff3894a2eab44459cfe8671d6980b258df4d8ccfd261a5e0
                                          • Instruction Fuzzy Hash: 58D022306D8208879B201ABCE84EE5B37EC6B40B70B004A28F01CC51C9DB25E0009210
                                          APIs
                                            • Part of subcall function 01008D90: TlsGetValue.KERNEL32(0000000F,?,01015384,00000000,05CEC6CE,?,?), ref: 01008DA4
                                          • new.LIBCMT ref: 00F9F8A9
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Value
                                          • String ID:
                                          • API String ID: 3702945584-0
                                          • Opcode ID: ee25d94827a11a2ac45c65bfa4e1ec41f87e94f7c2d2091935f143ddce864a25
                                          • Instruction ID: 9c93d82f75fdd5b1cc80bae1d03e867d5666f6782d0dad1bc21b0d531257d7cb
                                          • Opcode Fuzzy Hash: ee25d94827a11a2ac45c65bfa4e1ec41f87e94f7c2d2091935f143ddce864a25
                                          • Instruction Fuzzy Hash: 88417CB1A00606EFEB05DF68CC40BAABBF8FF55710F14426AE4059B391D775AA05CBE1
                                          APIs
                                            • Part of subcall function 00FAD820: ___std_exception_copy.LIBVCRUNTIME ref: 00FAD87C
                                            • Part of subcall function 00FAD820: ___std_exception_copy.LIBVCRUNTIME ref: 00FAD8E7
                                            • Part of subcall function 00FAD820: GetCurrentThreadId.KERNEL32 ref: 00FAD922
                                          • SetEvent.KERNEL32(00000000,010F9DB8,00000000,000000FF,05CEC6CE), ref: 00FA67FC
                                            • Part of subcall function 00F83EA0: GetProcessHeap.KERNEL32(00000000,00000008), ref: 00F83F76
                                            • Part of subcall function 00F83EA0: HeapFree.KERNEL32(00000000), ref: 00F83F7D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Heap___std_exception_copy$CurrentEventFreeProcessThread
                                          • String ID:
                                          • API String ID: 3090538075-0
                                          • Opcode ID: 9a94e6681d477201ac35865686eaa4fadfa3490270845f8d6e3678c6125e3e24
                                          • Instruction ID: f4a184f98d14fa5a656affb41bd2514cc5d0bf7a471795c5ba73890a52378066
                                          • Opcode Fuzzy Hash: 9a94e6681d477201ac35865686eaa4fadfa3490270845f8d6e3678c6125e3e24
                                          • Instruction Fuzzy Hash: 4341EFB09102059BEB15EFA8C846BEEBBB4FF42318F24061DE052E72C1CB795944DB91
                                          APIs
                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 0107DB49
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CallFilterFunc@8
                                          • String ID:
                                          • API String ID: 4062629308-0
                                          • Opcode ID: a6cd855c611d315ab944eac2cf8c37f0c9ba073ef6053b0aee397767115f514a
                                          • Instruction ID: 0d9084c32e19bbca3df8bc569a5b5fd2614f806eb239768324889e62ed65095e
                                          • Opcode Fuzzy Hash: a6cd855c611d315ab944eac2cf8c37f0c9ba073ef6053b0aee397767115f514a
                                          • Instruction Fuzzy Hash: 52212971E101169BEB15BBF89C017BE37917F95334F18838EE0E19A1D5D7749502874D
                                          APIs
                                          • recv.WS2_32(?,?,?,00000000), ref: 00FCDA49
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: recv
                                          • String ID:
                                          • API String ID: 1507349165-0
                                          • Opcode ID: a78f70d4c3cf48d925881d901ea14f6f4f3c1adbaebca25d42786f6d83fd1bc1
                                          • Instruction ID: 83ea415050a09ee3fa4d218912ed46630accd380a1560e6dbb64480cb492d085
                                          • Opcode Fuzzy Hash: a78f70d4c3cf48d925881d901ea14f6f4f3c1adbaebca25d42786f6d83fd1bc1
                                          • Instruction Fuzzy Hash: D2219D719087068FE7208E18DE46B56B3E8AB40738F28852DE9A9976D2E335E845DB40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: socket
                                          • String ID:
                                          • API String ID: 98920635-0
                                          • Opcode ID: 6bada1fd766663c34dff061a3de679788347f30761ff96a189e5ab4446afc8fc
                                          • Instruction ID: 31f9d1cf78689b7efb7dfff4cd75d5612fbbdc96a30969cde6de262e3916ac88
                                          • Opcode Fuzzy Hash: 6bada1fd766663c34dff061a3de679788347f30761ff96a189e5ab4446afc8fc
                                          • Instruction Fuzzy Hash: 2F214A71A0020ADFDB24CF68C941B96B7F5FF48310F10897DE99ACB295D632E951DB90
                                          APIs
                                          • new.LIBCMT ref: 00FAF810
                                            • Part of subcall function 00F95E10: GetCurrentProcessId.KERNEL32(05CEC6CE), ref: 00F95E67
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CurrentProcess
                                          • String ID:
                                          • API String ID: 2050909247-0
                                          • Opcode ID: 9e296f4fc6a935f65400cd52e56a51a62cf444b174e4578c57cdece552ccfe06
                                          • Instruction ID: 49ca3cce49e1bce8a2799689b6957ddab8cb8361c498500e7150fd0719ad026e
                                          • Opcode Fuzzy Hash: 9e296f4fc6a935f65400cd52e56a51a62cf444b174e4578c57cdece552ccfe06
                                          • Instruction Fuzzy Hash: 021147B1904649AFDB10CF89C840B9AFBF8FB48714F10816AE81597250D7B66904CB90
                                          APIs
                                            • Part of subcall function 01085F50: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0109002E,00000001,00000364,?,01084C15,010ED438,00000010), ref: 01085F91
                                          • _free.LIBCMT ref: 01093C41
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AllocateHeap_free
                                          • String ID:
                                          • API String ID: 614378929-0
                                          • Opcode ID: 7054a937415d61fae7d4af767ef2b6b080680736d5c7c993752f17e0158cbaab
                                          • Instruction ID: 412d330c74e4166563eed2fa8039420fa39b48d45691c456734391c8f8ddaf9f
                                          • Opcode Fuzzy Hash: 7054a937415d61fae7d4af767ef2b6b080680736d5c7c993752f17e0158cbaab
                                          • Instruction Fuzzy Hash: A4014E72100349ABE735CF6ADC5599AFBECFB85270F25051DE5D497280EA30A805CB74
                                          APIs
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00F88680
                                            • Part of subcall function 00F8C8E0: __CxxThrowException@8.LIBVCRUNTIME ref: 00F8C92E
                                            • Part of subcall function 00F8C8E0: ___std_exception_copy.LIBVCRUNTIME ref: 00F8C95E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_exception_copy$Exception@8Throw
                                          • String ID:
                                          • API String ID: 3804135023-0
                                          • Opcode ID: bc27a7524ab7be4b9994f5e965b3ec9943b12e93c5036c35e66a842f1634ac9d
                                          • Instruction ID: 306f4a44512ddd89782dd6770ae66c221390ede9da3ce2b12f7193d4e00755a3
                                          • Opcode Fuzzy Hash: bc27a7524ab7be4b9994f5e965b3ec9943b12e93c5036c35e66a842f1634ac9d
                                          • Instruction Fuzzy Hash: 8B1130B1D002499FCB00DFA4C941BDEF7F8FB49614F64466AE815B7280EB356A44CBA0
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00FB25DF
                                            • Part of subcall function 01071273: KiUserExceptionDispatcher.NTDLL(?,?,?,0100BF47,?,?,?,?,?,?,?,?,0100BF47,?,010E0200), ref: 010712D2
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionException@8ThrowUser
                                          • String ID:
                                          • API String ID: 2513928553-0
                                          • Opcode ID: e86bf0aacdb2206aa185e37c2f677f6a0ae54809ac6a45c0b542a6b3c359a164
                                          • Instruction ID: 4572691cc60aff22dfb79736f781c6a98e103eb91e4feea16b440a84fefad1b7
                                          • Opcode Fuzzy Hash: e86bf0aacdb2206aa185e37c2f677f6a0ae54809ac6a45c0b542a6b3c359a164
                                          • Instruction Fuzzy Hash: 72016D74900118AFCB08DF65C951FCAB7B8FB08710F208169F555D7795DB38AA05CF80
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a9d19793f29929a277516686cf137a3b4d209c8759da157923ef4eeedc34a6fe
                                          • Instruction ID: d89fcb30cb90b71d875ccedc508a39824decca2b4f6c9d367a6f8cf21192e873
                                          • Opcode Fuzzy Hash: a9d19793f29929a277516686cf137a3b4d209c8759da157923ef4eeedc34a6fe
                                          • Instruction Fuzzy Hash: BFF0F932D1261566D6217A6EDC00BDA37A8AF91335F100755F6E4A21D0CB74F5068699
                                          APIs
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00F951DA
                                            • Part of subcall function 00F99BD0: __CxxThrowException@8.LIBVCRUNTIME ref: 00F99C1E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw___std_exception_copy
                                          • String ID:
                                          • API String ID: 284963293-0
                                          • Opcode ID: 5139a6e865137ff01ff5d785a0e0727878bb41cfb05261e1bf15bfd95313f592
                                          • Instruction ID: a6b55687057e7f85dde5af5c2defa06d520bf2a119418941f4faefa8d6cb421a
                                          • Opcode Fuzzy Hash: 5139a6e865137ff01ff5d785a0e0727878bb41cfb05261e1bf15bfd95313f592
                                          • Instruction Fuzzy Hash: B00180B1D0024D9BCF04DFA4D945BDEB7FCFB18610F50426AE801B3240EB396A48CBA0
                                          APIs
                                          • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00FB0A91
                                            • Part of subcall function 00FF2B79: std::ios_base::_Tidy.LIBCPMT ref: 00FF2B99
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::ios_base::_$Ios_base_dtorTidy
                                          • String ID:
                                          • API String ID: 3167631304-0
                                          • Opcode ID: 20928703dc5145022a3c596d2bddb03e42b539e314ed31b282581aff34f4e35c
                                          • Instruction ID: e94c99ec3c9618a9c4c4b0c367382285332bb5c639392a0304a845066203f57d
                                          • Opcode Fuzzy Hash: 20928703dc5145022a3c596d2bddb03e42b539e314ed31b282581aff34f4e35c
                                          • Instruction Fuzzy Hash: 89115BB5940249DFEB11CF49C984E99F7E8FB09318F10899EE88A8B751D736E901CF40
                                          APIs
                                          • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00FA9D31
                                            • Part of subcall function 00FF2B79: std::ios_base::_Tidy.LIBCPMT ref: 00FF2B99
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::ios_base::_$Ios_base_dtorTidy
                                          • String ID:
                                          • API String ID: 3167631304-0
                                          • Opcode ID: 2f821d034265deac1d4690fc55d1b255690911fd5b6576b4d0908749cd6c407e
                                          • Instruction ID: 5200f852962325330891b8c11cbd88a719eb2af3b8ff7379cf3ad6b5f57a2d48
                                          • Opcode Fuzzy Hash: 2f821d034265deac1d4690fc55d1b255690911fd5b6576b4d0908749cd6c407e
                                          • Instruction Fuzzy Hash: 42112D75514649DFD711CF68C988E99F7F8FB08708F1046AEE8858B751D736E906CB40
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0109002E,00000001,00000364,?,01084C15,010ED438,00000010), ref: 01085F91
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: bd29c09503aed86e201f8e88fe95093b56cda61f8116a51b3561f13e845e9058
                                          • Instruction ID: 960bc8473607a45a708bb28f95f7399ad3b1716b133d7b19c5bb402d4653bfa4
                                          • Opcode Fuzzy Hash: bd29c09503aed86e201f8e88fe95093b56cda61f8116a51b3561f13e845e9058
                                          • Instruction Fuzzy Hash: C8F0E93150C6256BEB613A6A9C04FAA3FD8AF90670B1881A1E9D8DA1C6DA30E401C6E0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 862e384ef557ebdd8fa533b58788d64487fea705a1ca2161b6858340ff909363
                                          • Instruction ID: 4cb154b7f8d3d65d379dbd9dd3f5b927061bd208f7de1817e056e5e6093de747
                                          • Opcode Fuzzy Hash: 862e384ef557ebdd8fa533b58788d64487fea705a1ca2161b6858340ff909363
                                          • Instruction Fuzzy Hash: FEF05E33514209BBCF11AEE9DC01DDE3B6DEF89371F144255FA94920A0DA32D921A7A0
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,00000003,00000000,?,00000003,01090083), ref: 01086556
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 238bcbda2487b5b0326f68e67e8184529fce9c4c1eb483382316b65bd481ab53
                                          • Instruction ID: 60149915b9e7813006ddcfaf5674e7569b60043611ae060706ac752f7251955a
                                          • Opcode Fuzzy Hash: 238bcbda2487b5b0326f68e67e8184529fce9c4c1eb483382316b65bd481ab53
                                          • Instruction Fuzzy Hash: 31E0E53150C22196E6713A699C01B9A3BC8AF912A0F874190ECD2961CCCE22DC00C2F5
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,00000000,?,0108DE1F,?,?,00000000,?,0108DE1F,00000000,0000000C), ref: 0108DA49
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: cae35316a24999c92b888034418aa3ea85c8a80cf7c65f541ae0a79cf3edcfc4
                                          • Instruction ID: d66792070590eabb1066ee36b091d439413aa3cc9d52e72b58d9501c07949b0c
                                          • Opcode Fuzzy Hash: cae35316a24999c92b888034418aa3ea85c8a80cf7c65f541ae0a79cf3edcfc4
                                          • Instruction Fuzzy Hash: C2D06C3204010DBBDF128F84DC46EDA3BAAFB48714F014000BA5866020C776E821AB90
                                          APIs
                                          • ioctlsocket.WS2_32(?,8004667E,00FCEDA6), ref: 00FEB86A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ioctlsocket
                                          • String ID:
                                          • API String ID: 3577187118-0
                                          • Opcode ID: 268634495a7f070cefbb4a38c74293089d82c75ded5517a586b91be1a866c92e
                                          • Instruction ID: 33567f995447908ed1a69a6e2b71c509ff956ff0735ed1bc73b27844feb12d1a
                                          • Opcode Fuzzy Hash: 268634495a7f070cefbb4a38c74293089d82c75ded5517a586b91be1a866c92e
                                          • Instruction Fuzzy Hash: 0ED0EA7240020DEFCB019FB1D9458DA7BADEA04225B01C43AB9199A124EA39AA64DF95
                                          APIs
                                          • SetLastError.KERNEL32(00000008,?,010B0CB8,?), ref: 00FC4B25
                                            • Part of subcall function 00FC4B40: InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,010B0CB8,?), ref: 00FC4B82
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CriticalErrorInitializeLastSection
                                          • String ID:
                                          • API String ID: 3413597225-0
                                          • Opcode ID: 28c9a156a213a97c5c868ad28903621c5b1012544dd97de542b8bbf2760e3a19
                                          • Instruction ID: 97ba2384e69b74f483bc2012c84b8154d865834404a567a52be146418f3df035
                                          • Opcode Fuzzy Hash: 28c9a156a213a97c5c868ad28903621c5b1012544dd97de542b8bbf2760e3a19
                                          • Instruction Fuzzy Hash: 0A11E6B1500706ABD7205F64EC46FCB7BE8FF84328F04402DFA5982242E736E8149B69
                                          APIs
                                          • htons.WS2_32(?), ref: 00FCE8CB
                                          • bind.WS2_32(00000002,?,00000000), ref: 00FCEA06
                                          • htons.WS2_32(?), ref: 00FCEA43
                                          • bind.WS2_32(00000002,00000002,00000000), ref: 00FCEA5E
                                          • getsockname.WS2_32(00000002,?,00000080), ref: 00FCEA97
                                          • WSAGetLastError.WS2_32 ref: 00FCEAA5
                                            • Part of subcall function 00FD7DE0: SetLastError.KERNEL32(0000273F,?,00FC41D2,00000002,00FC300A,?), ref: 00FD7DEE
                                          • WSAGetLastError.WS2_32 ref: 00FCEAE5
                                          Strings
                                          • Couldn't bind to '%s', xrefs: 00FCE9A7
                                          • Local port: %hu, xrefs: 00FCEB29
                                          • Local Interface %s is ip %s using address family %i, xrefs: 00FCE94B
                                          • bind failed with errno %d: %s, xrefs: 00FCEB01
                                          • Name '%s' family %i resolved to '%s' family %i, xrefs: 00FCE87A
                                          • Couldn't bind to interface '%s', xrefs: 00FCE982
                                          • getsockname() failed with errno %d: %s, xrefs: 00FCEAC1
                                          • Bind to local port %hu failed, trying next, xrefs: 00FCEA29
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$bindhtons$getsockname
                                          • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                          • API String ID: 2249331600-2769131373
                                          • Opcode ID: 0a3ec83f28dd892d832f29bf792a6ce2b241f8cd04a8df2e9bbca658d9edba33
                                          • Instruction ID: e8704a73f02efc10586f61af33594db383f5e6dabfa9982d104329374d56d611
                                          • Opcode Fuzzy Hash: 0a3ec83f28dd892d832f29bf792a6ce2b241f8cd04a8df2e9bbca658d9edba33
                                          • Instruction Fuzzy Hash: 34C1D171A0021AAFDB21DF24DD96FFAB7B8EF05314F0440EDF94997242EA395E44AB50
                                          APIs
                                          • GetLastError.KERNEL32(00000010,00000000,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9856
                                          • _strncpy.LIBCMT ref: 00FD988A
                                          • FormatMessageA.KERNEL32(00001000,00000000,00FCE64F,00000000,-0000030C,000000FF,00000000,00FCE64F,00000010,00000000), ref: 00FD98B6
                                          • ___swprintf_l.LIBCMT ref: 00FD98CD
                                          • _strrchr.LIBCMT ref: 00FD98DF
                                          • _strrchr.LIBCMT ref: 00FD98FA
                                          • GetLastError.KERNEL32(?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?,?), ref: 00FD9912
                                          • SetLastError.KERNEL32(00000000,?,?,?,?,00FCE64F,00000010,00000000,?,?,?,?,?,?,?,?), ref: 00FD991D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_strrchr$FormatMessage___swprintf_l_strncpy
                                          • String ID: Unknown error %d (%#x)
                                          • API String ID: 1238453913-2414550090
                                          • Opcode ID: 1dbaac229493767c6f3109d0d0f75aa03ee19f71a8362bff32d99fd3a958133d
                                          • Instruction ID: 720b5027ecbcba0b647979396bf6f94b4f811f167740de9f02857f6ddf34e5db
                                          • Opcode Fuzzy Hash: 1dbaac229493767c6f3109d0d0f75aa03ee19f71a8362bff32d99fd3a958133d
                                          • Instruction Fuzzy Hash: 91212B31B482437AE63125B45C45FBF395E8F53B65F080036F989E6386FAD54500A3B2
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00000000), ref: 00FD799C
                                          • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00FD79A6
                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00FD79BE
                                          • SetLastError.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00FD79CC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast
                                          • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$+$<
                                          • API String ID: 1452528299-2356964677
                                          • Opcode ID: 25321eb537932c0355f5b27e8966946a7f4da271f9178e9ca838a8fea8291d4d
                                          • Instruction ID: 9aff897d2317de6109b73e4731d28a6353876276e094062f4c74e64771c23ab1
                                          • Opcode Fuzzy Hash: 25321eb537932c0355f5b27e8966946a7f4da271f9178e9ca838a8fea8291d4d
                                          • Instruction Fuzzy Hash: 5FE1A271D043199BCF14EBA8D8816EDB7B6AF45330F28432BE825AB3D0E7349941AB50
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FEE21C
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FEE22D
                                          • ___swprintf_l.LIBCMT ref: 00FEE571
                                          Strings
                                          • gethostname() failed, continuing without!, xrefs: 00FEE292
                                          • user + domain + host name too big, xrefs: 00FEE602
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr$___swprintf_l
                                          • String ID: gethostname() failed, continuing without!$user + domain + host name too big
                                          • API String ID: 604305841-3375086406
                                          • Opcode ID: c3a8d89936bd96bce9fac79b2872e48b5fb30752882a8e47fe1efa721d3b4be0
                                          • Instruction ID: 6f887e9e831b47587543167bfb5b7c88cc2eba9463c47e14f31204886fc94209
                                          • Opcode Fuzzy Hash: c3a8d89936bd96bce9fac79b2872e48b5fb30752882a8e47fe1efa721d3b4be0
                                          • Instruction Fuzzy Hash: 7BF15FB2D00268ABDB20DE55DC41BEAB7F8BB45300F5481D5F58CE7241EA359E85DFA0
                                          APIs
                                          • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,00FEE3C8,?,?), ref: 00FEEE7E
                                          • CryptImportKey.ADVAPI32(?,00000208,00000014,00000000,00000000,?), ref: 00FEEED3
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00FEEEE1
                                          • CryptEncrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000008,00000008), ref: 00FEEF17
                                          • CryptDestroyKey.ADVAPI32(?), ref: 00FEEF20
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00FEEF2B
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                          • String ID:
                                          • API String ID: 3016261861-0
                                          • Opcode ID: 63e275976c5cd18f56b37cde8bbdcecb6d884035118835a89c377c3797154269
                                          • Instruction ID: 94ff9d93192d780785bd4120926bcd51dfce09cd7449fdf13a64b418d3d4c036
                                          • Opcode Fuzzy Hash: 63e275976c5cd18f56b37cde8bbdcecb6d884035118835a89c377c3797154269
                                          • Instruction Fuzzy Hash: 02314B71A1020DABDF20DF94DC45BEEBBB8FF08700F204059FA45B6194DB76A944DB54
                                          APIs
                                          • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 00FEEBA4
                                          • CryptCreateHash.ADVAPI32(?,00008002,00000000,00000000,?), ref: 00FEEBC1
                                          • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 00FEEBDB
                                          • CryptGetHashParam.ADVAPI32(?,00000002,?,00000010,00000000), ref: 00FEEBED
                                          • CryptDestroyHash.ADVAPI32(?), ref: 00FEEBF6
                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,000002B0,-000086A8), ref: 00FEEC01
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamRelease
                                          • String ID:
                                          • API String ID: 3186506766-0
                                          • Opcode ID: c9468288845205f217b4e91c43c6771b077df034ed3e851f94f9452be7a0310a
                                          • Instruction ID: b81f3bded1d13b91761bcc7a030484125b2cc46f1d1826101fb671458f02546b
                                          • Opcode Fuzzy Hash: c9468288845205f217b4e91c43c6771b077df034ed3e851f94f9452be7a0310a
                                          • Instruction Fuzzy Hash: 06218335900208BBDB319FA5EC0AFDE7BB9FF44710F100465F945E2185D7B6AA14DBA4
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,01099A26,?,00000000), ref: 010997A0
                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,01099A26,?,00000000), ref: 010997C9
                                          • GetACP.KERNEL32(?,?,01099A26,?,00000000), ref: 010997DE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: ACP$OCP
                                          • API String ID: 2299586839-711371036
                                          • Opcode ID: 85e516771e3d7fcc1c160db83656aac7d11b90513728a18b90eb95f315717d1d
                                          • Instruction ID: bcc804ced4a873c75a202ec9c5a59f1cea25b859a8ce96af46bafe63f846d58b
                                          • Opcode Fuzzy Hash: 85e516771e3d7fcc1c160db83656aac7d11b90513728a18b90eb95f315717d1d
                                          • Instruction Fuzzy Hash: 4921A432A00100AAEFB58F59C964ADFF7E6FF44A58B4644ACE989D7205EF32D940D350
                                          APIs
                                            • Part of subcall function 01090000: GetLastError.KERNEL32(?,?,01084C15,010ED438,00000010), ref: 01090004
                                            • Part of subcall function 01090000: _free.LIBCMT ref: 01090037
                                            • Part of subcall function 01090000: SetLastError.KERNEL32(00000000), ref: 01090078
                                            • Part of subcall function 01090000: _abort.LIBCMT ref: 0109007E
                                            • Part of subcall function 01090000: _free.LIBCMT ref: 0109005F
                                            • Part of subcall function 01090000: SetLastError.KERNEL32(00000000), ref: 0109006C
                                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 010999E7
                                          • IsValidCodePage.KERNEL32(00000000), ref: 01099A42
                                          • IsValidLocale.KERNEL32(?,00000001), ref: 01099A51
                                          • GetLocaleInfoW.KERNEL32(?,00001001,0108AE1C,00000040,?,0108AF3C,00000055,00000000,?,?,00000055,00000000), ref: 01099A99
                                          • GetLocaleInfoW.KERNEL32(?,00001002,0108AE9C,00000040), ref: 01099AB8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                          • String ID:
                                          • API String ID: 745075371-0
                                          • Opcode ID: e4d2bdd8aa4cb858af3aa966d3ed57dd63bfb22c68947070628c3e623df53f3a
                                          • Instruction ID: 16577d58158b50db0a12cb9cadf6491d32e85574caba8c16c358265dc3da0987
                                          • Opcode Fuzzy Hash: e4d2bdd8aa4cb858af3aa966d3ed57dd63bfb22c68947070628c3e623df53f3a
                                          • Instruction Fuzzy Hash: C7517F71900207ABEF60DFADCCA0AAEB7B8BF15704F0445ADEA85E7144DB749940DB61
                                          APIs
                                            • Part of subcall function 01090000: GetLastError.KERNEL32(?,?,01084C15,010ED438,00000010), ref: 01090004
                                            • Part of subcall function 01090000: _free.LIBCMT ref: 01090037
                                            • Part of subcall function 01090000: SetLastError.KERNEL32(00000000), ref: 01090078
                                            • Part of subcall function 01090000: _abort.LIBCMT ref: 0109007E
                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0108AE23,?,?,?,?,0108A87A,?,00000006), ref: 01099085
                                          • _wcschr.LIBVCRUNTIME ref: 01099115
                                          • _wcschr.LIBVCRUNTIME ref: 01099123
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,0108AE23,00000000,0108AF43), ref: 010991C6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                          • String ID:
                                          • API String ID: 4212172061-0
                                          • Opcode ID: b030a745093c29649e7b0097ce057faefc23aebf9d45cdabdf343fa2c492ca88
                                          • Instruction ID: a5122c72e7c18a4f8a1c70cf258cc7b63c7393bc0ffb5f7be57a4582eeb95d95
                                          • Opcode Fuzzy Hash: b030a745093c29649e7b0097ce057faefc23aebf9d45cdabdf343fa2c492ca88
                                          • Instruction Fuzzy Hash: 8E612871600206AAEF24AF38CC65BEB77E8FF45314F05406EFA85D7280EA35E540E7A1
                                          APIs
                                          • CryptGetHashParam.ADVAPI32(00000000,00000002,00000000,?,00000000,00000000,?,?,00FF0380,?,?,?,?,00000000), ref: 00FF025C
                                          • CryptGetHashParam.ADVAPI32(00000000,00000002,00000000,00000010,00000000,?,?,00FF0380,?,?,?,?,00000000), ref: 00FF0276
                                          • CryptDestroyHash.ADVAPI32(00000000,?,?,00FF0380,?,?,?,?,00000000), ref: 00FF0284
                                          • CryptReleaseContext.ADVAPI32(00000000,00000000,?,00FF0380,?,?,?,?,00000000), ref: 00FF0294
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                          • String ID:
                                          • API String ID: 2110207923-0
                                          • Opcode ID: 2c6f629ab1b20e0fdb37bde742a352a5791e38d5e13a0f67d6e7a24e67809258
                                          • Instruction ID: 0a8a4aaddb17520e7056fbe01352e3c9bcd9a62d9d1fceceaa7f6804b3a5815a
                                          • Opcode Fuzzy Hash: 2c6f629ab1b20e0fdb37bde742a352a5791e38d5e13a0f67d6e7a24e67809258
                                          • Instruction Fuzzy Hash: E8F04F34A51308FBEB308F50CD49FAAB7BCEF08751F108045FA45A6185CB71ED00AB60
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0100BF5F
                                            • Part of subcall function 01071273: KiUserExceptionDispatcher.NTDLL(?,?,?,0100BF47,?,?,?,?,?,?,?,?,0100BF47,?,010E0200), ref: 010712D2
                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0100BF7E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionException@8FeaturePresentProcessorThrowUser
                                          • String ID:
                                          • API String ID: 562353910-3916222277
                                          • Opcode ID: 7d2328e740710c20dde81612588674eb345f8aa1170ddc7f193d3098518044af
                                          • Instruction ID: 65b4f74dc13b5528b4a83228cfd7fc72d54640bd093a0e8a2b6eaf80bd5baec0
                                          • Opcode Fuzzy Hash: 7d2328e740710c20dde81612588674eb345f8aa1170ddc7f193d3098518044af
                                          • Instruction Fuzzy Hash: 6D51CBB1D002049FFB2ACFA8D98679ABBF4FB05310F1482AEE984E7684D3759584CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: bind() failed; %s
                                          • API String ID: 0-1141498939
                                          • Opcode ID: 6939ef3c13cdd8226426c192d445eb185c5cc8990c33fa453e4dde71efdc6c00
                                          • Instruction ID: 3fdcfec15e4f38103d577227b2c082f5c7b624f93dc84261f6e174b3adf91b07
                                          • Opcode Fuzzy Hash: 6939ef3c13cdd8226426c192d445eb185c5cc8990c33fa453e4dde71efdc6c00
                                          • Instruction Fuzzy Hash: A431F5716007069FE7209F64EC85B96BBE9FF44321F08002BF5588A341D37AA854D7A1
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0107913F
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 01079149
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 01079156
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 647d2f6635ac7b80bc40227012bd0c05d1b53bbf524b74e47d2be57b02b68d05
                                          • Instruction ID: 8e0eb3a21724180053a231d791181a725f3feb22306a5096b4d6bce3a636fee3
                                          • Opcode Fuzzy Hash: 647d2f6635ac7b80bc40227012bd0c05d1b53bbf524b74e47d2be57b02b68d05
                                          • Instruction Fuzzy Hash: 2731E774D0121D9BDB61DF68D988BCDBBB8BF18310F5042DAE44CA7290E7349B818F48
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000003,?,010896D7,00000003,010ED518,0000000C,0108982E,00000003,00000002,00000000,?,01086523,00000003), ref: 01089722
                                          • TerminateProcess.KERNEL32(00000000,?,010896D7,00000003,010ED518,0000000C,0108982E,00000003,00000002,00000000,?,01086523,00000003), ref: 01089729
                                          • ExitProcess.KERNEL32 ref: 0108973B
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: be476df1e1487a72f9ee568e5f737c9c0c38fd9856958468d33523acf9236e42
                                          • Instruction ID: 10521a1a64509f6a984fab4776e0135e2ed9e39e3281134ed5e8c22639200c12
                                          • Opcode Fuzzy Hash: be476df1e1487a72f9ee568e5f737c9c0c38fd9856958468d33523acf9236e42
                                          • Instruction Fuzzy Hash: E9E0EC31014209BFCF257F64D99CAAA3F79FF85285F004464F9D99A129DB3AD942DB40
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,0108A87A,?,00000006), ref: 01092B2B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: GetLocaleInfoEx
                                          • API String ID: 2299586839-2904428671
                                          • Opcode ID: 85d3d991fd42e29eea2e613d144c74147803309969807680e19c3c115b37b1a1
                                          • Instruction ID: a25ee6bbed5c33ab0dba5fef0966979b0ff82fe41e5d93bc69b0961e0832db6f
                                          • Opcode Fuzzy Hash: 85d3d991fd42e29eea2e613d144c74147803309969807680e19c3c115b37b1a1
                                          • Instruction Fuzzy Hash: 70F0F631601208F7CF21AF51DC59EEF7B69EF28B10F00451DFC856A244CA728910AB91
                                          APIs
                                          • htons.WS2_32(00FDC8D8), ref: 00FDC1EC
                                          • GetCurrentProcessId.KERNEL32(?,?,00FDC53D,0000FF0D,0000B8E8,00000073,00FDC8F8,?,?,?,00FDC8F8,?,00000073,0000FF0D,?), ref: 00FDC223
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CurrentProcesshtons
                                          • String ID:
                                          • API String ID: 2530476045-0
                                          • Opcode ID: 2d489e3a24ea70ba78b3f350a23d2f43a9df3b30cef07ef334a45a7763718012
                                          • Instruction ID: ff274c9f1eff2738eff1e5300e5e50188108be26941adf5f8c8b37a00f7564f1
                                          • Opcode Fuzzy Hash: 2d489e3a24ea70ba78b3f350a23d2f43a9df3b30cef07ef334a45a7763718012
                                          • Instruction Fuzzy Hash: F7015A795143948BCB008F69D4806A6B7A4FF19310F05928AEC889F31AE774E590C7A9
                                          APIs
                                          • CryptAcquireContextA.ADVAPI32(00FF034F,00000000,00000000,00000001,F0000000,00000000,?,00FF034F,?,?,00000000,?,00000000,00000000,?), ref: 00FF01F3
                                          • CryptCreateHash.ADVAPI32(00FF034F,00008003,00000000,00000000,00FF0353,?,00FF034F,?,?,00000000,?,00000000,00000000,?), ref: 00FF020C
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Crypt$AcquireContextCreateHash
                                          • String ID:
                                          • API String ID: 1914063823-0
                                          • Opcode ID: 1ce8166f9d642e1488f095a0e4b4ea5e9947d17329cb95b36f17532fff704daf
                                          • Instruction ID: 91183d1cb12e48eef74bcfa386ce8b918eaf0817fc0f29055cd4ece02ea30a5a
                                          • Opcode Fuzzy Hash: 1ce8166f9d642e1488f095a0e4b4ea5e9947d17329cb95b36f17532fff704daf
                                          • Instruction Fuzzy Hash: E5E01731290318BBFA305A50EC4AFD677ACAB04B50F214411B785BA0C8CBE2B9009BA8
                                          APIs
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00F8F87D
                                          • CryptDestroyHash.ADVAPI32(?,?,00000000), ref: 00F8F888
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Crypt$ContextDestroyHashRelease
                                          • String ID:
                                          • API String ID: 3989222877-0
                                          • Opcode ID: 9c32661b4c1201ede155c326d938bd29a13283a8fe31296ccd4f81e74f35ec5d
                                          • Instruction ID: d56ed056a9909f81da301e9e64bd53f9be381159b8ce2253c35ec762479f07c3
                                          • Opcode Fuzzy Hash: 9c32661b4c1201ede155c326d938bd29a13283a8fe31296ccd4f81e74f35ec5d
                                          • Instruction Fuzzy Hash: 3AD0C936111214EFCB119F98E848EC6BBF8FF0D7A1F004051FA898B224CB72A810CF91
                                          APIs
                                            • Part of subcall function 01090000: GetLastError.KERNEL32(?,?,01084C15,010ED438,00000010), ref: 01090004
                                            • Part of subcall function 01090000: _free.LIBCMT ref: 01090037
                                            • Part of subcall function 01090000: SetLastError.KERNEL32(00000000), ref: 01090078
                                            • Part of subcall function 01090000: _abort.LIBCMT ref: 0109007E
                                          • EnumSystemLocalesW.KERNEL32(0109938E,00000001,00000000,?,0108AE1C,?,010999BB,00000000,?,?,?), ref: 010992D8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: 2cf201450bf077fb9b8816008a7c9a0659fc9ff34a6dcb8ffbcb5752d272217b
                                          • Instruction ID: 7ec68db79daadb7cbeb606bb4e8c1754b32e33a515a26a7f8ed292311ae99454
                                          • Opcode Fuzzy Hash: 2cf201450bf077fb9b8816008a7c9a0659fc9ff34a6dcb8ffbcb5752d272217b
                                          • Instruction Fuzzy Hash: 8411E5362047059FDF289F39C8A16BAB7A2FF80368B15846CE9C687A40D375A942DB40
                                          APIs
                                            • Part of subcall function 01090000: GetLastError.KERNEL32(?,?,01084C15,010ED438,00000010), ref: 01090004
                                            • Part of subcall function 01090000: _free.LIBCMT ref: 01090037
                                            • Part of subcall function 01090000: SetLastError.KERNEL32(00000000), ref: 01090078
                                            • Part of subcall function 01090000: _abort.LIBCMT ref: 0109007E
                                          • EnumSystemLocalesW.KERNEL32(010995DE,00000001,00000006,?,0108AE1C,?,0109997F,0108AE1C,?,?,?,?,?,0108AE1C,?,?), ref: 0109934D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: fe41f43ba10ec097e576e75288f58030dc47e36a5c15c291341ab9a0bdafe8aa
                                          • Instruction ID: 17ea9999bbbb136487fef1ed0daab80316e9053628082680581b65d8fcc09214
                                          • Opcode Fuzzy Hash: fe41f43ba10ec097e576e75288f58030dc47e36a5c15c291341ab9a0bdafe8aa
                                          • Instruction Fuzzy Hash: A9F022322003055FDF255F3998A0AAA7BE4EF8022CF06C06CFA898B680D6719802A700
                                          APIs
                                            • Part of subcall function 01085CE5: EnterCriticalSection.KERNEL32(?,?,0108FDA0,?,010ED6E0,00000008,0108FE6E,?,?,?), ref: 01085CF4
                                          • EnumSystemLocalesW.KERNEL32(01092546,00000001,010ED800,0000000C), ref: 010925C4
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                          • String ID:
                                          • API String ID: 1272433827-0
                                          • Opcode ID: 498a4dd40862eee2292bcbdd817c43713dd70ee9bb7350902bd25bdd9be2f046
                                          • Instruction ID: 152b71c82ad25036a02352c11c2a00cd453b492d9ad4c103055a6f61d28c18ec
                                          • Opcode Fuzzy Hash: 498a4dd40862eee2292bcbdd817c43713dd70ee9bb7350902bd25bdd9be2f046
                                          • Instruction Fuzzy Hash: ACF06D72A10205EFEB21EFA8D946B9D77F1FB14320F01825AF484DB695CB7A8941DF40
                                          APIs
                                            • Part of subcall function 01090000: GetLastError.KERNEL32(?,?,01084C15,010ED438,00000010), ref: 01090004
                                            • Part of subcall function 01090000: _free.LIBCMT ref: 01090037
                                            • Part of subcall function 01090000: SetLastError.KERNEL32(00000000), ref: 01090078
                                            • Part of subcall function 01090000: _abort.LIBCMT ref: 0109007E
                                          • EnumSystemLocalesW.KERNEL32(01099172,00000001,00000006,?,?,010999DD,0108AE1C,?,?,?,?,?,0108AE1C,?,?,?), ref: 01099252
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: 608bfdea639c2ecd5f2afa0392fdf8d4a5d0f5ca2ef3023106bbd9904bbf0bda
                                          • Instruction ID: 1feb835cf176808b948f1a9ff4d91baf57b7853407a8506e61c725920edd49a8
                                          • Opcode Fuzzy Hash: 608bfdea639c2ecd5f2afa0392fdf8d4a5d0f5ca2ef3023106bbd9904bbf0bda
                                          • Instruction Fuzzy Hash: 5BF0553630020557CF049F39C8657AB7FA4FFC1A14F06409CFA898B245C2369842D790
                                          APIs
                                          • CryptHashData.ADVAPI32(?,?,?,00000000,?,00FF0374,?,?,00000000,?,?,?,00000000,?,00000000,00000000), ref: 00FF0231
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CryptDataHash
                                          • String ID:
                                          • API String ID: 4245837645-0
                                          • Opcode ID: 5e5db651352df5325914c26d286df752aa353cea707c2471faff2e7f3509ed32
                                          • Instruction ID: 63e0133ce2f4a79a8de01bcc0d13b84105b06a97f5dee5397810a9950f7dbbb2
                                          • Opcode Fuzzy Hash: 5e5db651352df5325914c26d286df752aa353cea707c2471faff2e7f3509ed32
                                          • Instruction Fuzzy Hash: 67C00236150208ABCF115F84DC49F997BA9BB08610F048050BA184A165C772E5209B44
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _strncpy
                                          • String ID: Address already in use$Address family not supported$Address not available$Bad access$Bad argument$Bad file$Bad message size$Bad protocol$Bad quota$Blocking call in progress$Call interrupted$Call would block$Connection refused$Connection was aborted$Connection was reset$Descriptor is not a socket$Disconnected$Host down$Host not found$Host not found, try again$Host unreachable$Invalid arguments$Loop??$Name too long$Need destination address$Network down$Network has been reset$Network unreachable$No buffer space$No data record of requested type$Not empty$Operation not supported$Out of file descriptors$Process limit reached$Protocol family not supported$Protocol is unsupported$Protocol option is unsupported$Remote error$Socket has been shut down$Socket is already connected$Socket is not connected$Socket is unsupported$Something is stale$Timed out$Too many references$Too many users$Unrecoverable error in call to nameserver$Winsock library is not ready$Winsock library not initialised$Winsock version not supported
                                          • API String ID: 2961919466-3442644082
                                          • Opcode ID: b37d2f9593d3773ccff499087f71279ce866ce1c86f26d26a2819179e18aaaf9
                                          • Instruction ID: 59a07c501b0abd43f9684f75e0a62b3a79b9850d218130f0250e653f1839ef5d
                                          • Opcode Fuzzy Hash: b37d2f9593d3773ccff499087f71279ce866ce1c86f26d26a2819179e18aaaf9
                                          • Instruction Fuzzy Hash: E3414223B0D2229245140FDCA6A42A12796F3627107ADCA13F487EB303C7D6CE633392
                                          APIs
                                            • Part of subcall function 00FDD410: ___swprintf_l.LIBCMT ref: 00FDD481
                                            • Part of subcall function 00FDD700: WSAStartup.WS2_32(00000002,?), ref: 00FDD720
                                            • Part of subcall function 00FEB880: GetModuleHandleA.KERNEL32(kernel32,?,00FDCF7C,WS2_32.DLL), ref: 00FEB88E
                                          • GetLastError.KERNEL32 ref: 00FDCF86
                                            • Part of subcall function 00FCD340: ___swprintf_l.LIBCMT ref: 00FCD382
                                          • GetProcAddress.KERNEL32(00000000,WSACreateEvent), ref: 00FDCFB5
                                          • GetLastError.KERNEL32 ref: 00FDCFC2
                                          • FreeLibrary.KERNEL32(?), ref: 00FDCFDA
                                          Strings
                                          • WSAEnumNetworkEvents failed (%d), xrefs: 00FDD23C
                                          • failed to find WSAEventSelect function (%d), xrefs: 00FDD035
                                          • , xrefs: 00FDD2D8
                                          • failed to find WSAEnumNetworkEvents function (%d), xrefs: 00FDD058
                                          • WS2_32.DLL, xrefs: 00FDCF72
                                          • WSACreateEvent, xrefs: 00FDCFAF
                                          • FreeLibrary(wsock2) failed (%d), xrefs: 00FDD37A
                                          • WSAEnumNetworkEvents, xrefs: 00FDD03C
                                          • WSACloseEvent, xrefs: 00FDCFF6
                                          • failed to find WSACreateEvent function (%d), xrefs: 00FDCFC9
                                          • WSACloseEvent failed (%d), xrefs: 00FDD358
                                          • WSAEventSelect, xrefs: 00FDD019
                                          • failed to find WSACloseEvent function (%d), xrefs: 00FDD012
                                          • Time-out, xrefs: 00FDD334
                                          • failed to load WS2_32.DLL (%d), xrefs: 00FDCF8D
                                          • WSACreateEvent failed (%d), xrefs: 00FDD073
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast___swprintf_l$AddressFreeHandleLibraryModuleProcStartup
                                          • String ID: $FreeLibrary(wsock2) failed (%d)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$failed to find WSACloseEvent function (%d)$failed to find WSACreateEvent function (%d)$failed to find WSAEnumNetworkEvents function (%d)$failed to find WSAEventSelect function (%d)$failed to load WS2_32.DLL (%d)
                                          • API String ID: 2508201097-2939610961
                                          • Opcode ID: ccf75f1ef9ff68f5dfb2ee0a259e22756f25567deef7b80c141a62705da5f033
                                          • Instruction ID: 146bc3ecb4fc75dbfd91c30649a7368ad952ac1c245dd15cb2adba5672ae69c5
                                          • Opcode Fuzzy Hash: ccf75f1ef9ff68f5dfb2ee0a259e22756f25567deef7b80c141a62705da5f033
                                          • Instruction Fuzzy Hash: 86D10A71E00209AFDB159FA4DD89BEEBB7AEF00311F18012AF945E6394D7768C40E751
                                          APIs
                                          • ___swprintf_l.LIBCMT ref: 00FD68BA
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD68E3
                                          • ___swprintf_l.LIBCMT ref: 00FD68F5
                                          • __allrem.LIBCMT ref: 00FD691A
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6928
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6938
                                          • ___swprintf_l.LIBCMT ref: 00FD694A
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6970
                                          • ___swprintf_l.LIBCMT ref: 00FD6982
                                          • __allrem.LIBCMT ref: 00FD69A4
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD69B2
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD69C2
                                          • ___swprintf_l.LIBCMT ref: 00FD69D4
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD69F9
                                          • ___swprintf_l.LIBCMT ref: 00FD6A0B
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6A30
                                          • ___swprintf_l.LIBCMT ref: 00FD6A42
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6A59
                                          • ___swprintf_l.LIBCMT ref: 00FD6A6B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$___swprintf_l$__allrem
                                          • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                          • API String ID: 2797256748-2102732564
                                          • Opcode ID: be2ed80fae07a404ee308e5447fe8f7791723c71939fe606ba3f5869236bb4aa
                                          • Instruction ID: 5b9d0b7532bf9ab7c9d61cb994b455f8e2cfd01ea2bb11a3850e418afe508033
                                          • Opcode Fuzzy Hash: be2ed80fae07a404ee308e5447fe8f7791723c71939fe606ba3f5869236bb4aa
                                          • Instruction Fuzzy Hash: A141D177B8126436E92175492C02FEF321ECBD1FA5F19006AFB44FB2C1D6A5A91112FA
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCC1B
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCC80
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCC92
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCCA6
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCD42
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCD54
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCD68
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDCD7D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.52.1%sQUIT$CLIENT libcurl 7.52.1DEFINE %s %sQUIT$CLIENT libcurl 7.52.1MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                          • API String ID: 601868998-539049603
                                          • Opcode ID: cd9e295a6081f58697d738f75604df81f1be09a10f86cf97e16a6ec1b8c2179c
                                          • Instruction ID: 67faa553ad355bc75e5bfc8c371bf77ee1ec6e3b0b7f74e8fbe4533afc3abfce
                                          • Opcode Fuzzy Hash: cd9e295a6081f58697d738f75604df81f1be09a10f86cf97e16a6ec1b8c2179c
                                          • Instruction Fuzzy Hash: 14816C32F0024627DB2126655D42BAE7F9A9F92B25F0C017AFD48EB342F6655E01E3D1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr$_strstr
                                          • String ID: %25$://$Invalid IPv6 address format$No valid port number in proxy string (%s)$Please URL encode %% as %%25, see RFC 6874.$Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$http:$https$socks$socks4$socks4a$socks5$socks5h
                                          • API String ID: 2668852316-741215929
                                          • Opcode ID: b8f046a0ca28ddd57aef0bdfe234fa8e3702e6baa479b0eff4fd99ba96e6f2a1
                                          • Instruction ID: d7b3f604bc37c908ffde0caeb6c4eb37be24b1674f4a78eadff3479e71742739
                                          • Opcode Fuzzy Hash: b8f046a0ca28ddd57aef0bdfe234fa8e3702e6baa479b0eff4fd99ba96e6f2a1
                                          • Instruction Fuzzy Hash: 03C16879E403466BDB301E24ED87FAF7BA59F11364F08006DFC899A242E3758905E7A2
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,05CEC6CE,00691A68,0101537C,?,?,0101537C,05CEC6CE), ref: 010190DD
                                          • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 010190F9
                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0101910B
                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0101911E
                                          • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 01019131
                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 01019140
                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0101914F
                                          • new.LIBCMT ref: 01019159
                                          • new.LIBCMT ref: 010191B3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AddressProc$HandleModule
                                          • String ID: AcquireSRWLockExclusive$InitializeConditionVariable$InitializeSRWLock$ReleaseSRWLockExclusive$SleepConditionVariableSRW$WakeAllConditionVariable$kernel32.dll
                                          • API String ID: 667068680-3190095727
                                          • Opcode ID: 5e732f0e38022f61460ba85eaefdf2efa9cc634760a3825dbf641a0a13af9031
                                          • Instruction ID: f466cab8d0ef3cd8df2b26c70d736ccfddac36d7a36d3a6ae0d33ff540063f5e
                                          • Opcode Fuzzy Hash: 5e732f0e38022f61460ba85eaefdf2efa9cc634760a3825dbf641a0a13af9031
                                          • Instruction Fuzzy Hash: 7241B3B1A40B159BE7219F69C895B9BFBF8FF04A14F00062EE985E7740D7B9D5048BD0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $%s$--%sContent-Disposition: attachment$--%s--$--%s--$Content-Type: %s$Content-Type: multipart/mixed; boundary=%s$%s; boundary=%s$--%s$Content-Disposition: form-data; name="$Content-Type: multipart/form-data$couldn't open file "%s"
                                          • API String ID: 0-530302859
                                          • Opcode ID: dbc28f13c096eec68dbaf68c56c14dd0c4a2f6a4375e9eb35b740445cb85c7d1
                                          • Instruction ID: 24908868418e59c40720564ca4ba7a1c27e51e2b8c869c138b89eeaafe2d798a
                                          • Opcode Fuzzy Hash: dbc28f13c096eec68dbaf68c56c14dd0c4a2f6a4375e9eb35b740445cb85c7d1
                                          • Instruction Fuzzy Hash: 8FF1B272D4026D9BCF21DA55CC89BEA73B8AB54710F0405E9FD48A7242E735DE829FE0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l$ErrorLastsendto
                                          • String ID: %I64d$%s%c%s%c$blksize$netascii$octet$tftp_send_first: internal error$timeout$tsize
                                          • API String ID: 1708266137-1778150644
                                          • Opcode ID: 06d60955f22a731b78f9993761b1378a7ef592c48da182c716ada28fc28bd3e0
                                          • Instruction ID: 5a5f15a8c3f7a7b07b5063c65636e8195d2544f147ff6ba112e7b4a28c9360a9
                                          • Opcode Fuzzy Hash: 06d60955f22a731b78f9993761b1378a7ef592c48da182c716ada28fc28bd3e0
                                          • Instruction Fuzzy Hash: 89912DB2A00204AFD721EF64DC46FEB77BAEF45310F08056AF94ADB342DA35A905D761
                                          APIs
                                          • TlsGetValue.KERNEL32(0000000F,05CEC6CE,7622DF60,010A48B4), ref: 01008EDD
                                          • TlsGetValue.KERNEL32(0000000F), ref: 01008EF2
                                          • TlsGetValue.KERNEL32(0000000F), ref: 01008F0E
                                          • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 01008F3E
                                          • GetModuleHandleA.KERNEL32(KERNEL32.DLL,SetWaitableTimerEx), ref: 01008F88
                                          • GetProcAddress.KERNEL32(00000000), ref: 01008F8F
                                          • WaitForMultipleObjectsEx.KERNEL32(00000000,?,00000000,00000000,00000000,05CEC6CE,7622DF60,010A48B4), ref: 01009019
                                          • CloseHandle.KERNEL32(00000000), ref: 01009077
                                          • TlsGetValue.KERNEL32(0000000F), ref: 010090AA
                                          • ResetEvent.KERNEL32(?), ref: 010090B3
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 010090C2
                                          • CloseHandle.KERNEL32(00000000), ref: 010090D8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Value$Handle$Close$AddressCreateEventException@8ModuleMultipleObjectsProcResetThrowTimerWaitWaitable
                                          • String ID: KERNEL32.DLL$SetWaitableTimerEx
                                          • API String ID: 888221587-2877992516
                                          • Opcode ID: 0550cb4b256944e252dae36e00b0f012c952c7042306eddaf2dcd5b7cfd63a5b
                                          • Instruction ID: 0dd4d311cb5e908cb320d65943bfa52cceac4dbdce0913c328e1543ecb536eb7
                                          • Opcode Fuzzy Hash: 0550cb4b256944e252dae36e00b0f012c952c7042306eddaf2dcd5b7cfd63a5b
                                          • Instruction Fuzzy Hash: 4F71A570E002099FEB66CFA8D884BEE7BB9BF44324F14471AF5A6E72C5D73499418B50
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l$ErrorLastsend
                                          • String ID: %127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                          • API String ID: 1939966535-3318542072
                                          • Opcode ID: 74c7a4b644dee5687b68baf11365a5cc7122b0bcf49566ee419bdd24d244f96b
                                          • Instruction ID: a5588fbfddb86178aa21a8d0ddb34ddd404722d3cbea693b06fdb240a30ea4f9
                                          • Opcode Fuzzy Hash: 74c7a4b644dee5687b68baf11365a5cc7122b0bcf49566ee419bdd24d244f96b
                                          • Instruction Fuzzy Hash: 8F610CB5A402056FE730EA14CC86FF7736DAF44744F0841A9F689EB283DA757A049B50
                                          APIs
                                          • CoInitializeEx.OLE32(00000000,00000002,05CEC6CE), ref: 00FA7CB4
                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00FA7D24
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FA7D33
                                          • CloseHandle.KERNEL32(?), ref: 00FA7D3C
                                          • GetLastError.KERNEL32 ref: 00FA7D4D
                                            • Part of subcall function 00F93880: new.LIBCMT ref: 00F93896
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CloseErrorExecuteHandleInitializeLastObjectShellSingleWait
                                          • String ID: <$@$RunInstallerWithUAC::<lambda_54f122fa2d586c8735354f7e2e6d282c>::operator ()$]: $failed coinitializeex. result=$installer$shell execute ex failed. err=
                                          • API String ID: 2044801028-2639624214
                                          • Opcode ID: d7a1d089eb94df66ba979b092e879a27a8dcd1a149ef14381ef2429057dea039
                                          • Instruction ID: 56e1dea454b0932fdd0159acb6f38102230753e7a00561ed6992b7c8f47478c0
                                          • Opcode Fuzzy Hash: d7a1d089eb94df66ba979b092e879a27a8dcd1a149ef14381ef2429057dea039
                                          • Instruction Fuzzy Hash: 36B1B0B0E00349ABEF10EBA5CC45BAEBBB9BF01754F10412DE8417B281DB786E45DB95
                                          APIs
                                          • ___swprintf_l.LIBCMT ref: 00FED054
                                            • Part of subcall function 00FEE030: ___swprintf_l.LIBCMT ref: 00FEE04D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %08x%08x%08x%08x$%s, algorithm="%s"$%s, opaque="%s"$%s:%s$%s:%s:%08x:%s:%s:%s$%s:%s:%s$auth$auth-int$d41d8cd98f00b204e9800998ecf8427e$username="%s", realm="%s", nonce="%s", uri="%s", cnonce="%s", nc=%08x, qop=%s, response="%s"$username="%s", realm="%s", nonce="%s", uri="%s", response="%s"
                                          • API String ID: 48624451-3873893103
                                          • Opcode ID: e10822820cfece33384d16975526cbfbac06a63f491e9ef19534d4362e17f7b0
                                          • Instruction ID: 3b333ed624be4164cec269cba4c9031d05cfdd3543ab93152e0515a708158309
                                          • Opcode Fuzzy Hash: e10822820cfece33384d16975526cbfbac06a63f491e9ef19534d4362e17f7b0
                                          • Instruction Fuzzy Hash: AEA181B1E00219AFDF20AFA5CC85FEAB7BDEF04314F040195FA08A7605E7359E559BA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _strncpy$___swprintf_l
                                          • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                          • API String ID: 1627702573-748038847
                                          • Opcode ID: ea99f694fbd7d59e4ba122c2c9a214c8dfc2a1c8ef7a70b0308d105dd23876cb
                                          • Instruction ID: c9e970cd475176c22765b70aa4d0b23a47fe5f13f89d461b92dc3ea9de7fd8af
                                          • Opcode Fuzzy Hash: ea99f694fbd7d59e4ba122c2c9a214c8dfc2a1c8ef7a70b0308d105dd23876cb
                                          • Instruction Fuzzy Hash: 2A71D672D00209ABDF21EB64DC41FDAB3A9AF04304F4444AAE58DD7242EE35FA54AB91
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000004,00000004,01019D4B,05CEC6CE,00000004,00000004,00000004,010A66A8,000000FF,?,01016931,05CEC6CE,00000000), ref: 0101A0C7
                                          • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 0101A0DF
                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0101A0F0
                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0101A101
                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockShared), ref: 0101A112
                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockShared), ref: 0101A123
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AddressProc$HandleModule
                                          • String ID: AcquireSRWLockExclusive$AcquireSRWLockShared$InitializeSRWLock$ReleaseSRWLockExclusive$ReleaseSRWLockShared$kernel32.dll
                                          • API String ID: 667068680-2154951675
                                          • Opcode ID: 07293d2a04cb59e20e673482c590e9fb336b0fe97e67e9b295fb07a8e30b351f
                                          • Instruction ID: 361cc553cd824654b6a2b180c9d9b07279966bac5b24484a9a9aaafb17788b4b
                                          • Opcode Fuzzy Hash: 07293d2a04cb59e20e673482c590e9fb336b0fe97e67e9b295fb07a8e30b351f
                                          • Instruction Fuzzy Hash: EC0196702027129657717F2AAC5EA86BAE8BF5966CB05007DF5C0D760CE77DC001CF95
                                          APIs
                                          • _free.LIBCMT ref: 0109794C
                                            • Part of subcall function 010872F5: RtlFreeHeap.NTDLL(00000000,00000000,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?), ref: 0108730B
                                            • Part of subcall function 010872F5: GetLastError.KERNEL32(?,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?,?), ref: 0108731D
                                          • _free.LIBCMT ref: 0109795E
                                          • _free.LIBCMT ref: 01097970
                                          • _free.LIBCMT ref: 01097982
                                          • _free.LIBCMT ref: 01097994
                                          • _free.LIBCMT ref: 010979A6
                                          • _free.LIBCMT ref: 010979B8
                                          • _free.LIBCMT ref: 010979CA
                                          • _free.LIBCMT ref: 010979DC
                                          • _free.LIBCMT ref: 010979EE
                                          • _free.LIBCMT ref: 01097A00
                                          • _free.LIBCMT ref: 01097A12
                                          • _free.LIBCMT ref: 01097A24
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 339bf1772065d8308d6ce1f2792c71d8708f5e37cc09d38a48951f44fc4e0ce3
                                          • Instruction ID: 87654d2bdba9556839f2acf23d0d1c3111933eab28705b9c9227219398b61434
                                          • Opcode Fuzzy Hash: 339bf1772065d8308d6ce1f2792c71d8708f5e37cc09d38a48951f44fc4e0ce3
                                          • Instruction Fuzzy Hash: 7E212A73918301AB9BB0EA6DE492D6A77FAFB503107640889F1C5D7D4DCE39F8818E24
                                          APIs
                                          • ___std_type_info_name.LIBVCRUNTIME ref: 00FA5F29
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_type_info_name
                                          • String ID: (unknown)$): $Dynamic exception type: $H$Throw in function $Throw location unknown (consider using BOOST_THROW_EXCEPTION)$Unknown exception.$std::exception::what:
                                          • API String ID: 1734802720-3314828008
                                          • Opcode ID: 2a3929e2bf86a0980d397eb23ad1f022d3f0c51c45ae1251b056053ca09e1640
                                          • Instruction ID: d0ef9665df0b21152c90e3718e9daeb6fe94c7d25b135d54c1c339f4d54ab32a
                                          • Opcode Fuzzy Hash: 2a3929e2bf86a0980d397eb23ad1f022d3f0c51c45ae1251b056053ca09e1640
                                          • Instruction Fuzzy Hash: 0AC1E4B1D00319AFEF20DB60CC45BDEB7B8AF51704F0445A9E54DAB242EB749A88DF61
                                          APIs
                                          • GetModuleHandleA.KERNEL32(KERNEL32.DLL,GetTickCount64), ref: 01008A6D
                                          • GetProcAddress.KERNEL32(00000000), ref: 01008A74
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01008B6D
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01008B94
                                          • __allrem.LIBCMT ref: 01008B9F
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01008BC6
                                          • __allrem.LIBCMT ref: 01008BD1
                                          • SystemTimeToFileTime.KERNEL32(0000003C,?,00000000,?,0000003C,00000000,?,?,000F4240,00000000,03938700,00000000,D693A400,00000000), ref: 01008BE5
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01008C3B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$Time__allrem$AddressFileHandleModuleProcSystem
                                          • String ID: GetTickCount64$KERNEL32.DLL
                                          • API String ID: 2537731104-3320051239
                                          • Opcode ID: e4fe9a4a31411b777b96b223ff6e83c646564c7932713e453534dd3cb2397d2c
                                          • Instruction ID: 89dee0fc25b9211ce44bd98aa3f49824e1a7b76223c4bf9cdb7078120ef96600
                                          • Opcode Fuzzy Hash: e4fe9a4a31411b777b96b223ff6e83c646564c7932713e453534dd3cb2397d2c
                                          • Instruction Fuzzy Hash: A451A0B5618301ABEB15EF64CC45B9F77E8BF98700F04891EB589D3280EB78E544C796
                                          APIs
                                          • _free.LIBCMT ref: 010985CA
                                            • Part of subcall function 010872F5: RtlFreeHeap.NTDLL(00000000,00000000,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?), ref: 0108730B
                                            • Part of subcall function 010872F5: GetLastError.KERNEL32(?,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?,?), ref: 0108731D
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 0109794C
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 0109795E
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 01097970
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 01097982
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 01097994
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 010979A6
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 010979B8
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 010979CA
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 010979DC
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 010979EE
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 01097A00
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 01097A12
                                            • Part of subcall function 0109792F: _free.LIBCMT ref: 01097A24
                                          • _free.LIBCMT ref: 010985EC
                                          • _free.LIBCMT ref: 01098601
                                          • _free.LIBCMT ref: 0109860C
                                          • _free.LIBCMT ref: 0109862E
                                          • _free.LIBCMT ref: 01098641
                                          • _free.LIBCMT ref: 0109864F
                                          • _free.LIBCMT ref: 0109865A
                                          • _free.LIBCMT ref: 01098692
                                          • _free.LIBCMT ref: 01098699
                                          • _free.LIBCMT ref: 010986B6
                                          • _free.LIBCMT ref: 010986CE
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 631e234a4374a9d8dd39722cd6cfd92d09598023d68eab1183561729c88b2bd1
                                          • Instruction ID: f184adcb5f5886dae1f675e7d7719f9dccfbd433aa8279032931d9c2ee410120
                                          • Opcode Fuzzy Hash: 631e234a4374a9d8dd39722cd6cfd92d09598023d68eab1183561729c88b2bd1
                                          • Instruction Fuzzy Hash: 01316D3160820A9FEF71AA3DD854BAA77F9FF05210F20849EE5C9DB655DF34E8409B50
                                          APIs
                                          • GetCurrentProcessId.KERNEL32(?), ref: 01008500
                                          • OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 0100851A
                                          • CloseHandle.KERNEL32(00000000), ref: 0100852F
                                          • ResetEvent.KERNEL32(00000000), ref: 01008539
                                          • CloseHandle.KERNEL32(00000000,05CEC6CE,7622DF20,00000000), ref: 0100857A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CloseEventHandle$CurrentOpenProcessReset
                                          • String ID: e-flag
                                          • API String ID: 485013868-538632313
                                          • Opcode ID: d180cbf0aff0cfe782fefe22441436375d2d2fcdaf92da3d89d19fbdf756a98c
                                          • Instruction ID: 727a6d1ac9d64179e14f0081537e8bba3d70e78fc9ccbd3edb30d9f830b95f07
                                          • Opcode Fuzzy Hash: d180cbf0aff0cfe782fefe22441436375d2d2fcdaf92da3d89d19fbdf756a98c
                                          • Instruction Fuzzy Hash: 3271AF74C043489FEB22CBA8D8447EDBBB4BF19710F148259F898B7285E7356945CB51
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: Channel$LineID$Message$ProcessID$Severity$ThreadID$TimeStamp
                                          • API String ID: 1385522511-3293327833
                                          • Opcode ID: 1430cbbad26c6154f2fe42bdbdd6fcab4217becac26b9867a23850ce3aacb637
                                          • Instruction ID: 028dec42405c18956b805fb2374e09c9032fc4eed6086d9846a473671524d388
                                          • Opcode Fuzzy Hash: 1430cbbad26c6154f2fe42bdbdd6fcab4217becac26b9867a23850ce3aacb637
                                          • Instruction Fuzzy Hash: 3471DE70D0021A9FDB20DF68C946BEDBBF4FB45718F1442ACE6D55B284C739AA05CBA1
                                          APIs
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6ABF
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6AFD
                                          • ___swprintf_l.LIBCMT ref: 00FD6B55
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6B6D
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD6BA2
                                          • ___swprintf_l.LIBCMT ref: 00FD6BB7
                                          • ___swprintf_l.LIBCMT ref: 00FD6BD2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$___swprintf_l
                                          • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd
                                          • API String ID: 2070094197-564197712
                                          • Opcode ID: ddf31af0b17b1d22c2ed53d6a98c18ffcef8137bc60394b50f01db37241d3796
                                          • Instruction ID: 42cb86424c57527bd59ee5b544667be415bda383be413ef97a57afac30f6e63a
                                          • Opcode Fuzzy Hash: ddf31af0b17b1d22c2ed53d6a98c18ffcef8137bc60394b50f01db37241d3796
                                          • Instruction Fuzzy Hash: 2C411673B402187AEB216D6D8C41FEF766ADBD4B50F094166FD08EB281E9729D5092D0
                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32,?,00FDCF7C,WS2_32.DLL), ref: 00FEB88E
                                          • GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 00FEB8A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                          • API String ID: 1646373207-3327535076
                                          • Opcode ID: 554ced59c4401daf8aedcaa214f95affb64e6d6508bb49e4061aa7a5c55f4b11
                                          • Instruction ID: c20a4dcb345dc36f9322e6aa5ea727889710f55cc48c85866ab19af5ad7c2b39
                                          • Opcode Fuzzy Hash: 554ced59c4401daf8aedcaa214f95affb64e6d6508bb49e4061aa7a5c55f4b11
                                          • Instruction Fuzzy Hash: 89416831B003455BDB244E6AAC85BAEB7A9DF41325F1401BAFE85A7206DB7289069760
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,05CEC6CE,000000FF,00000000,00000000,?,00000010,?,00000010,00000000,05CEC6CE), ref: 0107D61B
                                          • GetLastError.KERNEL32 ref: 0107D628
                                          • __dosmaperr.LIBCMT ref: 0107D62F
                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,00000000,?,?), ref: 0107D65B
                                          • GetLastError.KERNEL32 ref: 0107D665
                                          • __dosmaperr.LIBCMT ref: 0107D66C
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,?,00000000,00000000), ref: 0107D6AF
                                          • GetLastError.KERNEL32 ref: 0107D6B9
                                          • __dosmaperr.LIBCMT ref: 0107D6C0
                                          • _free.LIBCMT ref: 0107D6CC
                                          • _free.LIBCMT ref: 0107D6D3
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                          • String ID:
                                          • API String ID: 2441525078-0
                                          • Opcode ID: a2d368379a7ebc9b1b625c299c2b8847794d21f0a857b8c00e52182e7e39def1
                                          • Instruction ID: 941a04b5db7f4c80da39f8ff97a944c8afa15af1efcf8a99b3090cad27d58dd4
                                          • Opcode Fuzzy Hash: a2d368379a7ebc9b1b625c299c2b8847794d21f0a857b8c00e52182e7e39def1
                                          • Instruction Fuzzy Hash: C0319F72D0420AAFEF21AFE8DC449EF3FB9EF09264F100259F99496194DA36C911CB74
                                          APIs
                                          • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 00FDF4DA
                                          • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 00FDF56A
                                          • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 00FDF644
                                          Strings
                                          • Timeout waiting for block %d ACK. Retries = %d, xrefs: 00FDF59C
                                          • Received unexpected DATA packet block %d, expecting block %d, xrefs: 00FDF51A
                                          • tftp_rx: internal error, xrefs: 00FDF657
                                          • Received last DATA packet block %d again., xrefs: 00FDF496
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: sendto
                                          • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                          • API String ID: 1876886790-1785996722
                                          • Opcode ID: a1184b60f0d09788057b85aed70bb0043894a9a1d5ff2679ef8faf76d0fe8e99
                                          • Instruction ID: 44a8dd542d684a44570b68d172b7b7ccc02dc5d4ca0ba0351345e7aa889d5a38
                                          • Opcode Fuzzy Hash: a1184b60f0d09788057b85aed70bb0043894a9a1d5ff2679ef8faf76d0fe8e99
                                          • Instruction Fuzzy Hash: D451CFB2300512BBE7116F64EC82FEAB369FF04315F040126F659C6691E73AF5649BE1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr___swprintf_l_strrchr
                                          • String ID: %s://%s%s%s:%hu%s%s%s$;type=%c$Illegal port number$Port number out of range$[%*45[0123456789abcdefABCDEF:.]%c$]
                                          • API String ID: 2016915833-2294455819
                                          • Opcode ID: 090037895117928762d89ec7ef8f6579cccfdaadc293be9463269b4d0acd0ce8
                                          • Instruction ID: ad86b4464fcb03bd0b8183a493841ad6fdf0a222607d1af515a6c582f356df06
                                          • Opcode Fuzzy Hash: 090037895117928762d89ec7ef8f6579cccfdaadc293be9463269b4d0acd0ce8
                                          • Instruction Fuzzy Hash: EF617D70B043479BEB15DB74CC83BFAB7E4EF41310F08046EE98A86282DB795944D751
                                          APIs
                                          • __Getcvt.LIBCPMT ref: 00F9E55E
                                          • __Getcvt.LIBCPMT ref: 00F9E596
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F9E5BE
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F9E5FC
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F9E63C
                                          • numpunct.LIBCPMT ref: 00F9E644
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F9E64D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$Getcvt$Exception@8Thrownumpunct
                                          • String ID: false$true
                                          • API String ID: 3191441162-2658103896
                                          • Opcode ID: 9b5f77ff45513b39f07a6c1b0b3f0bccdb2d599fea2489ca7b102673d6dfe29f
                                          • Instruction ID: 2c68963eb45a53f4d4830f4cb97dbb5123074299534f2f056c545b1903250983
                                          • Opcode Fuzzy Hash: 9b5f77ff45513b39f07a6c1b0b3f0bccdb2d599fea2489ca7b102673d6dfe29f
                                          • Instruction Fuzzy Hash: 0D414631E042458FEF20DF64C440BAEBBA1EF95324F1981ADD9859B382DB769905CBA0
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FD1AC4
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FD1BB7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: %s$Connection$Content-Length$Content-Type:$Host:$Transfer-Encoding:
                                          • API String ID: 601868998-3301244629
                                          • Opcode ID: 4b05a285ab5acfc1c7ea53765b2e932f3ee8bac8d83b78c27c63e3b73186ab61
                                          • Instruction ID: 5bb0aa471959cd2a46a10465f35765825b7db274170a49fc54581cd23fb1c15c
                                          • Opcode Fuzzy Hash: 4b05a285ab5acfc1c7ea53765b2e932f3ee8bac8d83b78c27c63e3b73186ab61
                                          • Instruction Fuzzy Hash: A3512430E49342BBDF219E609944BE97BA3BF11310F1C816BEC894A342F7368951FB51
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F8BED6
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F8BEF9
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F8BF19
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F8BF8F
                                          • std::_Facet_Register.LIBCPMT ref: 00F8BFA5
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F8BFB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast$ti
                                          • API String ID: 2536120697-1216798792
                                          • Opcode ID: ac6943ae5e67bf178295616cdb0377809ccd28b4c577fe3b988db3ba31933849
                                          • Instruction ID: 3b6abca20f67e9059ef936bb082877a08a76c651d0336eb5cf86472352e05b17
                                          • Opcode Fuzzy Hash: ac6943ae5e67bf178295616cdb0377809ccd28b4c577fe3b988db3ba31933849
                                          • Instruction Fuzzy Hash: 8931BA72E042199FCF21EF94D881AEEB7B4FF08324F14411AE945B7291DB39A845DF91
                                          APIs
                                          • FindCompleteObject.LIBCMT ref: 01070570
                                          • FindSITargetTypeInstance.LIBVCRUNTIME ref: 01070594
                                          • FindMITargetTypeInstance.LIBVCRUNTIME ref: 010705A9
                                            • Part of subcall function 01070110: PMDtoOffset.LIBCMT ref: 010701DA
                                          • FindVITargetTypeInstance.LIBVCRUNTIME ref: 010705B0
                                          • PMDtoOffset.LIBCMT ref: 010705C1
                                          • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 010705EB
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 010705FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Find$InstanceTargetType$Offset$CompleteException@8ObjectThrowstd::__non_rtti_object::__construct_from_string_literal
                                          • String ID: Bad dynamic_cast!
                                          • API String ID: 528452320-2956939130
                                          • Opcode ID: cf47e3c5f92032f1263ee9c2a17a86ff67e98709b00d12eab2fb5fd7d5a19823
                                          • Instruction ID: 106110bc302b5e40c1d553d72c2ba9c6956fd6a8f927eae8ff2a3eb4c2952b69
                                          • Opcode Fuzzy Hash: cf47e3c5f92032f1263ee9c2a17a86ff67e98709b00d12eab2fb5fd7d5a19823
                                          • Instruction Fuzzy Hash: 4621F3B2E0030ADFDB11DFA8C941AEF77A8AB0A710F104149F594A7285DB70EA00CBA4
                                          Strings
                                          • Accept-ranges: bytes, xrefs: 00FDA32D
                                          • failed to resume file:// transfer, xrefs: 00FDA603
                                          • Content-Length: %I64d, xrefs: 00FDA2FD
                                          • Can't get the size of file., xrefs: 00FDA400
                                          • Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT, xrefs: 00FDA393
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CountTick___from_strstr_to_strchr
                                          • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT$failed to resume file:// transfer
                                          • API String ID: 3886785706-4054300160
                                          • Opcode ID: 66480c97e4634da9cf6e628f59d46a8961bc21c0d9d31c9e18dcd247dd7ddcc5
                                          • Instruction ID: 14e6ff75ecefccc0df822bc0f18c12433c0193a25225670a7620dc3149d52f03
                                          • Opcode Fuzzy Hash: 66480c97e4634da9cf6e628f59d46a8961bc21c0d9d31c9e18dcd247dd7ddcc5
                                          • Instruction Fuzzy Hash: 73D1D471E002099BDF11DFA8DC85BEDBBB6EF45310F1C407AE849AB342EA359940EB55
                                          APIs
                                            • Part of subcall function 01090000: GetLastError.KERNEL32(?,?,01084C15,010ED438,00000010), ref: 01090004
                                            • Part of subcall function 01090000: _free.LIBCMT ref: 01090037
                                            • Part of subcall function 01090000: SetLastError.KERNEL32(00000000), ref: 01090078
                                            • Part of subcall function 01090000: _abort.LIBCMT ref: 0109007E
                                          • _memcmp.LIBVCRUNTIME ref: 0108B7D3
                                          • _free.LIBCMT ref: 0108B844
                                          • _free.LIBCMT ref: 0108B85D
                                          • _free.LIBCMT ref: 0108B88F
                                          • _free.LIBCMT ref: 0108B898
                                          • _free.LIBCMT ref: 0108B8A4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$ErrorLast$_abort_memcmp
                                          • String ID: C
                                          • API String ID: 1679612858-1037565863
                                          • Opcode ID: 2449ebdedee7b82eb77dc16f769aa3dbc9f41b3c2f9f083fee584be82427e74e
                                          • Instruction ID: 3ee76c3d264de0d3e033dc292ebd7b5b7567fa2b7f6e77c0a8c60443fd2a9e0d
                                          • Opcode Fuzzy Hash: 2449ebdedee7b82eb77dc16f769aa3dbc9f41b3c2f9f083fee584be82427e74e
                                          • Instruction Fuzzy Hash: 49B12775A0521ADFDB65EF18C884BADB7B4FB08314F1445EAE989A7350DB31AA90CF40
                                          APIs
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FDFA35
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FDFA9B
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FDFAF6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                          • API String ID: 885266447-870032562
                                          • Opcode ID: fd839ee69d66d669650fefbb970ba4b452f6b91211a7179eda75678c15dbd46f
                                          • Instruction ID: bc17afce4027b7ddd6ad61a670633fbb18555215774e4cf49f095ca550ec3065
                                          • Opcode Fuzzy Hash: fd839ee69d66d669650fefbb970ba4b452f6b91211a7179eda75678c15dbd46f
                                          • Instruction Fuzzy Hash: 51418471B006066FD7049F29DD81B55B6AAFB98314F08413AE949C7B80E779F8649B90
                                          APIs
                                          • htons.WS2_32(?), ref: 00FDE11C
                                          • htons.WS2_32(?), ref: 00FDE12A
                                          • send.WS2_32(?,?,00000003,00000000), ref: 00FDE1B3
                                          • WSAGetLastError.WS2_32 ref: 00FDE1BD
                                          • send.WS2_32(?,?,00000002,00000000), ref: 00FDE1F5
                                          • WSAGetLastError.WS2_32 ref: 00FDE200
                                            • Part of subcall function 00FCD340: ___swprintf_l.LIBCMT ref: 00FCD382
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLasthtonssend$___swprintf_l
                                          • String ID: Sending data failed (%d)
                                          • API String ID: 2196354059-2319402659
                                          • Opcode ID: c3e86059b1fc3730511e4381e2975ed2fd16fae5ca156802ad2de019fea141ad
                                          • Instruction ID: f619f408331bcbe43d9fbd879335cd105f8be5b369fc1a5e0fd63521f0198baa
                                          • Opcode Fuzzy Hash: c3e86059b1fc3730511e4381e2975ed2fd16fae5ca156802ad2de019fea141ad
                                          • Instruction Fuzzy Hash: 6341E3346451429FDB02AF64C881AEA7B7AFF19350F2801A6EE65DF382D7305911DB61
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00FB05A6
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00FB05C9
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00FB05E9
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00FB065F
                                          • std::_Facet_Register.LIBCPMT ref: 00FB0675
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00FB0680
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast
                                          • API String ID: 2536120697-3145022300
                                          • Opcode ID: ac035777c4c37cd95a2c9caaa5c0e1336db163a5a35b8908a4b03e9f8c953635
                                          • Instruction ID: 9b30c399dbd76d14cfc117fcc95903211593447f82b60f8e75cf435fbffc0f11
                                          • Opcode Fuzzy Hash: ac035777c4c37cd95a2c9caaa5c0e1336db163a5a35b8908a4b03e9f8c953635
                                          • Instruction Fuzzy Hash: 1331AA72D0021A8FCB21DF95D881AEEB7B5FF58724F14421EE851A7291DB3AAC05DF90
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F9A7E6
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F9A809
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9A829
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F9A89F
                                          • std::_Facet_Register.LIBCPMT ref: 00F9A8B5
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9A8C0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast
                                          • API String ID: 2536120697-3145022300
                                          • Opcode ID: 4e530e7ebe06629ae24b0f8a6321ac706f3ff877eedad4c5e6987805f9753f29
                                          • Instruction ID: f8c133735fbe58686a66e45af22624b2ff819b53d065cb87802f8649ad2c79d5
                                          • Opcode Fuzzy Hash: 4e530e7ebe06629ae24b0f8a6321ac706f3ff877eedad4c5e6987805f9753f29
                                          • Instruction Fuzzy Hash: 5F31CE71D002199BEF21DF94D881AAEB7B4EF48724F14412EE851A7241DB396C46CBD2
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F9A9C6
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F9A9E9
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9AA09
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F9AA7F
                                          • std::_Facet_Register.LIBCPMT ref: 00F9AA95
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9AAA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast
                                          • API String ID: 2536120697-3145022300
                                          • Opcode ID: 9a9f974a1ac8f27dbfcedf3503580f22edec8701259175855d070a94dae5949e
                                          • Instruction ID: 16160c2e276c352f3c1f309c8823190374f537a65216b41f74d4255c285874a8
                                          • Opcode Fuzzy Hash: 9a9f974a1ac8f27dbfcedf3503580f22edec8701259175855d070a94dae5949e
                                          • Instruction Fuzzy Hash: 3431EE72D0021ACFDF21DF94D881AAEB7B4EF48324F10811EE852B7291DB396841DBD1
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F9AD06
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F9AD29
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9AD49
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F9ADBF
                                          • std::_Facet_Register.LIBCPMT ref: 00F9ADD5
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9ADE0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast
                                          • API String ID: 2536120697-3145022300
                                          • Opcode ID: 7670a3a5397f6cef35cec9d2965eeaa8086a374e8fb4cf1c803356328af03f20
                                          • Instruction ID: 56838f75a66afaa26930a86edad834d6d0b1dd77c8f6d462859ff9b8ad90ec9f
                                          • Opcode Fuzzy Hash: 7670a3a5397f6cef35cec9d2965eeaa8086a374e8fb4cf1c803356328af03f20
                                          • Instruction Fuzzy Hash: 7C31B172D00219CFDF25DF94D881AAEB7B4EF08724F14811EE851B7A91DB396805DBD2
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F93316
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F93339
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F93359
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F933CF
                                          • std::_Facet_Register.LIBCPMT ref: 00F933E5
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F933F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast
                                          • API String ID: 2536120697-3145022300
                                          • Opcode ID: 10b8acb3cf881d53f651538a600e571a04f1cfd80af86ff9bd17c55f6949db50
                                          • Instruction ID: b0a2afc187784be8592acd2bf4cae375bf85152b5c905bd9505ec5f41cd23c96
                                          • Opcode Fuzzy Hash: 10b8acb3cf881d53f651538a600e571a04f1cfd80af86ff9bd17c55f6949db50
                                          • Instruction Fuzzy Hash: 0531AD72D00219DFDF21DFA4D881AAEB7B4EF08724F14421EE951B7291DB3AAD05DB90
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F93456
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F93479
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F93499
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F9350F
                                          • std::_Facet_Register.LIBCPMT ref: 00F93525
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F93530
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast
                                          • API String ID: 2536120697-3145022300
                                          • Opcode ID: dd284ffbcc4fc3b18ba7742e0f0288760149418626fb1ce215ae6df98bb9160a
                                          • Instruction ID: cba85faab75a7c69ce8f1ac7bc6c4383f6f057865b87c5dc532780d54f4cc21b
                                          • Opcode Fuzzy Hash: dd284ffbcc4fc3b18ba7742e0f0288760149418626fb1ce215ae6df98bb9160a
                                          • Instruction Fuzzy Hash: 3E31DFB1D002199FDF21DF98D881AEEB7B4EF08720F16411EE851B7251DB39AE05CB91
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00FA1616
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00FA1639
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00FA1659
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00FA16CF
                                          • std::_Facet_Register.LIBCPMT ref: 00FA16E5
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00FA16F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: bad cast
                                          • API String ID: 2536120697-3145022300
                                          • Opcode ID: 93e2fa53a7bd767b10504b032fb61b45a8818e182d91257d2aec3b3933148b98
                                          • Instruction ID: 8762c4c23c77656cfa6bf9fc79106c5bee2369239666f78d249349b8401cb855
                                          • Opcode Fuzzy Hash: 93e2fa53a7bd767b10504b032fb61b45a8818e182d91257d2aec3b3933148b98
                                          • Instruction Fuzzy Hash: C031DDB2D002198FCB20DF94D881AAEB7B8FF09724F19421EE851B7391DB396C05CB90
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F83015
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F83042
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F8306F
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F8309C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw
                                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                          • API String ID: 2005118841-1866435925
                                          • Opcode ID: af7c038e5dde48ec195f7fc5e82df9ab82f8f93791e6cebe47e8e03c504e8e65
                                          • Instruction ID: 560849583b1aac79628768717f00cd1f4547f302c8f4579bcac0bb6106de5cad
                                          • Opcode Fuzzy Hash: af7c038e5dde48ec195f7fc5e82df9ab82f8f93791e6cebe47e8e03c504e8e65
                                          • Instruction Fuzzy Hash: E21194B094830A6EDA00FB65CC57FEE77D4AF60B54F00481CBAC49A0D1D774A555DB1A
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Full,00000000,00020019,?), ref: 00F9448D
                                          • RegQueryValueExW.ADVAPI32(?,Release,00000000,00000000,00000000,00000004), ref: 00F944AD
                                          • RegCloseKey.ADVAPI32(?), ref: 00F944BA
                                          • RegCloseKey.ADVAPI32(?), ref: 00F944D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: O$Release$Software\Microsoft\NET Framework Setup\NDP\v4\Full
                                          • API String ID: 1607946009-934053027
                                          • Opcode ID: 63f6e8f767ecc086de8011a42c25e860784e7bcd45572ad22de7919b9535dced
                                          • Instruction ID: 5b97c6d33025e5fe1f6ccbc1209b0a4cfb718dc18f742e5c245b5c4f44c160f2
                                          • Opcode Fuzzy Hash: 63f6e8f767ecc086de8011a42c25e860784e7bcd45572ad22de7919b9535dced
                                          • Instruction Fuzzy Hash: 57118271A4020DEBEF10DFA4DC55BFEB7B8EB04305F50405AF946A6181DB7A5A04DB60
                                          APIs
                                            • Part of subcall function 00F93880: new.LIBCMT ref: 00F93896
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FA7C47
                                          • HeapFree.KERNEL32(00000000), ref: 00FA7C4E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Heap$FreeProcess
                                          • String ID: . cmd=$RunInstallerWithUAC$]: $installer$run installer with uac. path=
                                          • API String ID: 3859560861-4270199412
                                          • Opcode ID: c9fcffe856286836aacd7db1e4769eb9c6cdf44c808981d2530560f7d0505bbe
                                          • Instruction ID: e3abaa4113da3693ff856962554eb78b7b854a71ae82dbfd17fbe6d30356a389
                                          • Opcode Fuzzy Hash: c9fcffe856286836aacd7db1e4769eb9c6cdf44c808981d2530560f7d0505bbe
                                          • Instruction Fuzzy Hash: ED81BBB0E00219EBDF10EBA5C845BEEB7B5BF45710F04811DE8567B381DB786A05DB91
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr_strrchr$_strstr
                                          • String ID:
                                          • API String ID: 4240772140-0
                                          • Opcode ID: 1bd55b01a2bd08333483354c44b9a0956764d3f3f3e8ba3e6809990476a5dabe
                                          • Instruction ID: 386cb2eb300402e339b2c8a725de33c9f9697062c61cbc2d5588286398ca036b
                                          • Opcode Fuzzy Hash: 1bd55b01a2bd08333483354c44b9a0956764d3f3f3e8ba3e6809990476a5dabe
                                          • Instruction Fuzzy Hash: D15148A1D043826BEB324B34AC45B663B9B9F51364F1C4176EC888B356F775E904A361
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                          • API String ID: 48624451-3943651191
                                          • Opcode ID: a617ea45632c836ea085508775ecd65b3a2f7ff7370d1fafce1ac31d36e9a3b6
                                          • Instruction ID: 1c42cabde7be6001f75615a35df38ed1d86b578090a004120a874a119efeb48d
                                          • Opcode Fuzzy Hash: a617ea45632c836ea085508775ecd65b3a2f7ff7370d1fafce1ac31d36e9a3b6
                                          • Instruction Fuzzy Hash: 8A510871D046A49FDB21CF699C95BFB7FA89B06311F0401E6FCA0CF252D669C912DBA0
                                          APIs
                                          • GetConsoleCP.KERNEL32(?,0107E49E,E0830C40,?,?,?,?,?,?,0108D2C0,00FF30C1,0107E49E,?,0107E49E,0107E49E,00FF30C1), ref: 0108CB8D
                                          • __fassign.LIBCMT ref: 0108CC08
                                          • __fassign.LIBCMT ref: 0108CC23
                                          • WideCharToMultiByte.KERNEL32(?,00000000,0107E49E,00000001,?,00000005,00000000,00000000), ref: 0108CC49
                                          • WriteFile.KERNEL32(?,?,00000000,0108D2C0,00000000,?,?,?,?,?,?,?,?,?,0108D2C0,00FF30C1), ref: 0108CC68
                                          • WriteFile.KERNEL32(?,00FF30C1,00000001,0108D2C0,00000000,?,?,?,?,?,?,?,?,?,0108D2C0,00FF30C1), ref: 0108CCA1
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: 9e64455095c7957284b930aec11baffc319267bfa8280abc782a013381d2eea6
                                          • Instruction ID: 054615201546a09aa125d573f23f073ba336c28fc0ba4d5a55f568d880aa7726
                                          • Opcode Fuzzy Hash: 9e64455095c7957284b930aec11baffc319267bfa8280abc782a013381d2eea6
                                          • Instruction Fuzzy Hash: C451F4B0A042099FEB10DFA8D991AEEBBF8FF09310F18415AF9D5E7285D7309941CB64
                                          APIs
                                          • new.LIBCMT ref: 00FBD21B
                                          • new.LIBCMT ref: 00FBD232
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00FBD308
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00FBD30D
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FBD317
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$Xinvalid_argumentstd::_
                                          • String ID: deque<T> too long
                                          • API String ID: 2406272785-309773918
                                          • Opcode ID: e846cbc3e18287c6ac86d5b59d70cca83edac3e5219307044f1afa14793214e9
                                          • Instruction ID: 84122eb7c3b4f33788f7549f3f7dd6e447526278926fbc1491251848f15f13a6
                                          • Opcode Fuzzy Hash: e846cbc3e18287c6ac86d5b59d70cca83edac3e5219307044f1afa14793214e9
                                          • Instruction Fuzzy Hash: 5E41FC72E00206AFDB14DFA9CD80EDEF7B9EF94310F154669E854EB241E630E901DBA1
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,05CEC6CE), ref: 00FBF852
                                          • GetLastError.KERNEL32(00000003,00000001,?,?,?,?,05CEC6CE), ref: 00FBF88B
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00FBF8F7
                                          Strings
                                          • class boost::filesystem::path __cdecl ProcessHelper::GetCurrentProcessPath(void), xrefs: 00FBF928
                                          • couldn't get module file name. error=, xrefs: 00FBF898
                                          • src\process_helper.cpp, xrefs: 00FBF923
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastModuleName___std_exception_copy
                                          • String ID: class boost::filesystem::path __cdecl ProcessHelper::GetCurrentProcessPath(void)$couldn't get module file name. error=$src\process_helper.cpp
                                          • API String ID: 3319920476-2431939473
                                          • Opcode ID: 6c80089102e7f5a3627e666dd90ef9501367ef1158cc7e88366edf5a54b448e9
                                          • Instruction ID: 0c9f4ef85090e4dfef0257c2dc338100466b0c0f375d90dda11e4ed6f818ce11
                                          • Opcode Fuzzy Hash: 6c80089102e7f5a3627e666dd90ef9501367ef1158cc7e88366edf5a54b448e9
                                          • Instruction Fuzzy Hash: BB41C471D41319ABDB24EF60CC49BDEB7B8AF14704F0046AAF449A7291EB745B88CF90
                                          APIs
                                          • GetCurrentDirectoryW.KERNEL32(00000104,?,?,05CEC6CE,00000000), ref: 00FBEFE0
                                          • GetLastError.KERNEL32(00000003,00000001,?,?,?,?,05CEC6CE,00000000), ref: 00FBF019
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00FBF085
                                          Strings
                                          • couldn't get current directory. error=, xrefs: 00FBF026
                                          • src\path_helper.cpp, xrefs: 00FBF0B1
                                          • class boost::filesystem::path __cdecl PathHelper::GetCurrentDir(void), xrefs: 00FBF0B6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CurrentDirectoryErrorLast___std_exception_copy
                                          • String ID: class boost::filesystem::path __cdecl PathHelper::GetCurrentDir(void)$couldn't get current directory. error=$src\path_helper.cpp
                                          • API String ID: 898297047-775352103
                                          • Opcode ID: 3e226a149efa1737a6123ed4722c234f9ead5ac8010c5e1a5fb5470c4b82f26e
                                          • Instruction ID: ecf71b84711d22c2c4bab42108690ffd0478f25fe833b91af6d82120ab2a5c7e
                                          • Opcode Fuzzy Hash: 3e226a149efa1737a6123ed4722c234f9ead5ac8010c5e1a5fb5470c4b82f26e
                                          • Instruction Fuzzy Hash: 0441C471D402199ADB24EF60CC49BDEB7B8AF14704F0046AAF449A7291EB755A88CF90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s, %02d %s %4d %02d:%02d:%02d GMT$If-Modified-Since: %s$If-Unmodified-Since: %s$Invalid TIMEVALUE$Last-Modified: %s
                                          • API String ID: 0-2575227759
                                          • Opcode ID: bb46e03972450e94ca6cd7e9ea7033f4d499ecf4c753adbc9574ac2996c26a41
                                          • Instruction ID: 70b3dba9571d28518fe59488c6bace709934a6c5fc38217dcd95a1a5f5739174
                                          • Opcode Fuzzy Hash: bb46e03972450e94ca6cd7e9ea7033f4d499ecf4c753adbc9574ac2996c26a41
                                          • Instruction Fuzzy Hash: 0231B832F0010EBBCB01EAA8ED91AEDB7B6FB18360F140126F949A7341D7365D14E790
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2feac6c6fc1cf6145e83ab7640093162738152626775a0450571e4420181b3e1
                                          • Instruction ID: 8d6578886c0dd1c8236318b99ff9d50766c4e989b0fd8614b451ec358a1fda50
                                          • Opcode Fuzzy Hash: 2feac6c6fc1cf6145e83ab7640093162738152626775a0450571e4420181b3e1
                                          • Instruction Fuzzy Hash: 9A110332918216BBDF21AFBA9D54DAF3AACEF81770B004254F8D1D7240DE3588029770
                                          APIs
                                            • Part of subcall function 0109806E: _free.LIBCMT ref: 01098097
                                          • _free.LIBCMT ref: 01098375
                                            • Part of subcall function 010872F5: RtlFreeHeap.NTDLL(00000000,00000000,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?), ref: 0108730B
                                            • Part of subcall function 010872F5: GetLastError.KERNEL32(?,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?,?), ref: 0108731D
                                          • _free.LIBCMT ref: 01098380
                                          • _free.LIBCMT ref: 0109838B
                                          • _free.LIBCMT ref: 010983DF
                                          • _free.LIBCMT ref: 010983EA
                                          • _free.LIBCMT ref: 010983F5
                                          • _free.LIBCMT ref: 01098400
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: c7c186f875e9bf851825eba51c2093702d337b9ba73b7df1bcccc61af93c6a46
                                          • Instruction ID: 8d66d90b7462ac860d0dcdcc646b264ff31acc48ea1c639bccf790f9a9e7cd93
                                          • Opcode Fuzzy Hash: c7c186f875e9bf851825eba51c2093702d337b9ba73b7df1bcccc61af93c6a46
                                          • Instruction Fuzzy Hash: 5D117C31540B0AAEDA70FBB0CC05FCB7BACAF52700F508916B2D9A6290EEA4F5149751
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FD3A66
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FD3A81
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FD3A96
                                          Strings
                                          • The requested URL returned error: %s, xrefs: 00FD3AA5
                                          • HTTP, xrefs: 00FD3A51
                                          • The requested URL returned error: %d, xrefs: 00FD3AC6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: HTTP$The requested URL returned error: %d$The requested URL returned error: %s
                                          • API String ID: 601868998-4174864708
                                          • Opcode ID: 8e5d2e14e52e459e7d47aae2d15cd7120ac08f1f509297865bfdbb2cdc27f180
                                          • Instruction ID: 248952c616a8c688141ac8e086b291c718bed6bad157cce4658e42d36b2bc38d
                                          • Opcode Fuzzy Hash: 8e5d2e14e52e459e7d47aae2d15cd7120ac08f1f509297865bfdbb2cdc27f180
                                          • Instruction Fuzzy Hash: F101442AB4036132D71176646C02BCE7F984F92231F0C4076FECC9A302E669AA4583F7
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\NET Framework Setup\NDP\v4\Full,00000000,00020019,?), ref: 00F943DD
                                          • RegQueryValueExW.ADVAPI32(?,Release,00000000,00000000,00000000,00000004), ref: 00F943FD
                                          • RegCloseKey.ADVAPI32(?), ref: 00F9440A
                                          • RegCloseKey.ADVAPI32(?), ref: 00F94421
                                          Strings
                                          • Release, xrefs: 00F943F5
                                          • Software\Microsoft\NET Framework Setup\NDP\v4\Full, xrefs: 00F943C3
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Release$Software\Microsoft\NET Framework Setup\NDP\v4\Full
                                          • API String ID: 1607946009-1522824743
                                          • Opcode ID: c2522852b528338ae3d0ec150c3b269a6fd95d6be3ae4006d1d8350a45183965
                                          • Instruction ID: 946ca3c57006e25659042b9eb40dc6d675cba50e89e06fe3c3b54666f0d63d5f
                                          • Opcode Fuzzy Hash: c2522852b528338ae3d0ec150c3b269a6fd95d6be3ae4006d1d8350a45183965
                                          • Instruction Fuzzy Hash: 36118271A4020DEFEF10DFA4DC95BEEB7B8EB04305F50405AF946A6180DB765A08DB60
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0107B8BC,0107B8BC,?,?,?,01090472,00000001,00000001,30E85006), ref: 0109027B
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,01090472,00000001,00000001,30E85006,?,?,?), ref: 01090301
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,30E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 010903FB
                                          • __freea.LIBCMT ref: 01090408
                                            • Part of subcall function 01086524: RtlAllocateHeap.NTDLL(00000000,00000003,00000000,?,00000003,01090083), ref: 01086556
                                          • __freea.LIBCMT ref: 01090411
                                          • __freea.LIBCMT ref: 01090436
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                          • String ID:
                                          • API String ID: 1414292761-0
                                          • Opcode ID: 90ad7d5c07fe223cc3d1ad5dd274b3dbc5462fa180696eb2d285098acf73e7c5
                                          • Instruction ID: be3116e5a66aeff027722bf28ea8ab01e8bdfe90aeceededadf2fe681fbab852
                                          • Opcode Fuzzy Hash: 90ad7d5c07fe223cc3d1ad5dd274b3dbc5462fa180696eb2d285098acf73e7c5
                                          • Instruction Fuzzy Hash: AB51E5B2610216ABEF258E68CC50EBF7BEDEF40650F1546A9FE84E6148DB34DC90D660
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: __cftoe
                                          • String ID:
                                          • API String ID: 4189289331-0
                                          • Opcode ID: 6536a987134b8aba64de10f8bbd34f3d449b3ab9b543f347dd0f3d45a16746e6
                                          • Instruction ID: 6017a77e55a160e25e8b81f9042dcd29e954b85d111d4d6a12fa0eff4728b7ec
                                          • Opcode Fuzzy Hash: 6536a987134b8aba64de10f8bbd34f3d449b3ab9b543f347dd0f3d45a16746e6
                                          • Instruction Fuzzy Hash: 1C512932908206ABEB75BF6DCC45EEE7BF8EF48320F10425AF9D4961C1EB31D5018A64
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F931CD
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F931ED
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F9320D
                                          • new.LIBCMT ref: 00F93256
                                          • std::_Facet_Register.LIBCPMT ref: 00F932B2
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00F932BD
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                          • String ID:
                                          • API String ID: 459529453-0
                                          • Opcode ID: a3bdae011c705e81faf4ec6ab69c71cb56d2ce802e5c66569c459b2749bc2f3b
                                          • Instruction ID: 94672d9642447e3d194f49044df60d205e1713d545e7463a7e4147bcabdaf12f
                                          • Opcode Fuzzy Hash: a3bdae011c705e81faf4ec6ab69c71cb56d2ce802e5c66569c459b2749bc2f3b
                                          • Instruction Fuzzy Hash: C041EF72A00208CBDF24DF84C881BAEB7B4EF04724F14406EE846AB341DB39AE45DBD1
                                          APIs
                                          • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000004,?,?,00000000), ref: 00FEBAAB
                                          • VerSetConditionMask.KERNEL32(00000000,?,00000001,00000004), ref: 00FEBAB2
                                          • VerSetConditionMask.KERNEL32(00000000,?,00000020,00000005,?,00000001,00000004), ref: 00FEBABF
                                          • VerSetConditionMask.KERNEL32(00000000,?,00000010,00000005,?,00000020,00000005,?,00000001,00000004), ref: 00FEBAC6
                                          • VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,00000005,?,00000020,00000005,?,00000001,00000004), ref: 00FEBAD2
                                          • VerifyVersionInfoA.KERNEL32(0000009C,00000033,00000000), ref: 00FEBADF
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ConditionMask$InfoVerifyVersion
                                          • String ID:
                                          • API String ID: 2793162063-0
                                          • Opcode ID: 3446e9a474dc63b8da387c3ef4b245ce6f3e54352fba7e02fc504ca6cd22af7d
                                          • Instruction ID: 224a4ba0b24d5cf61913bd3d433d81eb2ff4ac1d63a2bb961445cfa1b3fe26a2
                                          • Opcode Fuzzy Hash: 3446e9a474dc63b8da387c3ef4b245ce6f3e54352fba7e02fc504ca6cd22af7d
                                          • Instruction Fuzzy Hash: F4317570B04358EEEF20CA25CC45FAF7BB8EB46704F4400D9F58D67281C6B55E449B22
                                          APIs
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA22EA
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA22FE
                                          • __allrem.LIBCMT ref: 00FA2309
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA231D
                                          • __allrem.LIBCMT ref: 00FA2328
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA233D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$__allrem
                                          • String ID:
                                          • API String ID: 632788072-0
                                          • Opcode ID: ec57bf6a0eb131a96af06d472c3d3006e996052973ab624af99d2562a55864f8
                                          • Instruction ID: fee9af566925e2d18361c1d1ecdd36f5cec064b969d87a8d0e27cb10e9a7bf68
                                          • Opcode Fuzzy Hash: ec57bf6a0eb131a96af06d472c3d3006e996052973ab624af99d2562a55864f8
                                          • Instruction Fuzzy Hash: 2301D8B52402057EFB116F648C02F73BB69EF54710F204165BB04AA1D1DBA2F92097D8
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 01002534
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0100253E
                                            • Part of subcall function 00F827E0: std::_Lockit::_Lockit.LIBCPMT ref: 00F827FD
                                            • Part of subcall function 00F827E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F82819
                                          • collate.LIBCPMT ref: 01002578
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 01002595
                                          • std::_Facet_Register.LIBCPMT ref: 010025B4
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 010025BD
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_H_prolog3RegisterThrowcollate
                                          • String ID:
                                          • API String ID: 2363045490-0
                                          • Opcode ID: 465f7b21093711aa95bfa66b536dca20fc9e8b81e1b8041ebf737d9e21026140
                                          • Instruction ID: e573c4c780932cdb6aceb89f1ecb2a0e758d34c9db2c01f8df1c5d5e95741c19
                                          • Opcode Fuzzy Hash: 465f7b21093711aa95bfa66b536dca20fc9e8b81e1b8041ebf737d9e21026140
                                          • Instruction Fuzzy Hash: CC01ED76D0052A8BDF02FBA0CC65AFEB3B6BF54720F100009E5416B2D1DF38AA0097A6
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 010025D1
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 010025DB
                                            • Part of subcall function 00F827E0: std::_Lockit::_Lockit.LIBCPMT ref: 00F827FD
                                            • Part of subcall function 00F827E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F82819
                                          • messages.LIBCPMT ref: 01002615
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 01002632
                                          • std::_Facet_Register.LIBCPMT ref: 01002651
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0100265A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_H_prolog3RegisterThrowmessages
                                          • String ID:
                                          • API String ID: 438560357-0
                                          • Opcode ID: cab30d95a8a1e8a183123f927612f27a848232925b70b09b0ec9e8cff41517df
                                          • Instruction ID: cb103dd27c4013e75f4303eb49da238956c3c84b5bae26123ab49a8f44ace009
                                          • Opcode Fuzzy Hash: cab30d95a8a1e8a183123f927612f27a848232925b70b09b0ec9e8cff41517df
                                          • Instruction Fuzzy Hash: F301C075D006299BDF03FBA4CC55AFEB3B5BF94720F14040AE6906B2D1DF38AA41A791
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 010027A8
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 010027B2
                                            • Part of subcall function 00F827E0: std::_Lockit::_Lockit.LIBCPMT ref: 00F827FD
                                            • Part of subcall function 00F827E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F82819
                                          • moneypunct.LIBCPMT ref: 010027EC
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 01002809
                                          • std::_Facet_Register.LIBCPMT ref: 01002828
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 01002831
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_H_prolog3RegisterThrowmoneypunct
                                          • String ID:
                                          • API String ID: 113178234-0
                                          • Opcode ID: 5326eeb0f39ab343e7b10193e5e9f02c4587020ef8e4cd7c1d49abe633834d12
                                          • Instruction ID: c8c2ef0bd6880c4b7f1e02da4a693fe868695abcad6295930928b259f92b0bf5
                                          • Opcode Fuzzy Hash: 5326eeb0f39ab343e7b10193e5e9f02c4587020ef8e4cd7c1d49abe633834d12
                                          • Instruction Fuzzy Hash: F301AD7990011E9BDF06FBA4CC55AFEB3B5BF48760F14040AE550AB2D0DF38AA05DB95
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 01002845
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0100284F
                                            • Part of subcall function 00F827E0: std::_Lockit::_Lockit.LIBCPMT ref: 00F827FD
                                            • Part of subcall function 00F827E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F82819
                                          • moneypunct.LIBCPMT ref: 01002889
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 010028A6
                                          • std::_Facet_Register.LIBCPMT ref: 010028C5
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 010028CE
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_H_prolog3RegisterThrowmoneypunct
                                          • String ID:
                                          • API String ID: 113178234-0
                                          • Opcode ID: e2d0e1b05039fd7fb7eb1f9ab3302d38c56f62cffde376a28cef0b546fafe204
                                          • Instruction ID: ee3eeb002c0f2794801689b1883753bd1e2a4df18c29c0ccf92a98835a762425
                                          • Opcode Fuzzy Hash: e2d0e1b05039fd7fb7eb1f9ab3302d38c56f62cffde376a28cef0b546fafe204
                                          • Instruction Fuzzy Hash: 2C01ED39D0111A8BDF02FBA0CC16AFDB3B5BF54720F10040AF5806B2D0DF38AA019BA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: 910a8eca23123c80e1f848b4b15c0c799efc5558cf0fefc3e4cc056f6b7f17f8
                                          • Instruction ID: 8bea52d9ce3aabe2a56f0de7921ec76d384cfc86621a2bb6fdf744122306c5e6
                                          • Opcode Fuzzy Hash: 910a8eca23123c80e1f848b4b15c0c799efc5558cf0fefc3e4cc056f6b7f17f8
                                          • Instruction Fuzzy Hash: E4F0C83550860266DB72727D6C19BBF36BE9FD17B1F210128F5DC9218DEE2688425620
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ../$/..$/../$/./
                                          • API String ID: 0-456519384
                                          • Opcode ID: be3ed873188e9124b5f108261b7549844ec1b66c4acb64380bf37af9bf42794e
                                          • Instruction ID: 2096c906f7445fea7bb8c037723b501800a9a824a3e13c538d58a15935944faa
                                          • Opcode Fuzzy Hash: be3ed873188e9124b5f108261b7549844ec1b66c4acb64380bf37af9bf42794e
                                          • Instruction Fuzzy Hash: 39712666E081C65ADB220E3A5C957B7BF979FE2364F1C04E9DCC587642E3238C09A352
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: deque<T> too long$list<T> too long
                                          • API String ID: 0-27806271
                                          • Opcode ID: 985cd4361d3d7eef8003b1a8f8d93b940b4e3962e614023d66a09237fd014e5b
                                          • Instruction ID: 4d3bef209a50d95f85ba2ba833c0382b824f0bb8b711bb4b60094c4ea61d2ad1
                                          • Opcode Fuzzy Hash: 985cd4361d3d7eef8003b1a8f8d93b940b4e3962e614023d66a09237fd014e5b
                                          • Instruction Fuzzy Hash: 08516975600316AFD704DF28C994EAABBE9FF88704F14892DF9898B340D634ED05CBA1
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FCAA6A
                                          Strings
                                          • No valid port number in connect to host string (%s), xrefs: 00FCAAAE
                                          • Please URL encode %% as %%25, see RFC 6874., xrefs: 00FCA9FA
                                          • Invalid IPv6 address format, xrefs: 00FCAA57
                                          • %25, xrefs: 00FCA9E9
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                          • API String ID: 601868998-2404041592
                                          • Opcode ID: 7724df7619f8e8ad4289dd8cd099bfeb9e7220de632ec689f33f5e60c66fe01d
                                          • Instruction ID: 7812a44e39b591aa860f0ca2d902cbc76d63251c58fcf72b606a6a5040e6d1d5
                                          • Opcode Fuzzy Hash: 7724df7619f8e8ad4289dd8cd099bfeb9e7220de632ec689f33f5e60c66fe01d
                                          • Instruction Fuzzy Hash: 6751F9B0D0424BABDB315E68AE43FA67B959F12338F14006DFCC986142E239ED51E753
                                          Strings
                                          • Read callback asked for PAUSE when not supported!, xrefs: 00FD424F
                                          • operation aborted by callback, xrefs: 00FD420B
                                          • read function returned funny value, xrefs: 00FD42AD
                                          • %x%s, xrefs: 00FD430A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %x%s$Read callback asked for PAUSE when not supported!$operation aborted by callback$read function returned funny value
                                          • API String ID: 48624451-1291304620
                                          • Opcode ID: ed675b62c9af46b50fb8da564bb629680b335c9d30684d38ce178f9920b5b8a2
                                          • Instruction ID: b699ccd09b74ba962e962137f45cc6c79c96a5641d422711a55a3c0b950addac
                                          • Opcode Fuzzy Hash: ed675b62c9af46b50fb8da564bb629680b335c9d30684d38ce178f9920b5b8a2
                                          • Instruction Fuzzy Hash: AF512931B002099FDB20DF68D885BEEB7E5EF55320F0405AEE89997281DB796D44DB90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Getcvt$Concurrency::cancel_current_task
                                          • String ID: false$true
                                          • API String ID: 1267538876-2658103896
                                          • Opcode ID: c8f558bb9c201063fa67684a55dfe495c548f443bc0b8a05d236d1d837cfa5e9
                                          • Instruction ID: 418a894ade2a82d3c2e7641a5757dfccfed0832c4b8fb3073ff27aa15fa44c73
                                          • Opcode Fuzzy Hash: c8f558bb9c201063fa67684a55dfe495c548f443bc0b8a05d236d1d837cfa5e9
                                          • Instruction Fuzzy Hash: 6E51B6B1D002499FDF00DFA4C841BFEBBB8FF49714F14825AE845AB241E7759A45CBA1
                                          APIs
                                          • ___std_type_info_name.LIBVCRUNTIME ref: 00FB460A
                                          Strings
                                          • " failed, xrefs: 00FB4620
                                          • conversion of data to type ", xrefs: 00FB45DA
                                          • class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> > __thiscall boost::property_tree::string_path<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct boost::property_tree::id_transla, xrefs: 00FB4521
                                          • class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> > __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std, xrefs: 00FB464D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_type_info_name
                                          • String ID: " failed$class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> > __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std$class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> > __thiscall boost::property_tree::string_path<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct boost::property_tree::id_transla$conversion of data to type "
                                          • API String ID: 1734802720-1946069150
                                          • Opcode ID: 0598ecea0f42e71c95539c5a92ea608392ef0175e7f11e89298ba2eb42b893f1
                                          • Instruction ID: a635043fbb639ed4f7c829aa74eef4c8a74eecabfe22a178ca21b99381bd71b8
                                          • Opcode Fuzzy Hash: 0598ecea0f42e71c95539c5a92ea608392ef0175e7f11e89298ba2eb42b893f1
                                          • Instruction Fuzzy Hash: 7841EF70904248ABEF15EFA5CC05BDEBBB8EF05310F14415DE491B72C2DB786A08DB61
                                          APIs
                                          • GetModuleHandleA.KERNEL32(KERNEL32.DLL,GetTickCount64,00000000,05CEC6CE,7622DF60,010A48B4), ref: 01009830
                                          • GetProcAddress.KERNEL32(00000000), ref: 01009837
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: GetTickCount64$KERNEL32.DLL
                                          • API String ID: 1646373207-3320051239
                                          • Opcode ID: 3749ba52434213230b0ab095aa8774eea4afba86af2f3097020730b676ce9d7c
                                          • Instruction ID: d752f425a158666e454562b1bd3a99ef45e3375ac8f0a3778beec5bd4f36466b
                                          • Opcode Fuzzy Hash: 3749ba52434213230b0ab095aa8774eea4afba86af2f3097020730b676ce9d7c
                                          • Instruction Fuzzy Hash: CA31E531A047018FE726DB2CC880B9A7BD1EFD4324F188A6EF1EA872D2D771D9448791
                                          APIs
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00FAD87C
                                            • Part of subcall function 00FAF1D0: __CxxThrowException@8.LIBVCRUNTIME ref: 00FAF224
                                            • Part of subcall function 00F95930: CloseHandle.KERNEL32(00000000,05CEC6CE), ref: 00F95985
                                            • Part of subcall function 00F95930: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,05CEC6CE,?,?,?,05CEC6CE,?,0100943D,05CEC6CE), ref: 00F95997
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00FAD8E7
                                          • GetCurrentThreadId.KERNEL32 ref: 00FAD922
                                            • Part of subcall function 0100AD40: __Init_thread_footer.LIBCMT ref: 0100ADA3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_exception_copy$CloseCurrentException@8HandleInit_thread_footerObjectSingleThreadThrowWait
                                          • String ID: $$boost unique_lock owns already the mutex
                                          • API String ID: 169746467-1517442662
                                          • Opcode ID: 9a4470e595cabb04609e5fcd727f8581b63968da8402e8aa725e862f0aab1bba
                                          • Instruction ID: 36bb7b70aefdf5b070f36d007251ef7b2022efeb745af5c2370a4734766f7450
                                          • Opcode Fuzzy Hash: 9a4470e595cabb04609e5fcd727f8581b63968da8402e8aa725e862f0aab1bba
                                          • Instruction Fuzzy Hash: 9E415BB1D00349DFDB21DFA4C8847DEBBF8AF19714F20422EE8556B641D7796948CBA0
                                          APIs
                                          • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 00FCEF14
                                          • WSAIoctl.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000), ref: 00FCEF8D
                                          • WSAGetLastError.WS2_32 ref: 00FCEF97
                                          Strings
                                          • Failed to set SIO_KEEPALIVE_VALS on fd %d: %d, xrefs: 00FCEF9F
                                          • Failed to set SO_KEEPALIVE on fd %d, xrefs: 00FCEF1F
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorIoctlLastsetsockopt
                                          • String ID: Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
                                          • API String ID: 1819429192-277924715
                                          • Opcode ID: 3b5666d29635fc78b695a9bd25adc0591d36734ba6c5770c38e8c15e3b7d4551
                                          • Instruction ID: 82171c8e1af8c7b661c3eefc39f9b49241464183b50c17bc7b18c8bce6ee9c9e
                                          • Opcode Fuzzy Hash: 3b5666d29635fc78b695a9bd25adc0591d36734ba6c5770c38e8c15e3b7d4551
                                          • Instruction Fuzzy Hash: F321A171A40209ABEB10DF64DC42FEF77B8EB44701F10406EF945EA1C1DA756A0497A1
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00F825E7
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00F82653
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00F8266B
                                            • Part of subcall function 01071273: KiUserExceptionDispatcher.NTDLL(?,?,?,0100BF47,?,?,?,?,?,?,?,?,0100BF47,?,010E0200), ref: 010712D2
                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F82672
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$DispatcherExceptionException@8Locinfo::_Locinfo_ctorLockitLockit::_ThrowUser___std_exception_copy
                                          • String ID: bad locale name
                                          • API String ID: 2355598456-1405518554
                                          • Opcode ID: 5c03c8ceb1a75c3f7904e2ab95a8c62017310d3b95a715d33d1cb129d54133d2
                                          • Instruction ID: ee4ac397a3fafa8a6637a07fd6e73498ca14acf95bc32c52dc054e5426a0ac72
                                          • Opcode Fuzzy Hash: 5c03c8ceb1a75c3f7904e2ab95a8c62017310d3b95a715d33d1cb129d54133d2
                                          • Instruction Fuzzy Hash: D8218DB1804748DECB20DFA9C945BDFBBF8EF19710F10461EE485A7640E775A608CBA5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: Data$Header$[%s %s %s]$from
                                          • API String ID: 48624451-3178933089
                                          • Opcode ID: a72ed7f358f49b2315a063cea54f5d2622a1ddc2eedc132953db7a30e1d617f6
                                          • Instruction ID: 2e96839cc68c980cfadb84f2fca00633fadc9fa41218db4a00a9e1f3f08ca7dd
                                          • Opcode Fuzzy Hash: a72ed7f358f49b2315a063cea54f5d2622a1ddc2eedc132953db7a30e1d617f6
                                          • Instruction Fuzzy Hash: 6D112735E00349ABDB14EE19DD52FFEB368EF81350F4401ADF94587242D771AE019792
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _wcsrchr
                                          • String ID: .bat$.cmd$.com$.exe
                                          • API String ID: 1752292252-4019086052
                                          • Opcode ID: ced8c7b6dda36a58ae26a2a84af4288a74d95f0e0b0ff086f00a19de34867773
                                          • Instruction ID: 91befcb0862d4ecca01113edcedf1b88eda794c086f69e50bc8776d450cb03c2
                                          • Opcode Fuzzy Hash: ced8c7b6dda36a58ae26a2a84af4288a74d95f0e0b0ff086f00a19de34867773
                                          • Instruction Fuzzy Hash: F5F0F63614DB17A5FF143519BC12AEA37C8AF62D70B24409EE6C89A0D2EF61E0435194
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,01089737,00000003,?,010896D7,00000003,010ED518,0000000C,0108982E,00000003,00000002), ref: 010897A6
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 010897B9
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,01089737,00000003,?,010896D7,00000003,010ED518,0000000C,0108982E,00000003,00000002,00000000), ref: 010897DC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 6870cca51faa5e9acae7fcfc1d450c6d1ab853022e4794dd8d8b69494571c9c2
                                          • Instruction ID: f8229a9aa919a00008c13c6cf80131f7e347f6a1d290325b8a8c7212db41a7a7
                                          • Opcode Fuzzy Hash: 6870cca51faa5e9acae7fcfc1d450c6d1ab853022e4794dd8d8b69494571c9c2
                                          • Instruction Fuzzy Hash: 21F0C830601209BBDB25BF55DC89BEFBFF9EF44B15F4040A8F985A2544DB354A40CB50
                                          APIs
                                          • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 0107064D
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0107065D
                                            • Part of subcall function 01071273: KiUserExceptionDispatcher.NTDLL(?,?,?,0100BF47,?,?,?,?,?,?,?,?,0100BF47,?,010E0200), ref: 010712D2
                                          • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 01070688
                                          Strings
                                          • Bad read pointer - no RTTI data!, xrefs: 0107067F
                                          • Attempted a typeid of nullptr pointer!, xrefs: 01070644
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::__non_rtti_object::__construct_from_string_literal$DispatcherExceptionException@8ThrowUser
                                          • String ID: Attempted a typeid of nullptr pointer!$Bad read pointer - no RTTI data!
                                          • API String ID: 2590406442-4195314292
                                          • Opcode ID: 4e01e2ac0c193c593b42574196c7a042f4318a479c1589b0d2c919c1fb4612b6
                                          • Instruction ID: 40e8b7fcd41c9fa527b006cdfdbc7cd287290145128bb0599226f196e574e721
                                          • Opcode Fuzzy Hash: 4e01e2ac0c193c593b42574196c7a042f4318a479c1589b0d2c919c1fb4612b6
                                          • Instruction Fuzzy Hash: 0CF09071A00309AEEB00DBE6C959ECD73E8AB09610F204199F180AB180DB71EA008728
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa4b48f6035430eb4e56cc6197692db394ee0b03841668973f140387b3f642e6
                                          • Instruction ID: 83c32e32f1f07c7b76eb5d0ffe5aba95a08c4c6f7a1d1609f79239587cc36eed
                                          • Opcode Fuzzy Hash: aa4b48f6035430eb4e56cc6197692db394ee0b03841668973f140387b3f642e6
                                          • Instruction Fuzzy Hash: 7371C0319042569BDF218F98CAA4ABFBBB5FF45320F1442A9E9D1E7281D7708943D7A0
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0101E8CE
                                            • Part of subcall function 01071273: KiUserExceptionDispatcher.NTDLL(?,?,?,0100BF47,?,?,?,?,?,?,?,?,0100BF47,?,010E0200), ref: 010712D2
                                            • Part of subcall function 0101C770: ___std_exception_copy.LIBVCRUNTIME ref: 0101C797
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0101E92E
                                            • Part of subcall function 0101C7E0: ___std_exception_copy.LIBVCRUNTIME ref: 0101C807
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0101E98E
                                            • Part of subcall function 0101C850: ___std_exception_copy.LIBVCRUNTIME ref: 0101C877
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0101E9EE
                                            • Part of subcall function 0101C8E0: ___std_exception_copy.LIBVCRUNTIME ref: 0101C907
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0101EA4E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$___std_exception_copy$DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 2581116207-0
                                          • Opcode ID: 490ea87df8b4250310346d58fef055eafd348a69c39c8cf20c85ace9c765ea68
                                          • Instruction ID: dfcbea8a77a8f56b34f44ca55a5682479420099e4264aa908613c7d3099e16c0
                                          • Opcode Fuzzy Hash: 490ea87df8b4250310346d58fef055eafd348a69c39c8cf20c85ace9c765ea68
                                          • Instruction Fuzzy Hash: B9412AB5D4024DBBCB01EBE5CD45FCEBBBCEB04614F408A25F950E7684E779A2088B64
                                          APIs
                                            • Part of subcall function 01086524: RtlAllocateHeap.NTDLL(00000000,00000003,00000000,?,00000003,01090083), ref: 01086556
                                          • _free.LIBCMT ref: 0108B1B6
                                          • _free.LIBCMT ref: 0108B1CD
                                          • _free.LIBCMT ref: 0108B1EC
                                          • _free.LIBCMT ref: 0108B207
                                          • _free.LIBCMT ref: 0108B21E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$AllocateHeap
                                          • String ID:
                                          • API String ID: 3033488037-0
                                          • Opcode ID: 02ff6710f2e332ee6acd4f07ba94e9c1a514f4bec3c9ab8277a0e95a94cee803
                                          • Instruction ID: c73122d4ef1c5a36ae973372f029c2bd731e2d69aa209e79274bdd5110558c4b
                                          • Opcode Fuzzy Hash: 02ff6710f2e332ee6acd4f07ba94e9c1a514f4bec3c9ab8277a0e95a94cee803
                                          • Instruction Fuzzy Hash: 5A51B071A04605AFDB21EF69D841BAABBF4EF48720F1406ADE9C9DB650E731D901CB40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 6736c26bc2cae9fa3c5a2c8360ee8bfb3a7dc89175e13622104372674ed3300f
                                          • Instruction ID: b84c262dcbe532e2d59877838f273c114ccfce0db1cedffef50d7998123c01ac
                                          • Opcode Fuzzy Hash: 6736c26bc2cae9fa3c5a2c8360ee8bfb3a7dc89175e13622104372674ed3300f
                                          • Instruction Fuzzy Hash: 7141A632B04210DFDB25EFBCC880A5DB7F5EF88714F15859AE595EB785DA31A901CB40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eaad4eb22c64e0f0c2d51649a5108a8aa622e0cc0be837775b34097788093e0f
                                          • Instruction ID: d444c8f8eab0278eaa17b5efe7c9d4cafafe8136a84f7b42b63def7353920e9c
                                          • Opcode Fuzzy Hash: eaad4eb22c64e0f0c2d51649a5108a8aa622e0cc0be837775b34097788093e0f
                                          • Instruction Fuzzy Hash: AD215B71A006059BE716FB68C800BAEB3D9EF10764F14862FF996C7285EB3DDA01C791
                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,0107DA2C,01085FA2,?,0109002E,00000001,00000364,?,01084C15,010ED438,00000010), ref: 01090089
                                          • _free.LIBCMT ref: 010900BE
                                          • _free.LIBCMT ref: 010900E5
                                          • SetLastError.KERNEL32(00000000), ref: 010900F2
                                          • SetLastError.KERNEL32(00000000), ref: 010900FB
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: acc71050e9ba6327dafb65fd62381a4b74045baec859019890d0b334ace9fd68
                                          • Instruction ID: 362b484aeb2fd4aee5a1b688ab88b58f2bf9a0f959a6706fe005c0b913005f42
                                          • Opcode Fuzzy Hash: acc71050e9ba6327dafb65fd62381a4b74045baec859019890d0b334ace9fd68
                                          • Instruction Fuzzy Hash: F6012D366497036B9F32757D5C94AAF35BDABD17B0F200128F5C9A218DEF7584016270
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 0100270B
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 01002715
                                            • Part of subcall function 00F827E0: std::_Lockit::_Lockit.LIBCPMT ref: 00F827FD
                                            • Part of subcall function 00F827E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F82819
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0100276C
                                          • std::_Facet_Register.LIBCPMT ref: 0100278B
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 01002794
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_H_prolog3RegisterThrow
                                          • String ID:
                                          • API String ID: 651022567-0
                                          • Opcode ID: 8a0fd3d3c6065b8debdae838e23ef52ae7b596d7014cb52c5be69b8aa165e432
                                          • Instruction ID: 9615281054e8a2c0a55ef36e8e51d9132de54d876bdc9be1fdb86a82cb82c5ad
                                          • Opcode Fuzzy Hash: 8a0fd3d3c6065b8debdae838e23ef52ae7b596d7014cb52c5be69b8aa165e432
                                          • Instruction Fuzzy Hash: AE01C475D0021A9BDF42FBA4CC55AFDB3B5BF44750F54040AE5946B2D1DF38AA00D791
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 0100266E
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 01002678
                                            • Part of subcall function 00F827E0: std::_Lockit::_Lockit.LIBCPMT ref: 00F827FD
                                            • Part of subcall function 00F827E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F82819
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 010026CF
                                          • std::_Facet_Register.LIBCPMT ref: 010026EE
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 010026F7
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_H_prolog3RegisterThrow
                                          • String ID:
                                          • API String ID: 651022567-0
                                          • Opcode ID: 8eec6af0cac1ac74e8cd91231ea0e945204fba729271db04a6ed88e6974dc16c
                                          • Instruction ID: 67799236f1f22f7ff858ff2db128c4e33b41d2d1fd7c6ecad21f209354c8674e
                                          • Opcode Fuzzy Hash: 8eec6af0cac1ac74e8cd91231ea0e945204fba729271db04a6ed88e6974dc16c
                                          • Instruction Fuzzy Hash: FF010475D005198BDF06FBA0CC45AFEB3B1BF54720F10040AE6506B2D1DF38AA019B91
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 010028E2
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 010028EC
                                            • Part of subcall function 00F827E0: std::_Lockit::_Lockit.LIBCPMT ref: 00F827FD
                                            • Part of subcall function 00F827E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F82819
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 01002943
                                          • std::_Facet_Register.LIBCPMT ref: 01002962
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0100296B
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_H_prolog3RegisterThrow
                                          • String ID:
                                          • API String ID: 651022567-0
                                          • Opcode ID: d613d32cb0d7cd0c5c1b7a64d33e23183887774eceecdef8875bc2a3b74e2582
                                          • Instruction ID: 4dcf84d69dba92b5f072d4b9c654273897451210df8df1958f0ab46f3e652d91
                                          • Opcode Fuzzy Hash: d613d32cb0d7cd0c5c1b7a64d33e23183887774eceecdef8875bc2a3b74e2582
                                          • Instruction Fuzzy Hash: 26010036D0011A8BDF02FBA0CC49AFDB3B1BF44760F10080AE6806B2D1DF38AA01DB91
                                          APIs
                                          • _free.LIBCMT ref: 01097E01
                                            • Part of subcall function 010872F5: RtlFreeHeap.NTDLL(00000000,00000000,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?), ref: 0108730B
                                            • Part of subcall function 010872F5: GetLastError.KERNEL32(?,?,0109809C,?,00000000,?,00000000,?,01098340,?,00000007,?,?,01098729,?,?), ref: 0108731D
                                          • _free.LIBCMT ref: 01097E13
                                          • _free.LIBCMT ref: 01097E25
                                          • _free.LIBCMT ref: 01097E37
                                          • _free.LIBCMT ref: 01097E49
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 275d130d9d812db59f9c3fb03c978fe929a93d2ac63b878a3f2a9f3e024326f8
                                          • Instruction ID: 9eda9ff38f0b2d6c4685d082ba61c60c8344eda00b545db64fa0a33d540fd30c
                                          • Opcode Fuzzy Hash: 275d130d9d812db59f9c3fb03c978fe929a93d2ac63b878a3f2a9f3e024326f8
                                          • Instruction Fuzzy Hash: C9F0EC33918201AB9AB0EB6DE492D6A7BFAFB547107644889F1C8D7909CE35FC809E54
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8E76D
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8E777
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: d00cab2b0e2ca8f3ab83b5f5ece1ddd90774e2350fb76affd52ba75d1f4d46b6
                                          • Instruction ID: 57800f4664f7be5cd2097f7fce25e65c8e3e08cdbe434741774d07b773b82fbb
                                          • Opcode Fuzzy Hash: d00cab2b0e2ca8f3ab83b5f5ece1ddd90774e2350fb76affd52ba75d1f4d46b6
                                          • Instruction Fuzzy Hash: 1DE13D71B0020ADFCB24EF58D9C09DEB3BAFF987447204569E855CB215E730EA55EBA0
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F999F7
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F99A01
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: 1e21ace09cd299847205d3b351f0117c42a3b5e990d136c0887fa9d04c010678
                                          • Instruction ID: 42d78f83ec629760405170aefe65c54f6e612a823ea600bdbd2a11cebb3d77a7
                                          • Opcode Fuzzy Hash: 1e21ace09cd299847205d3b351f0117c42a3b5e990d136c0887fa9d04c010678
                                          • Instruction Fuzzy Hash: BCD17271B08205DBEF28CF4CD880A9A77B6EF85700B65491DE896CB341C771E991EBA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: __freea$_free
                                          • String ID: a/p$am/pm
                                          • API String ID: 3432400110-3206640213
                                          • Opcode ID: 0138cc9b91275a05168cca07a3e01361b586256ceeb34f110b065455aecc778c
                                          • Instruction ID: 0c90103f13ef771e6d83c836d61f3ee03db5313157c5540575568e9fbf12b08c
                                          • Opcode Fuzzy Hash: 0138cc9b91275a05168cca07a3e01361b586256ceeb34f110b065455aecc778c
                                          • Instruction Fuzzy Hash: F0D1F135908206CAEB65BF6CC944ABEBBF1FF04700F94819BE6C1AB255D335D990CB60
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 01061721
                                          • new.LIBCMT ref: 0106183E
                                          • std::_Xinvalid_argument.LIBCPMT ref: 010618E2
                                            • Part of subcall function 0105E0C0: new.LIBCMT ref: 0105E0C2
                                            • Part of subcall function 0105E030: new.LIBCMT ref: 0105E032
                                            • Part of subcall function 0100B0AE: __onexit.LIBCMT ref: 0100B0B4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Init_thread_footerXinvalid_argument__onexitstd::_
                                          • String ID: list<T> too long
                                          • API String ID: 3927684510-4027344264
                                          • Opcode ID: 215a52df1a55671ecb277ba1c7cb9fde088d051303b9e8e2b2effd32e68057c7
                                          • Instruction ID: 2644b70c30e953ea324ff9aa24d20392a2fa0bcaf052a126b08640782d0e0290
                                          • Opcode Fuzzy Hash: 215a52df1a55671ecb277ba1c7cb9fde088d051303b9e8e2b2effd32e68057c7
                                          • Instruction Fuzzy Hash: 52D17C74A00209EFDB14CF58C481BADBBF9FB88718F19815DE995AB780D776AD04CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: invalid string position$string too long
                                          • API String ID: 0-4289949731
                                          • Opcode ID: 50f1b0fe086398fac97ca0b1cd25fffe4f6e7b1c7783f59d454bf37a9735797b
                                          • Instruction ID: bfd38825fdc7288019b793bc6beacbbbce7dd86e2f0a08b1d4041f992bb26532
                                          • Opcode Fuzzy Hash: 50f1b0fe086398fac97ca0b1cd25fffe4f6e7b1c7783f59d454bf37a9735797b
                                          • Instruction Fuzzy Hash: 30715F32B042099BCB24EF5CD8809AEB7B6FF89310710496EE956C7390DB71E910DBA4
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8E0A3
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8E0AD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: e9129c2a808aaa056cde1ba8287aad78120afd9d44d74befaee423d12c4d5387
                                          • Instruction ID: 177f0a80c0b64f1b7a5613eaf13120f52d3e87e345448ee0e46350904348d1a8
                                          • Opcode Fuzzy Hash: e9129c2a808aaa056cde1ba8287aad78120afd9d44d74befaee423d12c4d5387
                                          • Instruction Fuzzy Hash: EC51C47170020ADFCB24EF58D8C08AA73E9FF94745720492EF946CB251EB71E954EBA1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FBA902
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FBA90C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: 099a51e713173551136a110b6e2391f4346ceeb57024d1e3baf17737cd712d00
                                          • Instruction ID: bb998ce62bd180c025893b376e4b0758ea2428e29b9005a8d6226c69d1a98dba
                                          • Opcode Fuzzy Hash: 099a51e713173551136a110b6e2391f4346ceeb57024d1e3baf17737cd712d00
                                          • Instruction Fuzzy Hash: C251D472B002059FD724DF1ED880ADAB7A5EF94740720492EF492CB651DB71D841EFA2
                                          APIs
                                          • recvfrom.WS2_32(?,8B5B5FBB,?,00000000,?,?), ref: 00FDF286
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: recvfrom
                                          • String ID: %s$Internal error: Unexpected packet$Received too short packet
                                          • API String ID: 846543921-1418437813
                                          • Opcode ID: 9cc3bd19b5f9b00a4561a864df4016cca6ff3d91c513c88130f5f52e5c1dcabe
                                          • Instruction ID: 505030e9cbb851da51f007d6b900e161e06083311804516fb29626caf949aedc
                                          • Opcode Fuzzy Hash: 9cc3bd19b5f9b00a4561a864df4016cca6ff3d91c513c88130f5f52e5c1dcabe
                                          • Instruction Fuzzy Hash: E7513B71A00205ABDB10EB24DC81FEEB3B9FF00315F44417BF44ED6241DB39A958ABA1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 0105F20A
                                          • std::_Xinvalid_argument.LIBCPMT ref: 0105F2A0
                                            • Part of subcall function 00FF2308: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00FF2314
                                            • Part of subcall function 00FF2308: __CxxThrowException@8.LIBVCRUNTIME ref: 00FF2322
                                          • std::_Xinvalid_argument.LIBCPMT ref: 0105F30A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$Exception@8Throwstd::invalid_argument::invalid_argument
                                          • String ID: vector<T> too long
                                          • API String ID: 1284171080-3788999226
                                          • Opcode ID: b96f0f72ba1ebcca562b11db82b2e5e87883b51337be6ae4afa2e33121a90354
                                          • Instruction ID: 93a92a8c3f02d1d40754ca3df29ff8098e14db941bd293a8ab605be7a95b38a0
                                          • Opcode Fuzzy Hash: b96f0f72ba1ebcca562b11db82b2e5e87883b51337be6ae4afa2e33121a90354
                                          • Instruction Fuzzy Hash: 9F4118373002260B875CDD3EDD9446EBADB9BD866132DCA3EE985DB788C970F8414690
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8DEE6
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8DEF0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: CPU >> $string too long
                                          • API String ID: 909987262-599734533
                                          • Opcode ID: 72536754f1c77016a92e6731274f487bcd2479f95243d6334eec6687ebdddada
                                          • Instruction ID: 0d8aeb0f8cdf7271caa99dad44db17d3f3b13270c37a777bfa3d50d7c3b9685d
                                          • Opcode Fuzzy Hash: 72536754f1c77016a92e6731274f487bcd2479f95243d6334eec6687ebdddada
                                          • Instruction Fuzzy Hash: 0141A9327042158B8634FE58E8909BEB3F6FFE5751720092EE582CB690DB219C45A7A4
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FE97A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: %.*s$%sAuthorization: Digest %s$Proxy-
                                          • API String ID: 601868998-541442569
                                          • Opcode ID: add2384533a424fc089dc415820ff6f6a505717c321fba5261f4fc7ba0145513
                                          • Instruction ID: 0eaeeb005059acac3eb6acb62c5ebc7fcf3c452b6fef49870579ff7b2f9296c3
                                          • Opcode Fuzzy Hash: add2384533a424fc089dc415820ff6f6a505717c321fba5261f4fc7ba0145513
                                          • Instruction Fuzzy Hash: 3041D176A00108AFDB10CF59DC45BEA7BA5EF49324F0880A9FD48DB351DB759D10DBA1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F92DF6
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F92E00
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: 70ecb664db1bc1f97a5d98149b7ac59f9b095f9366328f9e32e65cc148e0fa37
                                          • Instruction ID: cc35415384b26452889d818713dd56b28287f2827e45f68b08c924c1e6c8518f
                                          • Opcode Fuzzy Hash: 70ecb664db1bc1f97a5d98149b7ac59f9b095f9366328f9e32e65cc148e0fa37
                                          • Instruction Fuzzy Hash: 0831C132304319ABAB24EF58E88186EB3E9EF94754310492FE556CB660DB31E9059BA4
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F99B07
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F99B11
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: 3fb23a4ea83f119bdf2a95a8edba6e6566f2465b241cd80a0f8c032d24cf81b1
                                          • Instruction ID: b25fde33a528fa216749eeb117a46548978eed7bbdf62d274be3d87c063ae0d9
                                          • Opcode Fuzzy Hash: 3fb23a4ea83f119bdf2a95a8edba6e6566f2465b241cd80a0f8c032d24cf81b1
                                          • Instruction Fuzzy Hash: A931D4323043049FEB25DF5DE881A6AB7A9EFD4B60B11492EF555CB351C7B5E8009BA0
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8B068
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8B072
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: 0034f28ca37594dd71f321220aa1fd853fbea94f98835a0abb38927fab431ede
                                          • Instruction ID: a05e78249108c0a361095fdbbfd4e9bdee6985f6f67f8de4848caa2c8d746dc1
                                          • Opcode Fuzzy Hash: 0034f28ca37594dd71f321220aa1fd853fbea94f98835a0abb38927fab431ede
                                          • Instruction Fuzzy Hash: FE318F327043098B8B28EF5DE8819ABB3E9FF95711310092EE566CB621D731E9149BA5
                                          APIs
                                          • ___std_type_info_name.LIBVCRUNTIME ref: 00FB66C6
                                          Strings
                                          • void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_, xrefs: 00FB670C
                                          • conversion of type ", xrefs: 00FB669C
                                          • " to data failed, xrefs: 00FB66DC
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_type_info_name
                                          • String ID: " to data failed$conversion of type "$void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_
                                          • API String ID: 1734802720-3578818472
                                          • Opcode ID: 854e17182bfbb97a432cd0121bfc1f24fe1f872c6921b3cbc2ecd0e057e76d9c
                                          • Instruction ID: da0f7b1a4ad25cf0009e247873e1ded4170b6bf5f7e60732c0d46a96dc872f6b
                                          • Opcode Fuzzy Hash: 854e17182bfbb97a432cd0121bfc1f24fe1f872c6921b3cbc2ecd0e057e76d9c
                                          • Instruction Fuzzy Hash: 21410370D04248AFEB15EFA4CC45BEEBBB9EF01710F10415DE441AB282DB796A08DBA1
                                          APIs
                                          • ___std_type_info_name.LIBVCRUNTIME ref: 00FB6816
                                          Strings
                                          • conversion of type ", xrefs: 00FB67EC
                                          • void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_, xrefs: 00FB685C
                                          • " to data failed, xrefs: 00FB682C
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_type_info_name
                                          • String ID: " to data failed$conversion of type "$void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_
                                          • API String ID: 1734802720-3578818472
                                          • Opcode ID: b747b4eff2c1fe86c9a43397a7b824af44b62fa1981c00929d7c0e5b3feb62fe
                                          • Instruction ID: de5c7199f573e3dc800f78c9d9592724f5817becd83719fde1a30f23f768e431
                                          • Opcode Fuzzy Hash: b747b4eff2c1fe86c9a43397a7b824af44b62fa1981c00929d7c0e5b3feb62fe
                                          • Instruction Fuzzy Hash: 5B410370904248AFEB15EFA4CC45BEEBBB9EF11714F20415DE441AB281DF796A08DBA1
                                          APIs
                                          • ___std_type_info_name.LIBVCRUNTIME ref: 00FB6488
                                          Strings
                                          • conversion of type ", xrefs: 00FB645E
                                          • void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_, xrefs: 00FB64CE
                                          • " to data failed, xrefs: 00FB649E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_type_info_name
                                          • String ID: " to data failed$conversion of type "$void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_
                                          • API String ID: 1734802720-3578818472
                                          • Opcode ID: f5481256081d9da89c3596ebc2685965a23dd2241b0839b1950b722f56d0bee5
                                          • Instruction ID: c2bc68cbbcd5bdc1453c3ce8783a01d5769aca224e3d850399e45c7b0e4c850f
                                          • Opcode Fuzzy Hash: f5481256081d9da89c3596ebc2685965a23dd2241b0839b1950b722f56d0bee5
                                          • Instruction Fuzzy Hash: 5141D071904248EFEB11EFA4CC45BEEBBB8EF11714F10815DE441AB282DB795A08DBA1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8A758
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8A762
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: 8704fb63f2653974ae26bbf4bb6902a0f88a7fb1ee744b9a5524c45816ca708c
                                          • Instruction ID: 9198c53f59e0db98d666b578d92a5b65608061ae3da99e833057963ee9455d6c
                                          • Opcode Fuzzy Hash: 8704fb63f2653974ae26bbf4bb6902a0f88a7fb1ee744b9a5524c45816ca708c
                                          • Instruction Fuzzy Hash: E131A2323017048FEB24EF5DEC41AAEB3B5EF95751B10492FE551CB251D771D800A7A6
                                          APIs
                                          • ___std_type_info_name.LIBVCRUNTIME ref: 00FB4FC3
                                          Strings
                                          • conversion of type ", xrefs: 00FB4F99
                                          • " to data failed, xrefs: 00FB4FD6
                                          • void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_, xrefs: 00FB5006
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___std_type_info_name
                                          • String ID: " to data failed$conversion of type "$void __thiscall boost::property_tree::basic_ptree<class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,class std::basic_string<char,struct std::char_traits<char>,class std::allocator<char> >,struct std::less<class std::basic_
                                          • API String ID: 1734802720-3578818472
                                          • Opcode ID: 79b944d5b977f25598390551a5e0552dbc104b1131c6a47b2035b273fd202207
                                          • Instruction ID: 30ef7bd0ebfbe2da2d6f22dbc9587e987ff796e6d5d17c398e742c10d2d402e7
                                          • Opcode Fuzzy Hash: 79b944d5b977f25598390551a5e0552dbc104b1131c6a47b2035b273fd202207
                                          • Instruction Fuzzy Hash: 4131F471D04248AADF01EBA5CC45FEEBBBCEB05710F108159F051B7282DF795A08DBA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %s:%s$%sAuthorization: Basic %s$Proxy-
                                          • API String ID: 48624451-2961970465
                                          • Opcode ID: e7cfaaa78a1db60735de067a9a66b12bc58212fd33dd5fdde06f9088b72f6d22
                                          • Instruction ID: b1dedce3dd82de00572358c9d5c8b426f98ca5a65c5be2e2e501787f25830247
                                          • Opcode Fuzzy Hash: e7cfaaa78a1db60735de067a9a66b12bc58212fd33dd5fdde06f9088b72f6d22
                                          • Instruction Fuzzy Hash: 7721E7B5A00105AFDB10DF64D845BE977FAEF84310F1841BAE9489B301E7369E009BA1
                                          APIs
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000,05CEC6CE), ref: 0100D832
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000,00FA13B8), ref: 0100D86D
                                          • GetLastError.KERNEL32 ref: 0100D877
                                          Strings
                                          • boost::filesystem::current_path, xrefs: 0100D881
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$ErrorLast
                                          • String ID: boost::filesystem::current_path
                                          • API String ID: 1128942804-4026011040
                                          • Opcode ID: 0b8de264612b3a085bd6a93e6efcd9d7cabea6905ae76c38673c8b6cca6a61e2
                                          • Instruction ID: 7b25775c8084fa838e5ea1972bd648debfebcff586ce35485272328a61aa935a
                                          • Opcode Fuzzy Hash: 0b8de264612b3a085bd6a93e6efcd9d7cabea6905ae76c38673c8b6cca6a61e2
                                          • Instruction Fuzzy Hash: 3C210B71604245ABE7159FA8DC05BABB7F9EF44710F044529F846DB3C4D7B9EA00C7A0
                                          APIs
                                          • WSAStartup.WS2_32(00000002,?), ref: 00FDD720
                                          • WSACleanup.WS2_32 ref: 00FDD74D
                                            • Part of subcall function 00FCD340: ___swprintf_l.LIBCMT ref: 00FCD382
                                          Strings
                                          • WSAStartup failed (%d), xrefs: 00FDD72B
                                          • insufficient winsock version to support telnet, xrefs: 00FDD775
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CleanupStartup___swprintf_l
                                          • String ID: WSAStartup failed (%d)$insufficient winsock version to support telnet
                                          • API String ID: 3683242764-1763879679
                                          • Opcode ID: 8822cc7a800178fd45b26f78b7fe2c24fee8a0729cc3a99782be97d0883d560e
                                          • Instruction ID: 14c0f257de242d17b085963dd9598d1d812785bb4adb8fc19743ab5f5a4b235c
                                          • Opcode Fuzzy Hash: 8822cc7a800178fd45b26f78b7fe2c24fee8a0729cc3a99782be97d0883d560e
                                          • Instruction Fuzzy Hash: 84019271B0011DABDF10EB68AD56FEE7369CF44215F4000EAFC4A97281DE295E058695
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ConvertString_com_issue_error_com_util::
                                          • String ID: WQL
                                          • API String ID: 729922077-1249411209
                                          • Opcode ID: 2fb919df270f7d69d9e402737626ef81430fd72426a4bdb5b9300ec30a2fad8a
                                          • Instruction ID: 0f64c190f6ca52ee80722890e0015441fcb4fcfd241a41c693f9173a24471394
                                          • Opcode Fuzzy Hash: 2fb919df270f7d69d9e402737626ef81430fd72426a4bdb5b9300ec30a2fad8a
                                          • Instruction Fuzzy Hash: CE01D671944756EBD3219F95C801B9AF7E8EF54B20F20871EE8516B780E7B5594087D0
                                          APIs
                                          • TlsAlloc.KERNEL32(00000000,010188DE,00000000), ref: 0102CAF3
                                          • TlsFree.KERNEL32(?,05CEC6CE,00000000,0109D640,000000FF,?,libs\log\src\thread_specific.cpp,00000029,TLS capacity depleted,0000000C), ref: 0102CB44
                                          Strings
                                          • TLS capacity depleted, xrefs: 0102CB06
                                          • libs\log\src\thread_specific.cpp, xrefs: 0102CB0D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AllocFree
                                          • String ID: TLS capacity depleted$libs\log\src\thread_specific.cpp
                                          • API String ID: 265982327-1379514790
                                          • Opcode ID: adc86f5e1269eb2d96f80dd8c08e7e85b6ee9bd1b6010337cd36516d819997b2
                                          • Instruction ID: 87baa3561b0f9fbb0b1601b90119cffaded64ec35aceff30940461c9f9a217b7
                                          • Opcode Fuzzy Hash: adc86f5e1269eb2d96f80dd8c08e7e85b6ee9bd1b6010337cd36516d819997b2
                                          • Instruction Fuzzy Hash: 7EF0E931644254AFD7249F68EC45F96B7A8EB09A20F100B6EF8A5D77C4D77688008780
                                          APIs
                                          • send.WS2_32(?,?,00000003,00000000), ref: 00FDDFC9
                                          • WSAGetLastError.WS2_32(?,00FDDEAF,?,000000FE,?,?,?,00FDE710,?,?,?,RCVD,000000FB,?), ref: 00FDDFD3
                                            • Part of subcall function 00FCD340: ___swprintf_l.LIBCMT ref: 00FCD382
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast___swprintf_lsend
                                          • String ID: SENT$Sending data failed (%d)
                                          • API String ID: 2728857167-3459338696
                                          • Opcode ID: 5f6e709085a8d7691f796e52ec3654a56c0f12cc3973094a87591d20229de420
                                          • Instruction ID: 48f07b899f238ade2655cefdad14990cfe73b43b0475e85c1062593e21818e17
                                          • Opcode Fuzzy Hash: 5f6e709085a8d7691f796e52ec3654a56c0f12cc3973094a87591d20229de420
                                          • Instruction Fuzzy Hash: 71F0C236200248BFDB11AF59DC81EDB3B6DAF48790F044019F9988B242D235A61087A1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: __alldvrm$_strrchr
                                          • String ID:
                                          • API String ID: 1036877536-0
                                          • Opcode ID: 9d93e61f19b96296c0ae5d052b078a61c056aa9b66824bfbf5dd4f31dc1b7d83
                                          • Instruction ID: 582e75270636c500ff2674964c8cd65d44a7f57efc704cd65b12150d5a3a892e
                                          • Opcode Fuzzy Hash: 9d93e61f19b96296c0ae5d052b078a61c056aa9b66824bfbf5dd4f31dc1b7d83
                                          • Instruction Fuzzy Hash: F9A16672A0438A9FEF22CF1CC8A07AEBFE9EF15314F1841A9F5D59B285C2389941D750
                                          APIs
                                          • GetFileType.KERNEL32(?,00000000,00000000,00000000), ref: 01085289
                                            • Part of subcall function 01085688: __dosmaperr.LIBCMT ref: 010856CB
                                          • GetLastError.KERNEL32 ref: 010853B4
                                          • __dosmaperr.LIBCMT ref: 010853BB
                                          • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 010853F8
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: __dosmaperr$ErrorFileLastNamedPeekPipeType
                                          • String ID:
                                          • API String ID: 3955570002-0
                                          • Opcode ID: e9867c84cb008403a38f827d6850ea5cc0ae0ac97b3e7fa61a7cc0a2fa25c82f
                                          • Instruction ID: 760f4e438ef404c5e8a028f3e6df7ad6d6b6eb8347833e3834f8ac8ae29b5ea0
                                          • Opcode Fuzzy Hash: e9867c84cb008403a38f827d6850ea5cc0ae0ac97b3e7fa61a7cc0a2fa25c82f
                                          • Instruction Fuzzy Hash: 0F51B272904609AFDB64EFB8CC419EFBBF9EF48324F148929E5D6D3550EB3498418B50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID:
                                          • API String ID: 1385522511-0
                                          • Opcode ID: 350f99dcba5bb25760efd1739260973bee56d92bb312e502a57e1ac148619048
                                          • Instruction ID: f71590f523ee862b522b0a55867b292a6ab8409f78d3ad418fd1490ce64002be
                                          • Opcode Fuzzy Hash: 350f99dcba5bb25760efd1739260973bee56d92bb312e502a57e1ac148619048
                                          • Instruction Fuzzy Hash: DD61DE70900216CFDB11DBA8C946BADB7F4FB44324F1042A9F596AB3C4DB395A04CBA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: fd071277f79cdf534464ad6480795ffe1ab926528ee0a34a838631ac29915c4b
                                          • Instruction ID: da42ee4b1370f0c4294dee2f2d8aa55037cdc684729603f2fe9257bc2864894d
                                          • Opcode Fuzzy Hash: fd071277f79cdf534464ad6480795ffe1ab926528ee0a34a838631ac29915c4b
                                          • Instruction Fuzzy Hash: E1412571B04112EADF25BABD9C54AEE3AF4FF953B0F140295F8E8D7290EA358540A361
                                          APIs
                                          • __Getcvt.LIBCPMT ref: 00FF2D2E
                                          • MultiByteToWideChar.KERNEL32(00F8FB61,00000009,00000000,00000002,?,00000000,00000000,00000001,?), ref: 00FF2D7C
                                          • MultiByteToWideChar.KERNEL32(00F8FB61,00000009,?,030A7EC0,?,00000000,00000000,00000001,?), ref: 00FF2DEE
                                          • MultiByteToWideChar.KERNEL32(00F8FB61,00000009,?,00000001,?,00000000,00000000,00000001,?), ref: 00FF2E16
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$Getcvt
                                          • String ID:
                                          • API String ID: 3195005509-0
                                          • Opcode ID: 48c154875ea33ce801d8574a1c00f3d2b492a2a6b73364c1a8e9d25f6ced1234
                                          • Instruction ID: db31eea1e826363364055d537593ac824534501cd18aeab17f0a346360cbda2f
                                          • Opcode Fuzzy Hash: 48c154875ea33ce801d8574a1c00f3d2b492a2a6b73364c1a8e9d25f6ced1234
                                          • Instruction Fuzzy Hash: 9041B231A1034AEFEB618F64D841BBEBBB9EF45320F244469F9519B2A0D7759840EB50
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c1873da40ba067929def9ca62e76533391b5624dd88800f77440407b7f2780da
                                          • Instruction ID: 1d0aca5728457b193bd88c55324b1a7a816a864fe37c22bbc4ca096e613c1fcb
                                          • Opcode Fuzzy Hash: c1873da40ba067929def9ca62e76533391b5624dd88800f77440407b7f2780da
                                          • Instruction Fuzzy Hash: 9941D771A0431ABFD725EF78CC40BEABBE9EB98720F10856AE1D5DB2C0D671A5418784
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fbc37d2f6184032bf3131da2bf0fe894ac3aea1319f9c4cffccb5a8d037a80ca
                                          • Instruction ID: a53f631beedfbfdf409f4b56a4a4af668de7f04c031e6433bd3d0fa8d9b966a5
                                          • Opcode Fuzzy Hash: fbc37d2f6184032bf3131da2bf0fe894ac3aea1319f9c4cffccb5a8d037a80ca
                                          • Instruction Fuzzy Hash: 7F31C0B93003028FD350DF69C480AABB3E5EF94321F14C96AE999C7291D734E861CB92
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000006,00000000,0000007F,010C2A30,00000000,00000000,8B56FF8B,0108A87A,?,00000006,00000001,010C2A30,0000007F,?,8B56FF8B,00000001), ref: 01094E15
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 01094E9E
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 01094EB0
                                          • __freea.LIBCMT ref: 01094EB9
                                            • Part of subcall function 01086524: RtlAllocateHeap.NTDLL(00000000,00000003,00000000,?,00000003,01090083), ref: 01086556
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                          • String ID:
                                          • API String ID: 2652629310-0
                                          • Opcode ID: 7802550853bc438e7d2ec9cbc9bf411c586d819e34e6d391a1a642399426a0f2
                                          • Instruction ID: 2fe906bf314639bdec59d1d1320964d961cf56cae5983881cc7a0fa5f2244738
                                          • Opcode Fuzzy Hash: 7802550853bc438e7d2ec9cbc9bf411c586d819e34e6d391a1a642399426a0f2
                                          • Instruction Fuzzy Hash: E631CD32A0021AABEF259F69DC94DEF7BE5EB40310F054268FC44D7290E735D951DBA0
                                          APIs
                                            • Part of subcall function 00F95930: CloseHandle.KERNEL32(00000000,05CEC6CE), ref: 00F95985
                                            • Part of subcall function 00F95930: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,05CEC6CE,?,?,?,05CEC6CE,?,0100943D,05CEC6CE), ref: 00F95997
                                          • ReleaseSemaphore.KERNEL32(?,?,00000000,05CEC6CE,?,?,?,?,00000000,010A4942,000000FF,?,01009537), ref: 010096F4
                                          • ReleaseSemaphore.KERNEL32(?,?,00000000,?,?,?,?,00000000,010A4942,000000FF,?,01009537), ref: 01009715
                                          • CloseHandle.KERNEL32(?), ref: 01009757
                                          • SetEvent.KERNEL32(00000000), ref: 01009791
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CloseHandleReleaseSemaphore$EventObjectSingleWait
                                          • String ID:
                                          • API String ID: 3698072468-0
                                          • Opcode ID: 9f33081d45d35a39c5a94a8b88834a955b8fcd6dfa86df4ecb4ae5ae8e874d72
                                          • Instruction ID: fcec26839bb20d61fec632008d835621c62534ff82397f0be53fc4714134e085
                                          • Opcode Fuzzy Hash: 9f33081d45d35a39c5a94a8b88834a955b8fcd6dfa86df4ecb4ae5ae8e874d72
                                          • Instruction Fuzzy Hash: A9317E75600604DFEB2A8F58C884B6ABBE8FB04728F1446A9FD5DDB2C6D736D811CB50
                                          APIs
                                          • new.LIBCMT ref: 00F9F036
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F9F0A0
                                            • Part of subcall function 0100BF2B: __CxxThrowException@8.LIBVCRUNTIME ref: 0100BF42
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F9F0A5
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$Exception@8Throw
                                          • String ID:
                                          • API String ID: 3339364867-0
                                          • Opcode ID: c71de1e03615bb84a90a173c55549aeba09db768fe47eb91aa969a41973d9e73
                                          • Instruction ID: f56300d714512a35bbc8816dda4d72ae6cd82d8a99d0205c267f9e91fb4b5487
                                          • Opcode Fuzzy Hash: c71de1e03615bb84a90a173c55549aeba09db768fe47eb91aa969a41973d9e73
                                          • Instruction Fuzzy Hash: 3A11E6B6A00103AFEB19EF68C8819BAB3ACEF54310B10463DE959C3251E731ED18C7A0
                                          APIs
                                          • new.LIBCMT ref: 00F9F0E6
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F9F152
                                            • Part of subcall function 0100BF2B: __CxxThrowException@8.LIBVCRUNTIME ref: 0100BF42
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00F9F157
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$Exception@8Throw
                                          • String ID:
                                          • API String ID: 3339364867-0
                                          • Opcode ID: ddbd4eac951e155764efa1d3510aa374e82febe5be42ac7467a40f177048762b
                                          • Instruction ID: ee4cd06ce4256fc95186a53bfa668d39f2176ebfa5d1930810c5245be7c873bd
                                          • Opcode Fuzzy Hash: ddbd4eac951e155764efa1d3510aa374e82febe5be42ac7467a40f177048762b
                                          • Instruction Fuzzy Hash: 281103B6A00107AFEB19EF68C88087AB3A8EF54310B14463AE919C7250E731AD15CBD1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3a0e99cf817a150b3c63b627bcc16b7be7712f93396f2bea078e8a87903d690
                                          • Instruction ID: 4fc8f6e1b0b94201c270ac0ee7c326f66a502fa88f24779af54346585364d474
                                          • Opcode Fuzzy Hash: f3a0e99cf817a150b3c63b627bcc16b7be7712f93396f2bea078e8a87903d690
                                          • Instruction Fuzzy Hash: FE01D6716002024B9724EB39D9D49AEF3ECFFD0221705466EF4A6CF651DB20E841C752
                                          APIs
                                          • FileTimeToSystemTime.KERNEL32(00000000,?,?,?,00000000,00000000,?,?,?,00000000), ref: 0108544E
                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 01085462
                                          • GetLastError.KERNEL32 ref: 010854AA
                                          • __dosmaperr.LIBCMT ref: 010854B1
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Time$System$ErrorFileLastLocalSpecific__dosmaperr
                                          • String ID:
                                          • API String ID: 593088924-0
                                          • Opcode ID: 15475a2be43686a7129093c73f653712109a0711ffe411b1bfc20e3a2efc001b
                                          • Instruction ID: 20a69ae299eb82e0fd67bc70034beebbfcaa8007d46bedbc45bf00e9407610f1
                                          • Opcode Fuzzy Hash: 15475a2be43686a7129093c73f653712109a0711ffe411b1bfc20e3a2efc001b
                                          • Instruction Fuzzy Hash: 1A216072A0410DABCB11EFE8CC84AEF77BCAF08321F505656F596E2080DF39D6048B61
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d77515ad65b2b41654a9843b87c8fa7ab20286e32492c19d137f0fd6c4c121d4
                                          • Instruction ID: acc7c0f3373d0e1bf958bae4c6243babc54c6f6c00de75c3c80d4dd300a2b524
                                          • Opcode Fuzzy Hash: d77515ad65b2b41654a9843b87c8fa7ab20286e32492c19d137f0fd6c4c121d4
                                          • Instruction Fuzzy Hash: EBF082F2A002054AEB1DFB6498A6ABE7758CB71350F00013EE51BCB590F622E964D6A9
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 436ff046126941eeec54348df4088f2425809747f70c0628ff03eda104265074
                                          • Instruction ID: 06e65400060de4666682f95d7795d7bd9428fcc2d31fd15926de9854a7ed9c0d
                                          • Opcode Fuzzy Hash: 436ff046126941eeec54348df4088f2425809747f70c0628ff03eda104265074
                                          • Instruction Fuzzy Hash: 87F027F1A002034AE7A5F7789844EBF33D85F20254F02017ADCC7DB092EB29C954C653
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2a7451a62a4b2ee75dfba380583b36b9ef1f5812cad444a02974a9c022dbea8
                                          • Instruction ID: 881d42a62893414c2e9f55769dc1f766c44e3d9c1288dc9d55077d2240f5b736
                                          • Opcode Fuzzy Hash: d2a7451a62a4b2ee75dfba380583b36b9ef1f5812cad444a02974a9c022dbea8
                                          • Instruction Fuzzy Hash: 1CF0A0F2B042094FA709F774A8569FE73988B34360B14023EF61ECB2D1FA22E9549659
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f22e6bf2c0fdcebda5b651e1c09446586ffb2276ce4ade469a68fbc7b52885c
                                          • Instruction ID: 20a823b7fba247c68e6a1cba523c1f562d9b13f711e0e38bb8732e11790c89cb
                                          • Opcode Fuzzy Hash: 6f22e6bf2c0fdcebda5b651e1c09446586ffb2276ce4ade469a68fbc7b52885c
                                          • Instruction Fuzzy Hash: 4CF0A0B2A042058BBB19F774D85297E73988B34360B00063FF52BCB2D1F522E999D699
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 76ed98ddada49c7321db007dd077195e7b8ad118fe783375149292d5aa19183d
                                          • Instruction ID: 4e77e587297f99ae8f7d11f349d2f7752c70db04032a6e710e2539feaedf6ac9
                                          • Opcode Fuzzy Hash: 76ed98ddada49c7321db007dd077195e7b8ad118fe783375149292d5aa19183d
                                          • Instruction Fuzzy Hash: 71F05CB3B002094BAA19F7759821CBE73849B30360B40023FF81BCB2C0F632F910D955
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 77fe75a867870fb9d20ca8abb7671582ad89bb34b65130aa0c7ebe8461e2e6eb
                                          • Instruction ID: a4b0f73db81b7d4e63d3fdf5cbde958fc54e6c529224db599a39a8b8638cd1f1
                                          • Opcode Fuzzy Hash: 77fe75a867870fb9d20ca8abb7671582ad89bb34b65130aa0c7ebe8461e2e6eb
                                          • Instruction Fuzzy Hash: 62F05971A0090356F7ADF7B49950BBF32E48F60205F01403E9DC7CB081EB28D515C217
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 970908b49473d7ef28af1614abfa152ea2e8798d69a80794042a91427aa07e5e
                                          • Instruction ID: 76b02e6c44a8222a15757936db3e0249761e3140ac3b213545cbc89203bf223c
                                          • Opcode Fuzzy Hash: 970908b49473d7ef28af1614abfa152ea2e8798d69a80794042a91427aa07e5e
                                          • Instruction Fuzzy Hash: 3DF0E2B2A042094FA619F7689441DFE73D8CB74360B00403FF10ACB280FB32E914D759
                                          APIs
                                            • Part of subcall function 0105E090: new.LIBCMT ref: 0105E092
                                            • Part of subcall function 0106E6F0: LoadLibraryA.KERNEL32(?), ref: 0106E70C
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 0105CDB4
                                          • ___std_exception_destroy.LIBVCRUNTIME ref: 0105CE09
                                          Strings
                                          • Unable to open message catalog: , xrefs: 0105CD69
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: LibraryLoad___std_exception_copy___std_exception_destroy
                                          • String ID: Unable to open message catalog:
                                          • API String ID: 2927770020-3361316291
                                          • Opcode ID: 29aa8e8def19ce010fb0e20f8ec9a976f5c82b877cb6f0743ff6cd3e495667eb
                                          • Instruction ID: f36b51f40579c846dca2dcdbe94960327034485ab16bd17eaccdb806991c3af2
                                          • Opcode Fuzzy Hash: 29aa8e8def19ce010fb0e20f8ec9a976f5c82b877cb6f0743ff6cd3e495667eb
                                          • Instruction Fuzzy Hash: 34C1ED70D00348DFEF55DFA8C988BDEBBF8AF15314F244159D886AB281D7349A48CBA1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 0105F45A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: punct$vector<bool> too long
                                          • API String ID: 909987262-458764811
                                          • Opcode ID: 8c332d9dbce7c02a79c717453a32bf70485abccddd11689a334d8c941bab4c4d
                                          • Instruction ID: 2d73c974e79840d2daf6404f7bdc4b254b082f96d20454f4ff9ca2e1a76b482b
                                          • Opcode Fuzzy Hash: 8c332d9dbce7c02a79c717453a32bf70485abccddd11689a334d8c941bab4c4d
                                          • Instruction Fuzzy Hash: 31C12A7550060AEFDB54DF54C884BDFBBF8FF14354F10816AE8869B690DB78AA48CB90
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FDA8D8
                                            • Part of subcall function 00FC4550: GetTickCount.KERNEL32 ref: 00FC4551
                                          Strings
                                          • Can't open %s for writing, xrefs: 00FDA969
                                          • Can't get the size of %s, xrefs: 00FDA9E2
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: CountTick___from_strstr_to_strchr
                                          • String ID: Can't get the size of %s$Can't open %s for writing
                                          • API String ID: 3886785706-3544860555
                                          • Opcode ID: b040ba51bc52bd68b8ccf211b7e9e1929315ed4be12a47200a47c61f2ae87173
                                          • Instruction ID: 4711c61889e57a9dfe3ab902777bbf598d127ddc4deb42e6a1af9fba506cc3ec
                                          • Opcode Fuzzy Hash: b040ba51bc52bd68b8ccf211b7e9e1929315ed4be12a47200a47c61f2ae87173
                                          • Instruction Fuzzy Hash: DE818071E002099BDF00EF98CCC5AADB7B6FF48310F18417AE8099B345EA359D06DB56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: string too long
                                          • API String ID: 0-2556327735
                                          • Opcode ID: 79a234c5934f64ca7360916f3793885b6a59185b47a1fb7861fdcac39e603fa2
                                          • Instruction ID: 8d7dc808ef0d4aa1a2924ec258f62b2ecc15aee9e022d5c5c07d916910451c69
                                          • Opcode Fuzzy Hash: 79a234c5934f64ca7360916f3793885b6a59185b47a1fb7861fdcac39e603fa2
                                          • Instruction Fuzzy Hash: D1310B323007108FF724BE5CEC809AAF3A5EF95721718492FE591CB655D771DC84A7A2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: string too long
                                          • API String ID: 0-2556327735
                                          • Opcode ID: 5327e880ce7cc8c3639f9ab7f4746b86f6046a497f39efe450d1445aa798c471
                                          • Instruction ID: ff4b70570a051a9c68607894e64cedcc3fe04b42af7885b3dde96f947bb88970
                                          • Opcode Fuzzy Hash: 5327e880ce7cc8c3639f9ab7f4746b86f6046a497f39efe450d1445aa798c471
                                          • Instruction Fuzzy Hash: 9331D232704B149B8B34FE5CEC848AAF3F9FF95721320492FE196C7620D731A80597A5
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8A47B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: invalid string position$string too long
                                          • API String ID: 909987262-4289949731
                                          • Opcode ID: d03e7d4b3f0e182f8ebf1ebfb05117ae9bb48cfb99c5866ac3e589e08d8b11dd
                                          • Instruction ID: 7b52d442fe7a2dcd772cceb1d603cba86c9f803e5cc764795254c02666df0e66
                                          • Opcode Fuzzy Hash: d03e7d4b3f0e182f8ebf1ebfb05117ae9bb48cfb99c5866ac3e589e08d8b11dd
                                          • Instruction Fuzzy Hash: DA31D6323007148BEB20EF5CEC44B9AF7E9EB95B61F10452FE595CB252D7B2984097E2
                                          APIs
                                            • Part of subcall function 00F8BB70: std::ios_base::_Addstd.LIBCPMT ref: 00F8BC19
                                            • Part of subcall function 00F8B2B0: new.LIBCMT ref: 00F8B2DE
                                            • Part of subcall function 00F8B2B0: std::locale::_Init.LIBCPMT ref: 00F8B2F5
                                          • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00FB76E0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::ios_base::_$AddstdInitIos_base_dtorstd::locale::_
                                          • String ID: H$RunInstaller failed to execute.
                                          • API String ID: 3640179778-3820714907
                                          • Opcode ID: 06c1145b8613ae71a10b0cafef507ccf04e6b67fb8a1fa6a44c73eda703cab8d
                                          • Instruction ID: e5a5c1d7018c6e959917c7d0b6740de6ef76c6272f57412312020f9388a92d16
                                          • Opcode Fuzzy Hash: 06c1145b8613ae71a10b0cafef507ccf04e6b67fb8a1fa6a44c73eda703cab8d
                                          • Instruction Fuzzy Hash: 16516BB0A04359DFEF14DF98C848BDEBBF4AF45314F108099E449AB291DB789A88CF51
                                          APIs
                                            • Part of subcall function 00F8BB70: std::ios_base::_Addstd.LIBCPMT ref: 00F8BC19
                                            • Part of subcall function 00F8B2B0: new.LIBCMT ref: 00F8B2DE
                                            • Part of subcall function 00F8B2B0: std::locale::_Init.LIBCPMT ref: 00F8B2F5
                                          • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00FB78F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: std::ios_base::_$AddstdInitIos_base_dtorstd::locale::_
                                          • String ID: Executing Carrier Exe Directly$H
                                          • API String ID: 3640179778-1476402511
                                          • Opcode ID: 826e3e9844e6b8cd87d0a9407b5332dc2a9a2f4b59dd766e4000dfa1afb8233a
                                          • Instruction ID: d9cb75f73c9428349d27df37f9791f87c66df30a3f08397f7e387c3fa979f2e1
                                          • Opcode Fuzzy Hash: 826e3e9844e6b8cd87d0a9407b5332dc2a9a2f4b59dd766e4000dfa1afb8233a
                                          • Instruction Fuzzy Hash: 5A516BB0A04359DFEF14DF94C848BDEBBF4AF45314F108099E449AB291DB789A88DF51
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FAD671
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FAD6D5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: vector<T> too long
                                          • API String ID: 909987262-3788999226
                                          • Opcode ID: 29b14ffd9ff21498fb0d252fa43b39749220d82d86878b4f46ae0bae73729237
                                          • Instruction ID: 5ab9da98ab91b96370e9dde375159d5672b12bb9487886f1b2f9588741a35b64
                                          • Opcode Fuzzy Hash: 29b14ffd9ff21498fb0d252fa43b39749220d82d86878b4f46ae0bae73729237
                                          • Instruction Fuzzy Hash: 743103737006188FC718DE2DD98199AB7EAEBD8760B14C12EE94ACF745DA34E84097D0
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F98565
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F9856F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: string too long
                                          • API String ID: 909987262-2556327735
                                          • Opcode ID: d9d3a44a4fbcacf2f62b9fe060b75071f75c63ac5b770c56a527bb7cc1e3192b
                                          • Instruction ID: 981a41a2169055bed2bc2efcc370dbce1181c2a32276779328c7a4211bc0eaba
                                          • Opcode Fuzzy Hash: d9d3a44a4fbcacf2f62b9fe060b75071f75c63ac5b770c56a527bb7cc1e3192b
                                          • Instruction Fuzzy Hash: B4312E327003548BDF319A5CA8005AAFBA89FA37B1F15052FE5D587351DA72D80AD7F1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F92EE3
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F92EED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: string too long
                                          • API String ID: 909987262-2556327735
                                          • Opcode ID: d2629fd073db27710f640b66eab372a849fa90f2e880a81721439fa2d5019a84
                                          • Instruction ID: ecc54d2e97fc629af79dea7d55733aa8d3db940d1fd28ade35078664dade9cdf
                                          • Opcode Fuzzy Hash: d2629fd073db27710f640b66eab372a849fa90f2e880a81721439fa2d5019a84
                                          • Instruction Fuzzy Hash: EA21F132314314ABAF78BF68A8C0469B3E4FF18725320492FF692C7760D7329814E7A5
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FBE489
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00FBE49B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: string too long
                                          • API String ID: 909987262-2556327735
                                          • Opcode ID: 37ecd1a02400714b4a81baf5d19c3a2e3a8fb5b7d134b9205f76de51c6c75924
                                          • Instruction ID: 229d360ca5d8e5d02326c595ac46346fb25392e90151b7d4b24329b686535e21
                                          • Opcode Fuzzy Hash: 37ecd1a02400714b4a81baf5d19c3a2e3a8fb5b7d134b9205f76de51c6c75924
                                          • Instruction Fuzzy Hash: F0319D79604704DFCB21CF1AC881BDABBF5EB48724F148A5DE56A8B342D775A900DFA0
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FEC5BA
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FEC5C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: ; filename="%s"
                                          • API String ID: 601868998-4174338374
                                          • Opcode ID: 14f78475b18f6f0758a0cebe8384c0381891be972d923bfbfd66cca7a6e29efe
                                          • Instruction ID: 140fe8eaf94cfa072c4077f6f65eed19ca7e506844a100ede36eeaa83aca2a05
                                          • Opcode Fuzzy Hash: 14f78475b18f6f0758a0cebe8384c0381891be972d923bfbfd66cca7a6e29efe
                                          • Instruction Fuzzy Hash: 15212B71D003905BEB311F6AAC44BAB7B999F96374F0800ACF8C98B217D6669C0397D4
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FCAB82
                                          Strings
                                          • Connecting to port: %d, xrefs: 00FCABD6
                                          • Connecting to hostname: %s%s%s, xrefs: 00FCABA6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: Connecting to hostname: %s%s%s$Connecting to port: %d
                                          • API String ID: 601868998-2189567200
                                          • Opcode ID: 58c7834dbb8a7b6771ea04343a68858e55d2e3490a35f31a499848fe6b361e47
                                          • Instruction ID: 1e3d88376d85a6d6c5156fd8c90e99e987b72bbbcda50119c2c934c0f10dc2d6
                                          • Opcode Fuzzy Hash: 58c7834dbb8a7b6771ea04343a68858e55d2e3490a35f31a499848fe6b361e47
                                          • Instruction Fuzzy Hash: F2314771E00249AFDB10CF58DD42F9E7BA9AF95728F08026DFC549B281D370ED009BA2
                                          APIs
                                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0109905D,?,00000050,?,?,?,?,?), ref: 01098EDD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ACP$OCP
                                          • API String ID: 0-711371036
                                          • Opcode ID: 0e94103fdfd46a327cd6236fad290481a047a0335c6add6f5166746d341ec36c
                                          • Instruction ID: fd65cca867bc8a8333aa588294e42a6566ec0d57a17e13aad24c2f099eacb141
                                          • Opcode Fuzzy Hash: 0e94103fdfd46a327cd6236fad290481a047a0335c6add6f5166746d341ec36c
                                          • Instruction Fuzzy Hash: 9021D862A00109A6EFB5CB59C9307AB72E6EB56F10F46C4A6E9C9D7301E732D900D390
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F912A8
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F912B2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: string too long
                                          • API String ID: 909987262-2556327735
                                          • Opcode ID: e1d264348ddea51da2b81f6b97f9219cde6b093821949decd7060eb2a10e8c98
                                          • Instruction ID: 7538d4613be2e19df9447ee5455d6e38f06707d0ef84fa393cacb3e4ad1be3c3
                                          • Opcode Fuzzy Hash: e1d264348ddea51da2b81f6b97f9219cde6b093821949decd7060eb2a10e8c98
                                          • Instruction Fuzzy Hash: 9E11D3323043159B6B24BF9DFC4146AF3E9FFA9B61310093FE296C7660DB61A80497A5
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 01013C9F
                                          • std::_Xinvalid_argument.LIBCPMT ref: 01013CB1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: string too long
                                          • API String ID: 909987262-2556327735
                                          • Opcode ID: 03f35a9ac3c0fcad28578f665a0a965215c934246a0da3d03b02919678576e78
                                          • Instruction ID: 9ff2eda99a79dce9a0dff0c02899655223753172f04beac4e3bd3517265a109f
                                          • Opcode Fuzzy Hash: 03f35a9ac3c0fcad28578f665a0a965215c934246a0da3d03b02919678576e78
                                          • Instruction Fuzzy Hash: 7F31CD70608748DBC321DF18D881B5ABBF5FB01A20F540A9EE4D28B345C779A90487A2
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8A525
                                          • std::_Xinvalid_argument.LIBCPMT ref: 00F8A52F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_
                                          • String ID: string too long
                                          • API String ID: 909987262-2556327735
                                          • Opcode ID: 120e7d033df16e457e05759c698d94faae51ab5b5dd5f094d0d1d2d692033824
                                          • Instruction ID: 80be6f7f54fa6a7407e4c9ad6b79a552ef25ac30d42d83236be0ed1e67c6d091
                                          • Opcode Fuzzy Hash: 120e7d033df16e457e05759c698d94faae51ab5b5dd5f094d0d1d2d692033824
                                          • Instruction Fuzzy Hash: 5111E9323003104FE731BE5DAC406AAF7E8EFA1B71F14092FE6918B651C7B1984497A1
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 0105F14A
                                          • std::_Xinvalid_argument.LIBCPMT ref: 0105F1AA
                                            • Part of subcall function 00FF2308: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00FF2314
                                            • Part of subcall function 00FF2308: __CxxThrowException@8.LIBVCRUNTIME ref: 00FF2322
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Xinvalid_argumentstd::_$Exception@8Throwstd::invalid_argument::invalid_argument
                                          • String ID: vector<T> too long
                                          • API String ID: 1284171080-3788999226
                                          • Opcode ID: 41282928e92a2f334b42c248b735a5a0fe1ac80a574ff00f08a32e53742fb3ed
                                          • Instruction ID: 2438c64418a508a60b9c4124265f33f52e28979ce16a6ff9daee350a0a328efb
                                          • Opcode Fuzzy Hash: 41282928e92a2f334b42c248b735a5a0fe1ac80a574ff00f08a32e53742fb3ed
                                          • Instruction Fuzzy Hash: DD11D3723012125B876C9D3EDC858ABB7C7ABD826132CCF3EE9C6C3788C874E8414254
                                          APIs
                                          • ___from_strstr_to_strchr.LIBCMT ref: 00FD7E3F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___from_strstr_to_strchr
                                          • String ID: .$0123456789
                                          • API String ID: 601868998-4187921772
                                          • Opcode ID: c7491b25ec24d24fd569bed6cdd17d3c173c02f78da39c4d1dc25268cbe35984
                                          • Instruction ID: 3c32b486a78ee4f7e6dae119151c8b755fb640437bab1a9df586af64f7a22d8e
                                          • Opcode Fuzzy Hash: c7491b25ec24d24fd569bed6cdd17d3c173c02f78da39c4d1dc25268cbe35984
                                          • Instruction Fuzzy Hash: F521C636D083155ADB35AA29C4903BABFA69F42331F1900EBDC89CF340F631DD4592A1
                                          APIs
                                          • GetFileAttributesExW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,010242D9,?,00000000,05CEC6CE), ref: 0100E79C
                                          • GetLastError.KERNEL32(?,?,?,010242D9,?,00000000,05CEC6CE), ref: 0100E7A6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: AttributesErrorFileLast
                                          • String ID: boost::filesystem::file_size
                                          • API String ID: 1799206407-1937220381
                                          • Opcode ID: d20f106e39e9206fa91a4835905708afa43858171f5d78f68eaf7d5437aa367b
                                          • Instruction ID: dde15431d92ca2a6003af453cde3465dcc73aed9e13a7a00f625a91a726791b9
                                          • Opcode Fuzzy Hash: d20f106e39e9206fa91a4835905708afa43858171f5d78f68eaf7d5437aa367b
                                          • Instruction Fuzzy Hash: 0911E731614200ABE611AB39DC46FAF77E4EF98624F840E4DF5D9E72C5E234E9418752
                                          APIs
                                          • ___swprintf_l.LIBCMT ref: 00FDA159
                                          • SetLastError.KERNEL32(0000001C,?,?,?,?,?,?,?), ref: 00FDA1A2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ErrorLast___swprintf_l
                                          • String ID: %d.%d.%d.%d
                                          • API String ID: 2990598187-3491811756
                                          • Opcode ID: 67ec56facf1811048f65653bbfc5c9606e371852af1632bba10af27ac2b12b88
                                          • Instruction ID: 9bb41df62fc2d061e6c0aa26335f1228a20fbaae7bc903cbb310feaca999f7dd
                                          • Opcode Fuzzy Hash: 67ec56facf1811048f65653bbfc5c9606e371852af1632bba10af27ac2b12b88
                                          • Instruction Fuzzy Hash: 67113B35604149ABCF14DF78C450AFEBBB98F59200F5841DEE886DB282D9279A06DB61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %c%03d$%s %s
                                          • API String ID: 48624451-883683383
                                          • Opcode ID: 40508db383a90814553faf8f53ae32032547de3758013c4931404b4f5aaf92ba
                                          • Instruction ID: 95841d66c5a777aa7a4f7ddeb685e91c9fd578d6156b192b07e6d44c3bdb4843
                                          • Opcode Fuzzy Hash: 40508db383a90814553faf8f53ae32032547de3758013c4931404b4f5aaf92ba
                                          • Instruction Fuzzy Hash: 6D014CB760121477D710AB8ADCC5EE7736DEFC4364F08007AFA0987201E535E91646E5
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 01032C38
                                            • Part of subcall function 00FF2308: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00FF2314
                                            • Part of subcall function 00FF2308: __CxxThrowException@8.LIBVCRUNTIME ref: 00FF2322
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Exception@8ThrowXinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                          • String ID: si$vector<T> too long
                                          • API String ID: 1419379543-3992844397
                                          • Opcode ID: 6cc059799081d9df59a3dfa6906e453d1038abb3adfbfaab394d4e65907ca37b
                                          • Instruction ID: 975a31478054560b3f4ffdaa21ae9e47a9f298e6672286a879c111ed9b497a27
                                          • Opcode Fuzzy Hash: 6cc059799081d9df59a3dfa6906e453d1038abb3adfbfaab394d4e65907ca37b
                                          • Instruction Fuzzy Hash: 8B118FB1904308AFC720CF99C841B9ABBF8FF48720F108A2EE99993740D735A504CBA0
                                          APIs
                                          • getsockopt.WS2_32(00004020,0000FFFF,00001001,00000000,00000004), ref: 00FCE25B
                                          • setsockopt.WS2_32(00004020,0000FFFF,00001001,00004020,00000004), ref: 00FCE280
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: getsockoptsetsockopt
                                          • String ID: @
                                          • API String ID: 194641219-2726393805
                                          • Opcode ID: c2e1de0791c3e502613da0c1f3d85e6eb4558c38d5c6566fb389c9628fb6444c
                                          • Instruction ID: 19461f6283ada6c0b0ad56c37445a77cf2b8c776b2997118b150c4e547f06bae
                                          • Opcode Fuzzy Hash: c2e1de0791c3e502613da0c1f3d85e6eb4558c38d5c6566fb389c9628fb6444c
                                          • Instruction Fuzzy Hash: CB014071D4020AAAEF30DF80DD47FEE777DEB00714F4041A9FA44AA1D5D7B69A58AB40
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: _strstr
                                          • String ID: ;mode=
                                          • API String ID: 2882301372-3534008939
                                          • Opcode ID: 6d91ab98a6a1cc04b4dbda77275df1cb6261d75eefafea4775c6d66eb3441686
                                          • Instruction ID: 785dcb8dfb61cc401a2e804fbbeee77c68b62be3022afd5db9ea6c6826cb303b
                                          • Opcode Fuzzy Hash: 6d91ab98a6a1cc04b4dbda77275df1cb6261d75eefafea4775c6d66eb3441686
                                          • Instruction Fuzzy Hash: 30F04C71A002456ED7112279AC047C6FFD96B11364F0C4077F4CCDE351E7B1A911E3A1
                                          APIs
                                            • Part of subcall function 0100B0AE: __onexit.LIBCMT ref: 0100B0B4
                                          • __Init_thread_footer.LIBCMT ref: 00FB9252
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer__onexit
                                          • String ID: <xmlattr>$<xmlattr>
                                          • API String ID: 1881088180-1173264415
                                          • Opcode ID: 64206a5c307474f62020577d202126d47bf9e77dbc8114b847bbb5198eacfc62
                                          • Instruction ID: 668b0d0237e3c3e676e439f54e7a628131fe43e491e59abc4e61c1fbc65d3fd7
                                          • Opcode Fuzzy Hash: 64206a5c307474f62020577d202126d47bf9e77dbc8114b847bbb5198eacfc62
                                          • Instruction Fuzzy Hash: D201F475E80604EFD710CF95D843B89B3A9F718B24F50422DF6A69BB80C77AA800CF52
                                          APIs
                                            • Part of subcall function 0100B0AE: __onexit.LIBCMT ref: 0100B0B4
                                          • __Init_thread_footer.LIBCMT ref: 00FB9402
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer__onexit
                                          • String ID: <xmlcomment>$<xmlcomment>
                                          • API String ID: 1881088180-1672645029
                                          • Opcode ID: c215a76842da2554105043a254282929e02851d3bd5e069b4bb12e39c3e94300
                                          • Instruction ID: 6b7ba092e219a9534b1cc8e6dad9bd3cdd786ebbc17ab0b4547582e50376e453
                                          • Opcode Fuzzy Hash: c215a76842da2554105043a254282929e02851d3bd5e069b4bb12e39c3e94300
                                          • Instruction Fuzzy Hash: 50014471A00604DFC310DF59C802F8873A4FB48B24F50422CF6918BB90D77FAC048B12
                                          APIs
                                            • Part of subcall function 0100B0AE: __onexit.LIBCMT ref: 0100B0B4
                                          • __Init_thread_footer.LIBCMT ref: 00FB9372
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer__onexit
                                          • String ID: <xmltext>$<xmltext>
                                          • API String ID: 1881088180-2748583472
                                          • Opcode ID: 1d4a3d6db99cd21a4ef1238bce10cd1d4f60ff1720bfbf5cd714ca9ab4d13311
                                          • Instruction ID: 296fed4342add53f6aeccec67f25e11485dd1eb1642184d4fda15a44cd9d6948
                                          • Opcode Fuzzy Hash: 1d4a3d6db99cd21a4ef1238bce10cd1d4f60ff1720bfbf5cd714ca9ab4d13311
                                          • Instruction Fuzzy Hash: 1E01F476A40604DBC720DFD9D842FC873A4F745B24F54462DFAA29BBC0D77AA8008B51
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 01093933
                                          • GetLastError.KERNEL32(?,00000000), ref: 01093941
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,?,00000000,?,00000000), ref: 0109399C
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$ErrorLast
                                          • String ID:
                                          • API String ID: 1717984340-0
                                          • Opcode ID: 511c9a83e123c12f39a4cc9d1d6ce2fe7eb49002b4ff4d805edcdfca6def61c4
                                          • Instruction ID: 84dd3811564106a4e92691b13c02dd4848fc2c53ffc50a29438291ece7093438
                                          • Opcode Fuzzy Hash: 511c9a83e123c12f39a4cc9d1d6ce2fe7eb49002b4ff4d805edcdfca6def61c4
                                          • Instruction Fuzzy Hash: A841F330A00246AFDF228F79C864BAABBF4FF41320F144298E9D99F195DB308901DF60
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,7622DF60), ref: 01009255
                                          • HeapFree.KERNEL32(00000000), ref: 01009262
                                          • GetProcessHeap.KERNEL32(00000000,010A48B4,?,00000000,?,?,?,?,?,?,?,?,00000000,010A48B4,000000FF), ref: 01009295
                                          • HeapFree.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,00000000,010A48B4,000000FF), ref: 0100929C
                                            • Part of subcall function 01009610: GetProcessHeap.KERNEL32(00000000,010A4706,?,?,010A4706,000000FF), ref: 01009672
                                            • Part of subcall function 01009610: HeapFree.KERNEL32(00000000,?,?,010A4706,000000FF), ref: 01009679
                                            • Part of subcall function 01008E70: TlsGetValue.KERNEL32(0000000F,05CEC6CE,7622DF60,010A48B4), ref: 01008EDD
                                            • Part of subcall function 01008E70: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 01008F3E
                                            • Part of subcall function 01008E70: GetModuleHandleA.KERNEL32(KERNEL32.DLL,SetWaitableTimerEx), ref: 01008F88
                                            • Part of subcall function 01008E70: GetProcAddress.KERNEL32(00000000), ref: 01008F8F
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Heap$FreeProcess$AddressCreateHandleModuleProcTimerValueWaitable
                                          • String ID:
                                          • API String ID: 79733456-0
                                          • Opcode ID: 882c61dde5e20323d462da22b31eaa51eb8f2cff0b05513d18726a27a1d4b256
                                          • Instruction ID: 168e82060a947b0f9b2c23da5b75ab5ac45a40e0160128fef99c3f090b3e525a
                                          • Opcode Fuzzy Hash: 882c61dde5e20323d462da22b31eaa51eb8f2cff0b05513d18726a27a1d4b256
                                          • Instruction Fuzzy Hash: 08310631D086449BEB11CFA8C844BDEB7B8FF55720F10430AF465A72C5DB345940CB90
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00F83F3F,?,00000008,00000000,010AA35C,000000FF,?,00F83F3F,05CEC6CE), ref: 01009319
                                          • HeapFree.KERNEL32(00000000,?,00000008,00000000,010AA35C,000000FF,?,00F83F3F,05CEC6CE), ref: 01009320
                                          • GetProcessHeap.KERNEL32(00000000,00F83F3F,?,00000008,00000000,010AA35C,000000FF,?,00F83F3F,05CEC6CE), ref: 01009358
                                          • HeapFree.KERNEL32(00000000,?,00000008,00000000,010AA35C,000000FF,?,00F83F3F,05CEC6CE), ref: 0100935F
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.3966733204.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                          • Associated: 00000006.00000002.3966660737.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967078418.00000000010B0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967204671.00000000010F0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967244347.00000000010F2000.00000008.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967313597.00000000010F8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967340083.00000000010FA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.3967397150.00000000010FC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_f80000_installer.jbxd
                                          Similarity
                                          • API ID: Heap$FreeProcess
                                          • String ID:
                                          • API String ID: 3859560861-0
                                          • Opcode ID: 6c09c58b940e750fb99c132523ab12209bc69691ab9ae5dc3ebb81dea5298a33
                                          • Instruction ID: 5f076d13a977746b20e29b3d4d018a3044e302d9eb9ee63ae8c9b1563871c200
                                          • Opcode Fuzzy Hash: 6c09c58b940e750fb99c132523ab12209bc69691ab9ae5dc3ebb81dea5298a33
                                          • Instruction Fuzzy Hash: ED11B432A05714ABEB218F98D805B9ABBF8FF05B24F00865AF959972C0DB755800CB90