Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vkXe5gkY34.exe

Overview

General Information

Sample name:vkXe5gkY34.exe
renamed because original name is a hash value
Original sample name:88696cf17417a2339b63f9452404c839.exe
Analysis ID:1483406
MD5:88696cf17417a2339b63f9452404c839
SHA1:2123ca0e3764ba65e421d3b5dd7453da955d36f2
SHA256:a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895
Tags:32exe
Infos:

Detection

XenoRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected XenoRAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
PE file contains section with special chars
PE file has nameless sections
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SGDT)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • vkXe5gkY34.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\vkXe5gkY34.exe" MD5: 88696CF17417A2339B63F9452404C839)
    • cmd.exe (PID: 6472 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\eystsdf.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • efthfxj.sfx.exe (PID: 3852 cmdline: efthfxj.sfx.exe -pgtrfdewscbsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\user\AppData\Roaming MD5: 642A150BE5BBED12C85DFF794B955C01)
        • efthfxj.exe (PID: 4052 cmdline: "C:\Users\user\AppData\Roaming\efthfxj.exe" MD5: DCB591D1FC03274934709E24B502D719)
          • efthfxj.exe (PID: 3504 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
            • WerFault.exe (PID: 3448 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 80 MD5: C31336C1EFC2CCB44B4326EA793040F2)
          • efthfxj.exe (PID: 1084 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
            • efthfxj.exe (PID: 3992 cmdline: "C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe" MD5: DCB591D1FC03274934709E24B502D719)
              • efthfxj.exe (PID: 1276 cmdline: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
              • efthfxj.exe (PID: 4276 cmdline: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
              • efthfxj.exe (PID: 5968 cmdline: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
              • efthfxj.exe (PID: 7196 cmdline: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
          • efthfxj.exe (PID: 6200 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
            • schtasks.exe (PID: 7676 cmdline: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F MD5: 48C2FE20575769DE916F48EF0676A965)
              • conhost.exe (PID: 7684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • efthfxj.exe (PID: 1076 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
  • efthfxj.exe (PID: 7740 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
    • efthfxj.exe (PID: 7800 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
    • efthfxj.exe (PID: 7808 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
    • efthfxj.exe (PID: 7836 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
    • efthfxj.exe (PID: 7868 cmdline: C:\Users\user\AppData\Roaming\efthfxj.exe MD5: DCB591D1FC03274934709E24B502D719)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
XenoRATNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xenorat
{"C2 url": "45.66.231.63", "Mutex Name": "Holid_rat_nd8859g", "Install Folder": "appdata"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.2089629416.0000000002E75000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
    0000000D.00000002.2089629416.0000000002E84000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
      00000005.00000002.2076384338.0000000002CA3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
        0000000D.00000002.2089629416.0000000002E93000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
          0000000D.00000002.2089629416.0000000002C5B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            10.2.efthfxj.exe.400000.0.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
              23.2.efthfxj.exe.28febf8.0.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
                5.2.efthfxj.exe.2a6d5ec.2.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
                  13.2.efthfxj.exe.2c5bbcc.0.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
                    13.2.efthfxj.exe.2c5bbcc.0.raw.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
                      Click to see the 4 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, CommandLine: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\efthfxj.exe, ParentImage: C:\Users\user\AppData\Roaming\efthfxj.exe, ParentProcessId: 6200, ParentProcessName: efthfxj.exe, ProcessCommandLine: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, ProcessId: 7676, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, CommandLine: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\efthfxj.exe, ParentImage: C:\Users\user\AppData\Roaming\efthfxj.exe, ParentProcessId: 6200, ParentProcessName: efthfxj.exe, ProcessCommandLine: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, ProcessId: 7676, ProcessName: schtasks.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, CommandLine: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\efthfxj.exe, ParentImage: C:\Users\user\AppData\Roaming\efthfxj.exe, ParentProcessId: 6200, ParentProcessName: efthfxj.exe, ProcessCommandLine: "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F, ProcessId: 7676, ProcessName: schtasks.exe
                      No Snort rule has matched
                      Timestamp:2024-07-27T10:22:21.901268+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:49704
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-07-27T10:23:00.133191+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:49709
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeAvira: detection malicious, Label: HEUR/AGEN.1357819
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeAvira: detection malicious, Label: HEUR/AGEN.1357819
                      Source: 10.2.efthfxj.exe.400000.0.unpackMalware Configuration Extractor: XenoRAT {"C2 url": "45.66.231.63", "Mutex Name": "Holid_rat_nd8859g", "Install Folder": "appdata"}
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeVirustotal: Detection: 50%Perma Link
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeVirustotal: Detection: 50%Perma Link
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeVirustotal: Detection: 14%Perma Link
                      Source: vkXe5gkY34.exeVirustotal: Detection: 29%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJoe Sandbox ML: detected
                      Source: vkXe5gkY34.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: vkXe5gkY34.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: vkXe5gkY34.exe, efthfxj.sfx.exe.0.dr
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9A2C3 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00C9A2C3
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CB7D69 FindFirstFileExA,0_2_00CB7D69
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAA536 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00CAA536
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063A2C3 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_0063A2C3
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00657D69 FindFirstFileExA,4_2_00657D69
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064A536 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_0064A536
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 026217B0h7_2_02620B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 00A617B0h9_2_00A60B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 00A617B0h9_2_00A60B52
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 00E417B0h10_2_00E40B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 4x nop then jmp 012217B0h14_2_01220B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 4x nop then jmp 010A17B0h15_2_010A0B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 4x nop then jmp 015417B0h16_2_01540B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 4x nop then jmp 013117B0h17_2_01310B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 030717B0h24_2_03070B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 012417B0h25_2_01240B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 012217B0h26_2_01220B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 4x nop then jmp 019517B0h27_2_01950B60

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 45.66.231.63
                      Source: global trafficTCP traffic: 192.168.2.5:49710 -> 45.66.231.63:1243
                      Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.66.231.63
                      Source: efthfxj.exe, 00000018.00000002.2690514135.00000000013B7000.00000004.00000020.00020000.00000000.sdmp, efthfxj.exe, 0000001B.00000002.2694307250.0000000001786000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c

                      System Summary

                      barindex
                      Source: efthfxj.exe.4.drStatic PE information: section name: ?TBQo
                      Source: efthfxj.exe.7.drStatic PE information: section name: ?TBQo
                      Source: efthfxj.exe.4.drStatic PE information: section name:
                      Source: efthfxj.exe.7.drStatic PE information: section name:
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFAC08 NtSetContextThread,5_2_04AFAC08
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFA508 NtReadVirtualMemory,5_2_04AFA508
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFA6C0 NtResumeThread,5_2_04AFA6C0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFA8E0 NtWriteVirtualMemory,5_2_04AFA8E0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFAC01 NtSetContextThread,5_2_04AFAC01
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFA500 NtReadVirtualMemory,5_2_04AFA500
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFA6B9 NtResumeThread,5_2_04AFA6B9
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFA8D8 NtWriteVirtualMemory,5_2_04AFA8D8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AA6C0 NtResumeThread,13_2_063AA6C0
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AAC08 NtSetContextThread,13_2_063AAC08
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AA508 NtReadVirtualMemory,13_2_063AA508
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AA8E0 NtWriteVirtualMemory,13_2_063AA8E0
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AA6B9 NtResumeThread,13_2_063AA6B9
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AAC01 NtSetContextThread,13_2_063AAC01
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AA500 NtReadVirtualMemory,13_2_063AA500
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AA8D8 NtWriteVirtualMemory,13_2_063AA8D8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725A6C0 NtUnmapViewOfSection,23_2_0725A6C0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725A508 NtReadVirtualMemory,23_2_0725A508
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725AC08 NtSetContextThread,23_2_0725AC08
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725A8E0 NtWriteVirtualMemory,23_2_0725A8E0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725A6B9 NtUnmapViewOfSection,23_2_0725A6B9
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725A500 NtReadVirtualMemory,23_2_0725A500
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725AC01 NtSetContextThread,23_2_0725AC01
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725A8D8 NtWriteVirtualMemory,23_2_0725A8D8
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C97070: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00C97070
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA59830_2_00CA5983
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C983EB0_2_00C983EB
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CBE8D40_2_00CBE8D4
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAE8EC0_2_00CAE8EC
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA30E50_2_00CA30E5
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9E0970_2_00C9E097
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C931F00_2_00C931F0
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAFA6A0_2_00CAFA6A
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9BA6A0_2_00C9BA6A
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAF2000_2_00CAF200
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9D2220_2_00C9D222
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA63F10_2_00CA63F1
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CBA3500_2_00CBA350
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CB2B680_2_00CB2B68
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA2B390_2_00CA2B39
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9ECE90_2_00C9ECE9
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9DC320_2_00C9DC32
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAEDE80_2_00CAEDE8
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA5DB80_2_00CA5DB8
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA2DB40_2_00CA2DB4
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C95E830_2_00C95E83
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CB9EA00_2_00CB9EA0
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9D6340_2_00C9D634
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAF6350_2_00CAF635
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C93F950_2_00C93F95
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA4FB40_2_00CA4FB4
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C927590_2_00C92759
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_006459834_2_00645983
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_006383EB4_2_006383EB
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_006430E54_2_006430E5
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064E8EC4_2_0064E8EC
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0065E8D44_2_0065E8D4
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063E0974_2_0063E097
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_006331F04_2_006331F0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063BA6A4_2_0063BA6A
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064FA6A4_2_0064FA6A
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063D2224_2_0063D222
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064F2004_2_0064F200
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00652B684_2_00652B68
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0065A3504_2_0065A350
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00642B394_2_00642B39
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_006463F14_2_006463F1
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063DC324_2_0063DC32
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063ECE94_2_0063ECE9
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064EDE84_2_0064EDE8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00642DB44_2_00642DB4
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00645DB84_2_00645DB8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064F6354_2_0064F635
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063D6344_2_0063D634
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00659EA04_2_00659EA0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00635E834_2_00635E83
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_006327594_2_00632759
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00644FB44_2_00644FB4
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00633F954_2_00633F95
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB7CB85_2_00FB7CB8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBB4505_2_00FBB450
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB08485_2_00FB0848
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBB1905_2_00FBB190
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBC9705_2_00FBC970
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB5A505_2_00FB5A50
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB63785_2_00FB6378
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB3B305_2_00FB3B30
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBFC885_2_00FBFC88
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBA0385_2_00FBA038
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB59A85_2_00FB59A8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBED485_2_00FBED48
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBA2B05_2_00FBA2B0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB4EA85_2_00FB4EA8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB4E985_2_00FB4E98
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB9E005_2_00FB9E00
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB07C75_2_00FB07C7
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB8B885_2_00FB8B88
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB97585_2_00FB9758
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FBAB505_2_00FBAB50
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_0115D8105_2_0115D810
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_01152B085_2_01152B08
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_01157D285_2_01157D28
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_0115D5505_2_0115D550
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_01155E205_2_01155E20
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011509B05_2_011509B0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011509C05_2_011509C0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011570205_2_01157020
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011510785_2_01151078
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011510805_2_01151080
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_0115C0C85_2_0115C0C8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011570F85_2_011570F8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_01152AF75_2_01152AF7
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_0115AD605_2_0115AD60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_01150CB05_2_01150CB0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_0115E6605_2_0115E660
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_0115BE905_2_0115BE90
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011516985_2_01151698
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011516885_2_01151688
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF98805_2_04AF9880
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF2B685_2_04AF2B68
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF54405_2_04AF5440
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF850B5_2_04AF850B
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF85185_2_04AF8518
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF36F85_2_04AF36F8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFC7105_2_04AFC710
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF98755_2_04AF9875
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFB1AC5_2_04AFB1AC
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFB1B85_2_04AFB1B8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFD1C95_2_04AFD1C9
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AFD1D85_2_04AFD1D8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_0AA700405_2_0AA70040
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 7_2_02620B607_2_02620B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 9_2_00A620309_2_00A62030
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 9_2_00A648609_2_00A64860
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 9_2_00A636609_2_00A63660
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 9_2_00A60B609_2_00A60B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 9_2_00A636509_2_00A63650
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 9_2_00A60B529_2_00A60B52
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 10_2_00E40B6010_2_00E40B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3C6B013_2_02C3C6B0
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C35A5013_2_02C35A50
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C33E7B13_2_02C33E7B
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C363B713_2_02C363B7
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3D49813_2_02C3D498
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C37CB813_2_02C37CB8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3084813_2_02C30848
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C36DE113_2_02C36DE1
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3B19013_2_02C3B190
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C34E9813_2_02C34E98
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C34EA813_2_02C34EA8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3A2B013_2_02C3A2B0
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C39E0013_2_02C39E00
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C35A3713_2_02C35A37
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C363C713_2_02C363C7
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C38B8813_2_02C38B88
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3AB5013_2_02C3AB50
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3975813_2_02C39758
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3FC8813_2_02C3FC88
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3A03813_2_02C3A038
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3083813_2_02C30838
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C3ED4813_2_02C3ED48
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CDD55013_2_04CDD550
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD7D2813_2_04CD7D28
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CDD8C813_2_04CDD8C8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD604713_2_04CD6047
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD2B0813_2_04CD2B08
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD0CB013_2_04CD0CB0
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CDAD6013_2_04CDAD60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD168813_2_04CD1688
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD169813_2_04CD1698
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CDBE9013_2_04CDBE90
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CDE66013_2_04CDE660
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CDC0C813_2_04CDC0C8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD70F813_2_04CD70F8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD108013_2_04CD1080
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD107313_2_04CD1073
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD702E13_2_04CD702E
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD09C013_2_04CD09C0
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD09B013_2_04CD09B0
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD2AF713_2_04CD2AF7
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_053A000613_2_053A0006
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_053A004013_2_053A0040
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063A988013_2_063A9880
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AC71013_2_063AC710
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063A544013_2_063A5440
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063A851813_2_063A8518
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063A850A13_2_063A850A
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063A987513_2_063A9875
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AB1B813_2_063AB1B8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AB1AC13_2_063AB1AC
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AD1D813_2_063AD1D8
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_063AD1C913_2_063AD1C9
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 14_2_01220B6014_2_01220B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 15_2_010A0B6015_2_010A0B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 16_2_01540B6016_2_01540B60
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 17_2_01310B6017_2_01310B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B5A5023_2_026B5A50
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B637823_2_026B6378
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B084823_2_026B0848
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BB45023_2_026BB450
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B7CB823_2_026B7CB8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BC97023_2_026BC970
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B3D2A23_2_026B3D2A
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B6DDB23_2_026B6DDB
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BB19023_2_026BB190
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B9E0023_2_026B9E00
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B4EA823_2_026B4EA8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BA2B023_2_026BA2B0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B4E9823_2_026B4E98
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B975823_2_026B9758
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BAB5023_2_026BAB50
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B07C723_2_026B07C7
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B8B8823_2_026B8B88
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BA03823_2_026BA038
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BFC8823_2_026BFC88
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026BED4823_2_026BED48
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B593623_2_026B5936
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B59A823_2_026B59A8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_026B3DB223_2_026B3DB2
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_04977D2823_2_04977D28
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497D55023_2_0497D550
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_04975E2023_2_04975E20
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497D8C823_2_0497D8C8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_04972B0823_2_04972B08
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497F34023_2_0497F340
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_04970CB023_2_04970CB0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497ED9023_2_0497ED90
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497AD6023_2_0497AD60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497BE9023_2_0497BE90
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497169823_2_04971698
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497168823_2_04971688
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497E66023_2_0497E660
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497DF3823_2_0497DF38
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497108023_2_04971080
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497C0C823_2_0497C0C8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_049770F823_2_049770F8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497702023_2_04977020
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0497107323_2_04971073
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_049709B023_2_049709B0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_049709C023_2_049709C0
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_04972AF723_2_04972AF7
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0601000723_2_06010007
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0601002723_2_06010027
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0601004023_2_06010040
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_07250D9823_2_07250D98
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725544023_2_07255440
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725988023_2_07259880
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725C71023_2_0725C710
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725850923_2_07258509
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725851823_2_07258518
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725B1AC23_2_0725B1AC
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725B1B823_2_0725B1B8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725D1C923_2_0725D1C9
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725D1D823_2_0725D1D8
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 23_2_0725987523_2_07259875
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 24_2_03070B6024_2_03070B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 25_2_01240B6025_2_01240B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 26_2_01220B6026_2_01220B60
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 27_2_01950B6027_2_01950B60
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: String function: 00CACDF0 appears 37 times
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: String function: 00CAD810 appears 31 times
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: String function: 00CACEC0 appears 53 times
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: String function: 0064CDF0 appears 37 times
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: String function: 0064CEC0 appears 53 times
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: String function: 0064D810 appears 31 times
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 80
                      Source: vkXe5gkY34.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: efthfxj.exe.4.drStatic PE information: Section: ?TBQo ZLIB complexity 1.0003601866883116
                      Source: efthfxj.exe.7.drStatic PE information: Section: ?TBQo ZLIB complexity 1.0003601866883116
                      Source: 5.2.efthfxj.exe.2a6d5ec.2.raw.unpack, Encryption.csCryptographic APIs: 'CreateDecryptor'
                      Source: 13.2.efthfxj.exe.2c5bbcc.0.raw.unpack, Encryption.csCryptographic APIs: 'CreateDecryptor'
                      Source: 23.2.efthfxj.exe.28febf8.0.raw.unpack, Encryption.csCryptographic APIs: 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@40/6@0/1
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CA8BCF FindResourceW,DeleteObject,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00CA8BCF
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeFile created: C:\Users\user\AppData\Roaming\__tmp_rar_sfx_access_check_4282234Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMutant created: \Sessions\1\BaseNamedObjects\Holid_rat_nd8859g-admin
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5996:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7684:120:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3504
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3BF9.tmpJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCommand line argument: sfxname0_2_00CAC130
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCommand line argument: sfxstime0_2_00CAC130
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCommand line argument: STARTDLG0_2_00CAC130
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCommand line argument: *xh4_2_0064C130
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCommand line argument: *ag4_2_0064C130
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCommand line argument: 8yh4_2_0064C130
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCommand line argument: sfxname4_2_0064C130
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCommand line argument: sfxstime4_2_0064C130
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCommand line argument: STARTDLG4_2_0064C130
                      Source: vkXe5gkY34.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeFile read: C:\Windows\win.iniJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: vkXe5gkY34.exeVirustotal: Detection: 29%
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeFile read: C:\Users\user\Desktop\vkXe5gkY34.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\vkXe5gkY34.exe "C:\Users\user\Desktop\vkXe5gkY34.exe"
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\eystsdf.cmd" "
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.sfx.exe efthfxj.sfx.exe -pgtrfdewscbsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\user\AppData\Roaming
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe "C:\Users\user\AppData\Roaming\efthfxj.exe"
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 80
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe "C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe"
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\eystsdf.cmd" "Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.sfx.exe efthfxj.sfx.exe -pgtrfdewscbsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe "C:\Users\user\AppData\Roaming\efthfxj.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe "C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /FJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: vkXe5gkY34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: vkXe5gkY34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: vkXe5gkY34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: vkXe5gkY34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: vkXe5gkY34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: vkXe5gkY34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: vkXe5gkY34.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: vkXe5gkY34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: vkXe5gkY34.exe, efthfxj.sfx.exe.0.dr
                      Source: vkXe5gkY34.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: vkXe5gkY34.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: vkXe5gkY34.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: vkXe5gkY34.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: vkXe5gkY34.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeUnpacked PE file: 5.2.efthfxj.exe.750000.0.unpack ?TBQo:EW;.text:ER;.rsrc:R;Unknown_Section3:ER;.reloc:R; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:ER;Unknown_Section4:R;
                      Source: 5.2.efthfxj.exe.2a6d5ec.2.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[])
                      Source: 5.2.efthfxj.exe.2a6d5ec.2.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler
                      Source: 13.2.efthfxj.exe.2c5bbcc.0.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[])
                      Source: 13.2.efthfxj.exe.2c5bbcc.0.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler
                      Source: 23.2.efthfxj.exe.28febf8.0.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[])
                      Source: 23.2.efthfxj.exe.28febf8.0.raw.unpack, DllHandler.cs.Net Code: DllNodeHandler
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeFile created: C:\Users\user\AppData\Roaming\__tmp_rar_sfx_access_check_4282234Jump to behavior
                      Source: efthfxj.exe.4.drStatic PE information: section name: ?TBQo
                      Source: efthfxj.exe.4.drStatic PE information: section name:
                      Source: efthfxj.exe.7.drStatic PE information: section name: ?TBQo
                      Source: efthfxj.exe.7.drStatic PE information: section name:
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAD856 push ecx; ret 0_2_00CAD869
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CACDF0 push eax; ret 0_2_00CACE0E
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064D856 push ecx; ret 4_2_0064D869
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064CDF0 push eax; ret 4_2_0064CE0E
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB3A36 pushad ; iretd 5_2_00FB3A37
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_01154849 push ebp; retf 5_2_0115484A
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011555E3 push cs; retf 5_2_011555E5
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_011557E2 push ecx; iretd 5_2_011557E4
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_04AF6B97 push 8BFFFFFFh; retf 5_2_04AF6B9D
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C36AC3 push 6A9902C3h; ret 13_2_02C36AD2
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C36AA1 push 698702C3h; ret 13_2_02C36AB6
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C35A1F push esp; ret 13_2_02C35A22
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C35A2F push ecx; ret 13_2_02C35A32
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C33A36 pushad ; iretd 13_2_02C33A37
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C33B57 push cs; ret 13_2_02C33B5E
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C33B6F push ds; ret 13_2_02C33B7E
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C33CFF push ss; ret 13_2_02C33D0A
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359C7 push eax; ret 13_2_02C359CE
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359D7 push ebp; ret 13_2_02C359DE
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359DF push eax; ret 13_2_02C359E6
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359EB push esp; ret 13_2_02C359EE
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359EF push ebx; ret 13_2_02C359F6
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359F7 push ebx; ret 13_2_02C359FA
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359FB push edi; ret 13_2_02C359FE
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359FF push edx; ret 13_2_02C35A06
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359BB push edx; ret 13_2_02C359BE
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C359BF push ebp; ret 13_2_02C359C2
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_02C33D13 push ss; ret 13_2_02C33D1A
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD55E3 push cs; retf 13_2_04CD55E5
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD57E2 push ecx; iretd 13_2_04CD57E4
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeCode function: 13_2_04CD4849 push ebp; retf 13_2_04CD484A
                      Source: efthfxj.exe.4.drStatic PE information: section name: ?TBQo entropy: 7.999185110388199
                      Source: efthfxj.exe.7.drStatic PE information: section name: ?TBQo entropy: 7.999185110388199
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeFile created: C:\Users\user\AppData\Roaming\efthfxj.exeJump to dropped file
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeFile created: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeFile created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: FB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 2A60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 4A60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 5150000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 6150000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 6280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 7280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 75D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 85D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 95D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: A850000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: B850000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: BCE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: CCE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 5150000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 6280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 75D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 85D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 95D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 25E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 2750000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: A60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 27A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 47A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: E40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 27F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 47F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 2C30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 2C50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 4C50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 5360000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 6360000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 6490000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 7490000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 77E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 87E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 5360000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 87E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 98E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 77E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: A8E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 6AD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 5360000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 1220000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 2C10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 4C10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 10A0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 2B40000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 4B40000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 1540000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 2DD0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 2BC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 1310000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 2FC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory allocated: 4FC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 2610000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 28F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 48F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 4FC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 5FC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 60F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 70F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 7440000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 8440000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 4FC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 60F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 7440000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 9640000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: A640000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 8940000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: B640000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 4FC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 5FD0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 7440000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 3070000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 31F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 51F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 1240000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 2BB0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 4BB0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 1220000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 2FA0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 2EA0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 1950000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 32D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: 52D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeCode function: 5_2_00FB6180 sgdt fword ptr [ecx]5_2_00FB6180
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeWindow / User API: threadDelayed 1248Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeWindow / User API: threadDelayed 8607Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 5504Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 6540Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep count: 31 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -60400s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 6528Thread sleep count: 1248 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -60275s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 6528Thread sleep count: 8607 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -60163s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -60051s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -59931s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -59814s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -59666s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -59521s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -59400s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -59290s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58977s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58869s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58759s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58650s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58540s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58431s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58322s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58213s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -58103s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57994s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57885s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57775s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57666s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57556s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57447s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57338s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57228s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -57115s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56994s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56861s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56728s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56616s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56508s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56398s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56291s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56181s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -56072s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55963s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55853s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55744s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55634s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55525s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55415s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55306s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55197s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -55088s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -54978s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -54869s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -54759s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 3376Thread sleep time: -54650s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 6204Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe TID: 6256Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe TID: 5908Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe TID: 7172Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe TID: 7204Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe TID: 7240Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 7760Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 7844Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 7864Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 7912Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exe TID: 7920Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9A2C3 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00C9A2C3
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CB7D69 FindFirstFileExA,0_2_00CB7D69
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAA536 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00CAA536
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0063A2C3 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_0063A2C3
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00657D69 FindFirstFileExA,4_2_00657D69
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064A536 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_0064A536
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAC8D4 VirtualQuery,GetSystemInfo,0_2_00CAC8D4
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 60400Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 60275Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 60163Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 60051Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 59931Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 59814Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 59666Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 59521Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 59400Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 59290Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58977Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58869Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58759Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58650Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58540Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58431Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58322Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58213Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 58103Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57994Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57885Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57775Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57666Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57556Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57447Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57338Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57228Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 57115Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56994Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56861Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56728Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56616Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56508Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56398Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56291Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56181Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 56072Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55963Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55853Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55744Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55634Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55525Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55415Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55306Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55197Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 55088Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 54978Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 54869Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 54759Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 54650Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeThread delayed: delay time: 922337203685477
                      Source: vkXe5gkY34.exe, 00000000.00000003.2032555745.00000000007AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: efthfxj.sfx.exe, 00000004.00000003.2051399058.0000000000DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                      Source: efthfxj.exe, 00000009.00000002.3278672788.0000000000B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeAPI call chain: ExitProcess graph end nodegraph_0-23523
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeAPI call chain: ExitProcess graph end nodegraph_4-22562
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CADA15 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CADA15
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CB49FA mov eax, dword ptr fs:[00000030h]0_2_00CB49FA
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_006549FA mov eax, dword ptr fs:[00000030h]4_2_006549FA
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CB8A9B GetProcessHeap,0_2_00CB8A9B
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CADA15 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CADA15
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CB5B43 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CB5B43
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CADB63 SetUnhandledExceptionFilter,0_2_00CADB63
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CADD1B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00CADD1B
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064DA15 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0064DA15
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064DB63 SetUnhandledExceptionFilter,4_2_0064DB63
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_00655B43 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00655B43
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: 4_2_0064DD1B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0064DD1B
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\efthfxj.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\efthfxj.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\efthfxj.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\efthfxj.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\efthfxj.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\efthfxj.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeMemory written: C:\Users\user\AppData\Roaming\efthfxj.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\eystsdf.cmd" "Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.sfx.exe efthfxj.sfx.exe -pgtrfdewscbsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe "C:\Users\user\AppData\Roaming\efthfxj.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe "C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /FJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeProcess created: C:\Users\user\AppData\Roaming\efthfxj.exe C:\Users\user\AppData\Roaming\efthfxj.exe
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAD86B cpuid 0_2_00CAD86B
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00CA932E
                      Source: C:\Users\user\AppData\Roaming\efthfxj.sfx.exeCode function: GetLocaleInfoW,GetNumberFormatW,4_2_0064932E
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeQueries volume information: C:\Users\user\AppData\Roaming\efthfxj.exe VolumeInformation
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00CAC130 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,0_2_00CAC130
                      Source: C:\Users\user\Desktop\vkXe5gkY34.exeCode function: 0_2_00C9A930 GetVersionExW,0_2_00C9A930
                      Source: C:\Users\user\AppData\Roaming\efthfxj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 10.2.efthfxj.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.efthfxj.exe.28febf8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.efthfxj.exe.2a6d5ec.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.efthfxj.exe.2c5bbcc.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.efthfxj.exe.2c5bbcc.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.efthfxj.exe.2c5b3cc.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.efthfxj.exe.2a6d5ec.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.efthfxj.exe.28febf8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.efthfxj.exe.28fb324.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002C94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2060330225.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002C85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.2699568740.0000000002B22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.2699568740.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002EA5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002CB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 4052, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 1076, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 3992, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 7740, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 10.2.efthfxj.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.efthfxj.exe.28febf8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.efthfxj.exe.2a6d5ec.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.efthfxj.exe.2c5bbcc.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.efthfxj.exe.2c5bbcc.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.efthfxj.exe.2c5b3cc.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.efthfxj.exe.2a6d5ec.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.efthfxj.exe.28febf8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.efthfxj.exe.28fb324.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002C94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2060330225.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002C85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.2699568740.0000000002B22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.2699568740.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2089629416.0000000002EA5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2076384338.0000000002CB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 4052, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 1076, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 3992, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: efthfxj.exe PID: 7740, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      111
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory131
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      51
                      Virtualization/Sandbox Evasion
                      Security Account Manager51
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                      Deobfuscate/Decode Files or Information
                      LSA Secrets2
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                      Obfuscated Files or Information
                      Cached Domain Credentials35
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items23
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1483406 Sample: vkXe5gkY34.exe Startdate: 27/07/2024 Architecture: WINDOWS Score: 100 81 Found malware configuration 2->81 83 Sigma detected: Scheduled temp file as task from temp location 2->83 85 Multi AV Scanner detection for submitted file 2->85 87 6 other signatures 2->87 11 vkXe5gkY34.exe 8 2->11         started        14 efthfxj.exe 2->14         started        process3 file4 67 C:\Users\user\AppData\...\efthfxj.sfx.exe, PE32 11->67 dropped 17 cmd.exe 1 11->17         started        91 Injects a PE file into a foreign processes 14->91 19 efthfxj.exe 14->19         started        21 efthfxj.exe 14->21         started        23 efthfxj.exe 14->23         started        25 efthfxj.exe 14->25         started        signatures5 process6 process7 27 efthfxj.sfx.exe 7 17->27         started        31 conhost.exe 17->31         started        file8 69 C:\Users\user\AppData\Roaming\efthfxj.exe, PE32 27->69 dropped 89 Multi AV Scanner detection for dropped file 27->89 33 efthfxj.exe 1 27->33         started        signatures9 process10 signatures11 73 Antivirus detection for dropped file 33->73 75 Multi AV Scanner detection for dropped file 33->75 77 Detected unpacking (changes PE section rights) 33->77 79 3 other signatures 33->79 36 efthfxj.exe 3 33->36         started        39 efthfxj.exe 5 33->39         started        42 efthfxj.exe 33->42         started        44 efthfxj.exe 2 33->44         started        process12 dnsIp13 63 C:\Users\user\AppData\Roaming\...\efthfxj.exe, PE32 36->63 dropped 46 efthfxj.exe 36->46         started        71 45.66.231.63, 1243, 49710, 49711 CMCSUS Germany 39->71 65 C:\Users\user\AppData\Local\...\tmp3BF9.tmp, ASCII 39->65 dropped 49 schtasks.exe 39->49         started        51 WerFault.exe 2 42->51         started        file14 process15 signatures16 93 Antivirus detection for dropped file 46->93 95 Multi AV Scanner detection for dropped file 46->95 97 Machine Learning detection for dropped file 46->97 99 Injects a PE file into a foreign processes 46->99 53 efthfxj.exe 2 46->53         started        55 efthfxj.exe 46->55         started        57 efthfxj.exe 46->57         started        59 efthfxj.exe 46->59         started        61 conhost.exe 49->61         started        process17

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      vkXe5gkY34.exe30%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\efthfxj.exe100%AviraHEUR/AGEN.1357819
                      C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe100%AviraHEUR/AGEN.1357819
                      C:\Users\user\AppData\Roaming\efthfxj.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe51%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\efthfxj.exe51%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\efthfxj.sfx.exe15%VirustotalBrowse
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      45.66.231.630%Avira URL Cloudsafe
                      http://go.microsoft.c0%Avira URL Cloudsafe
                      45.66.231.631%VirustotalBrowse
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      45.66.231.63true
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://go.microsoft.cefthfxj.exe, 00000018.00000002.2690514135.00000000013B7000.00000004.00000020.00020000.00000000.sdmp, efthfxj.exe, 0000001B.00000002.2694307250.0000000001786000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      45.66.231.63
                      unknownGermany
                      33657CMCSUStrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1483406
                      Start date and time:2024-07-27 10:21:10 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 38s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:28
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:vkXe5gkY34.exe
                      renamed because original name is a hash value
                      Original Sample Name:88696cf17417a2339b63f9452404c839.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@40/6@0/1
                      EGA Information:
                      • Successful, ratio: 31.2%
                      HCA Information:
                      • Successful, ratio: 92%
                      • Number of executed functions: 364
                      • Number of non-executed functions: 139
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target efthfxj.exe, PID 1076 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 1084 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 1276 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 4276 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 5968 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 6200 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 7196 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 7800 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 7808 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 7836 because it is empty
                      • Execution Graph export aborted for target efthfxj.exe, PID 7868 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      04:22:04API Interceptor63969x Sleep call for process: efthfxj.exe modified
                      10:23:07Task SchedulerRun new task: HDdisplay path: C:\Users\user\AppData\Roaming\efthfxj.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      45.66.231.63ansUFyC1K3.exeGet hashmaliciousXenoRATBrowse
                        qG18PE7Lnn.exeGet hashmaliciousXenoRATBrowse
                          PAGO_Transferencia.lnk.lnkGet hashmaliciousXenoRATBrowse
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CMCSUSansUFyC1K3.exeGet hashmaliciousXenoRATBrowse
                            • 45.66.231.63
                            qG18PE7Lnn.exeGet hashmaliciousXenoRATBrowse
                            • 45.66.231.63
                            PAGO_Transferencia.lnk.lnkGet hashmaliciousXenoRATBrowse
                            • 45.66.231.63
                            LisectAVT_2403002A_315.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            • 85.209.133.133
                            042240724.xlsGet hashmaliciousRemcosBrowse
                            • 45.66.231.190
                            Lisect_AVT_24003_G1B_122.exeGet hashmaliciousUnknownBrowse
                            • 45.90.89.20
                            Lisect_AVT_24003_G1B_122.exeGet hashmaliciousUnknownBrowse
                            • 45.90.89.20
                            d5a0aabdcffd82e4ef4eb190884c48b21291728680901dffae16813298a10830.exeGet hashmaliciousBdaejec, GCleaner, NymaimBrowse
                            • 171.22.30.106
                            9608e7d593a0671671e3b7e23d1b1fcfe49a5f84da9d2e0c5560d63b091acd83.exeGet hashmaliciousBdaejec, GCleaner, NymaimBrowse
                            • 171.22.30.106
                            508d7b73983eafe87b28017174258977f48fc25b9ad2e00595a9d43de40aafd7.exeGet hashmaliciousBdaejec, GCleaner, NymaimBrowse
                            • 171.22.30.106
                            No context
                            No context
                            Process:C:\Users\user\AppData\Roaming\efthfxj.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):522
                            Entropy (8bit):5.358731107079437
                            Encrypted:false
                            SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLU84qpE4KlKDE4KhKiKhk
                            MD5:93E4C46884CB6EE7CDCC4AACE78CDFAC
                            SHA1:29B12D9409BA9AFE4C949F02F7D232233C0B5228
                            SHA-256:2690023A62F22AB7B27B09351205BA31173B50B77ACA89A5759EDF29A1FB17F7
                            SHA-512:E9C3E2FCEE4E13F7776665295A4F6085002913E011BEEF32C8E7065140937DDE1963182B547CC75110BF32AE5130A6686D5862076D5FFED9241F183B9217FA4D
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                            Process:C:\Users\user\AppData\Roaming\efthfxj.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):1032
                            Entropy (8bit):3.8334430427131263
                            Encrypted:false
                            SSDEEP:12:FLJ+DW2SFFkFmMMLGId1L6AEJl7XpShhJKShe/Q0QK1++SHXOdxv3n:FLJ+S3Mmd1L6ztMhEMOQ0Q+Txvn
                            MD5:4F3C76DFEC5D54EF5E1441ABEE1254F8
                            SHA1:5037A1ECCE0F04A17ADE209F6084D49DA27EB5FB
                            SHA-256:703AB61DD98A2F61A384E25F4BB5E5CCC03F6816FB983FC68A71E66896F5DE70
                            SHA-512:F29B42CB0A5CCF2107AED4ECD4C9DE25C99003BAFC1006806F19C9653B287891F632ADBFADBCB9E3F3F18464B9FEC404BCD566BE90861B0A5717337F60BF0FFC
                            Malicious:true
                            Preview:. <Task xmlns='http://schemas.microsoft.com/windows/2004/02/mit/task'>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. </LogonTrigger>. </Triggers>. <Principals>. <Principal id='Author'>. <LogonType>InteractiveToken</LogonType>. <RunLevel>HighestAvailable</RunLevel>. </Principal>. </Principals>. <Settings>. <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>. </Settings>. <Actions>. <Exec>. <Command>C:\Users\user\AppData\Roaming\efthfxj.exe</Command>. </Exec>. </
                            Process:C:\Users\user\AppData\Roaming\efthfxj.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):257024
                            Entropy (8bit):7.713951947790994
                            Encrypted:false
                            SSDEEP:6144:lVlX/ZBmQzSmsjICshnbjEZHzsZ9fYoI:lTX/ZBmQzzsXWgzsZ9fYV
                            MD5:DCB591D1FC03274934709E24B502D719
                            SHA1:9D4172D007347A9AA54B48CB5A214A792AD03708
                            SHA-256:C7E67928407DC0D2FE2A61E10E2F97104986770B6BA6E59F8FAA7B6FCC595028
                            SHA-512:1D6748BDD0BBFBE4D1F15DDE0AF015FB08814FFC3360B215D4F56844B15AE1D4B29ADE922678439C3A07F1FA41DA287A1054B0EB5853A761AE2FABB4B08B2800
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: Virustotal, Detection: 51%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.............................@...@... ....@.. ....................................`..................................a..K.... .......................`.......................................................@...............@..H...........?T.B.Qo...... ......................@....text...d....@...................... ..`.rsrc........ ......................@..@.............@...................... ..`.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Roaming\efthfxj.sfx.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):257024
                            Entropy (8bit):7.713951947790994
                            Encrypted:false
                            SSDEEP:6144:lVlX/ZBmQzSmsjICshnbjEZHzsZ9fYoI:lTX/ZBmQzzsXWgzsZ9fYV
                            MD5:DCB591D1FC03274934709E24B502D719
                            SHA1:9D4172D007347A9AA54B48CB5A214A792AD03708
                            SHA-256:C7E67928407DC0D2FE2A61E10E2F97104986770B6BA6E59F8FAA7B6FCC595028
                            SHA-512:1D6748BDD0BBFBE4D1F15DDE0AF015FB08814FFC3360B215D4F56844B15AE1D4B29ADE922678439C3A07F1FA41DA287A1054B0EB5853A761AE2FABB4B08B2800
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: Virustotal, Detection: 51%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.............................@...@... ....@.. ....................................`..................................a..K.... .......................`.......................................................@...............@..H...........?T.B.Qo...... ......................@....text...d....@...................... ..`.rsrc........ ......................@..@.............@...................... ..`.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\vkXe5gkY34.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):485886
                            Entropy (8bit):7.478996506813336
                            Encrypted:false
                            SSDEEP:12288:WcrNS33L10QdrX2oVnaeIZuIlS+fc7Re7RR:FNA3R5drXxV/IUuG7077
                            MD5:642A150BE5BBED12C85DFF794B955C01
                            SHA1:115DE36F192E2BB10EC7C2C8BBA9BF3DD639B461
                            SHA-256:DED2B1A499BA8AC097361B01B1E56BDAA67769C0B7130489AF489BEF58CB5DFC
                            SHA-512:D4A8249BC53BD070BFB8C0CDD703980AC4B12E0A0354A31333D7BF0AF089EDC1317C3005E99CDD3247B883CE72D10158E928D54664941010EE884FB4A5B1CE42
                            Malicious:true
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 15%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~............b......b..<....b.....)^......................................... ...... ......%...... ......Rich............PE..L......\............................Y.............@..........................@............@.............................4......<........N................... .......n..T...........................(...@...............\...L... ....................text...T........................... ..`.rdata..............................@..@.data...............................@....gfids..............................@..@.rsrc....N.......P..................@..@.reloc....... ... ..................@..B................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\vkXe5gkY34.exe
                            File Type:DOS batch file, ASCII text, with very long lines (18697), with CRLF line terminators
                            Category:dropped
                            Size (bytes):18807
                            Entropy (8bit):4.867858170902055
                            Encrypted:false
                            SSDEEP:384:b55S5l5LNraGP34HAXtn8tzv3kFjCSQGi:bKnP4HAdKzvGuEi
                            MD5:FA0FDC18CCCB4A2FB162362848D10D73
                            SHA1:9CCAB8577C310E19E1299FB7FCAD538C72A36420
                            SHA-256:C3F004C34695080E75DF6DCCC39DAE9E269EBA7164AA0F95B9964078973F3736
                            SHA-512:FCCE03713D22D8831CB8F792C9E367AEB4D3714FFB89F148F2B64AE32BB066F7AB0B5EA58778309A86584AF8169A75BB7325BA6505567881BD330CDEAD222FD3
                            Malicious:false
                            Preview:@echo off..hvcffaoshebasajwvdJVSgvCAGvdqueqfggwdvkavgififvyggiysyrfgbskffkevahegkyegrayveryfDVgygeqgbdsfysayXFDRTXJFSSTDJFKAFEWVFAVGDyskbgsyureigyreavshfvsafvvafvasygurigyaufyufgaygyueigaiygefyafetyfgayfdiaefaaugaryguaeiratakejgr67t44qgqvgmqvafbhjzddfhvababevwefsbfqyfekybfyugyetatfefevfhvemfHVfgdffertwgbfkiokkghsfaqwsaxxsferyrjgjggjhrjlnkuhhkhhhdgsgfgzsydgvfzhvfgesifaskfbbsamzhdvhHGfdawteufkksgkfskydsdygvgcjfdFDTRdrDCKVfTDufKCcftgfTFYFYTFTDXCDRYedrcyfvkvjfcfxydrcuvjvgjgdfstwarwzswzyxtfiytfrdeswzezesxfghjjkkpkoinbhvgceswwsexchghuijokpkiuhgytfdresdfygbniomplkonjbhvgtfdrdtfyhfgfdgfhgjvhgcdfdfygreaefyafetyfgayfXfdxDXJXFDRTXJFSSTDJFKAFETCGFXJrhddcjtzsdgkaufefyafduayfdtfaoshebasgkjdbkjdbKJBdgavskgheafgvegfvKSDHGvNiofhonagorhajebkakygrywberwveyfayfuvFUfvGjbgvbfhcdgxchCdccCHvmdvrvgjvjgvGAEFIVAYGEYWAIRIYBEHABHGDEVGAVEefuyfuaAVvskgheafgvegfvKSDHGvNiofhonagorhajebkakygrywberwveyfayfuvFUfvGjbgvbfhcdgxchCdccCHvmdvrvgjvjgvGAEFIVAYGEYWAIRIYBEHABHGDEVGAVEefuyfuaAVJDKUAYGDyuagfeugfghvhvjvgkghhogtsiojoi
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.650345996336696
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:vkXe5gkY34.exe
                            File size:629'724 bytes
                            MD5:88696cf17417a2339b63f9452404c839
                            SHA1:2123ca0e3764ba65e421d3b5dd7453da955d36f2
                            SHA256:a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895
                            SHA512:a4236f6d52b985420dc733998842815fd24f12236bdbf3b885ed9a15c0d4815dec439cf919925b4b903ac158aba1ba2a8bf9eff20af7134d2e4edbce226f7931
                            SSDEEP:12288:WcrNS33L10QdrX2ZVncWqvo2GAhcWMuql8lPtahdkkB183kD:FNA3R5drXwVcWWyLZ8db3kD
                            TLSH:47D40102B7D644B2E6721D364939B71169BCB9701F35DA2FB3C84D7ECA34180A625BB3
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........~..............b.......b..<....b......)^...................................................... ....... .......%....... ......
                            Icon Hash:1b31714d6c600107
                            Entrypoint:0x41d759
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x5CC4B58F [Sat Apr 27 20:03:27 2019 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:00be6e6c4f9e287672c8301b72bdabf3
                            Instruction
                            call 00007FE8410661DFh
                            jmp 00007FE841065C13h
                            cmp ecx, dword ptr [0043A1C8h]
                            jne 00007FE841065D85h
                            ret
                            jmp 00007FE841066355h
                            and dword ptr [ecx+04h], 00000000h
                            mov eax, ecx
                            and dword ptr [ecx+08h], 00000000h
                            mov dword ptr [ecx+04h], 00430FE8h
                            mov dword ptr [ecx], 00431994h
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            push dword ptr [ebp+08h]
                            mov esi, ecx
                            call 00007FE84105932Bh
                            mov dword ptr [esi], 004319A0h
                            mov eax, esi
                            pop esi
                            pop ebp
                            retn 0004h
                            and dword ptr [ecx+04h], 00000000h
                            mov eax, ecx
                            and dword ptr [ecx+08h], 00000000h
                            mov dword ptr [ecx+04h], 004319A8h
                            mov dword ptr [ecx], 004319A0h
                            ret
                            push ebp
                            mov ebp, esp
                            sub esp, 0Ch
                            lea ecx, dword ptr [ebp-0Ch]
                            call 00007FE841065D2Ch
                            push 00437B74h
                            lea eax, dword ptr [ebp-0Ch]
                            push eax
                            call 00007FE841068616h
                            int3
                            push ebp
                            mov ebp, esp
                            sub esp, 0Ch
                            lea ecx, dword ptr [ebp-0Ch]
                            call 00007FE841065D42h
                            push 00437DA4h
                            lea eax, dword ptr [ebp-0Ch]
                            push eax
                            call 00007FE8410685F9h
                            int3
                            jmp 00007FE84106A645h
                            jmp dword ptr [0043025Ch]
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            push 004209A0h
                            push dword ptr fs:[00000000h]
                            mov eax, dword ptr [esp+10h]
                            Programming Language:
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [C++] VS2015 UPD3.1 build 24215
                            • [EXP] VS2015 UPD3.1 build 24215
                            • [RES] VS2015 UPD3 build 24213
                            • [LNK] VS2015 UPD3.1 build 24215
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x38cc00x34.rdata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x38cf40x3c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x4eac.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x620000x1fcc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x36ee00x54.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x319280x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x300000x25c.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3824c0x120.rdata
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x2e8540x2ea00ccad881ef663bb12d11d212ad8d163cfFalse0.5908910020107239data6.692309727721094IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x300000x9a9c0x9c00ebf57dd1488cef86d0b062881c11f0b5False0.45713141025641024DOS executable (COM, 0x8C-variant)5.132864674560433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x3a0000x213d00xc005ad01ef583f971c2dd5921663e32ad91False0.2802734375data3.2538110320804736IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .gfids0x5c0000xe80x200c065e0fa9d7cb760ad786f44f86f68e4False0.33984375data2.1115417744603624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x5d0000x4eac0x50009284a5fa8e3ef6a369520a2292cb904dFalse0.602099609375data6.310407478429721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x620000x1fcc0x2000403c5d759dbe4b1bf3c74568f06c1359False0.7945556640625data6.645541352233445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            PNG0x5d5240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                            PNG0x5e06c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                            RT_ICON0x5f6180x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4559248554913295
                            RT_DIALOG0x5fb800x286dataEnglishUnited States0.5030959752321982
                            RT_DIALOG0x5fe080x13adataEnglishUnited States0.6050955414012739
                            RT_DIALOG0x5ff440xecdataEnglishUnited States0.6991525423728814
                            RT_DIALOG0x600300x12edataEnglishUnited States0.5860927152317881
                            RT_DIALOG0x601600x338dataEnglishUnited States0.44538834951456313
                            RT_DIALOG0x604980x252dataEnglishUnited States0.5757575757575758
                            RT_STRING0x606ec0x1e2dataEnglishUnited States0.3900414937759336
                            RT_STRING0x608d00x1ccdataEnglishUnited States0.4282608695652174
                            RT_STRING0x60a9c0x1eedataEnglishUnited States0.451417004048583
                            RT_STRING0x60c8c0x146dataEnglishUnited States0.5153374233128835
                            RT_STRING0x60dd40x446dataEnglishUnited States0.340036563071298
                            RT_STRING0x6121c0x166dataEnglishUnited States0.49162011173184356
                            RT_STRING0x613840x120dataEnglishUnited States0.5451388888888888
                            RT_STRING0x614a40x10adataEnglishUnited States0.49624060150375937
                            RT_STRING0x615b00xbcdataEnglishUnited States0.6329787234042553
                            RT_STRING0x6166c0xd6dataEnglishUnited States0.5747663551401869
                            RT_GROUP_ICON0x617440x14data1.1
                            RT_MANIFEST0x617580x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                            DLLImport
                            KERNEL32.dllGetLastError, SetLastError, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                            gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                            2024-07-27T10:22:21.901268+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970420.114.59.183192.168.2.5
                            2024-07-27T10:23:00.133191+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970920.114.59.183192.168.2.5
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 27, 2024 10:23:08.860959053 CEST497101243192.168.2.545.66.231.63
                            Jul 27, 2024 10:23:08.866863012 CEST12434971045.66.231.63192.168.2.5
                            Jul 27, 2024 10:23:08.866956949 CEST497101243192.168.2.545.66.231.63
                            Jul 27, 2024 10:23:30.235399008 CEST12434971045.66.231.63192.168.2.5
                            Jul 27, 2024 10:23:30.235750914 CEST497101243192.168.2.545.66.231.63
                            Jul 27, 2024 10:23:40.245168924 CEST497111243192.168.2.545.66.231.63
                            Jul 27, 2024 10:23:40.250247002 CEST12434971145.66.231.63192.168.2.5
                            Jul 27, 2024 10:23:40.250366926 CEST497111243192.168.2.545.66.231.63
                            Jul 27, 2024 10:24:01.643063068 CEST12434971145.66.231.63192.168.2.5
                            Jul 27, 2024 10:24:01.643426895 CEST497111243192.168.2.545.66.231.63
                            Jul 27, 2024 10:24:02.632186890 CEST497121243192.168.2.545.66.231.63
                            Jul 27, 2024 10:24:02.637434959 CEST12434971245.66.231.63192.168.2.5
                            Jul 27, 2024 10:24:02.637537003 CEST497121243192.168.2.545.66.231.63

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:04:22:01
                            Start date:27/07/2024
                            Path:C:\Users\user\Desktop\vkXe5gkY34.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\vkXe5gkY34.exe"
                            Imagebase:0xc90000
                            File size:629'724 bytes
                            MD5 hash:88696CF17417A2339B63F9452404C839
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:04:22:01
                            Start date:27/07/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\eystsdf.cmd" "
                            Imagebase:0x790000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:04:22:02
                            Start date:27/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:04:22:02
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.sfx.exe
                            Wow64 process (32bit):true
                            Commandline:efthfxj.sfx.exe -pgtrfdewscbsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\user\AppData\Roaming
                            Imagebase:0x630000
                            File size:485'886 bytes
                            MD5 hash:642A150BE5BBED12C85DFF794B955C01
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 15%, Virustotal, Browse
                            Reputation:low
                            Has exited:true

                            Target ID:5
                            Start time:04:22:03
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\efthfxj.exe"
                            Imagebase:0x750000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000005.00000002.2076384338.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000005.00000002.2076384338.0000000002C94000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000005.00000002.2076384338.0000000002C85000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000005.00000002.2076384338.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000005.00000002.2076384338.0000000002CB6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 51%, Virustotal, Browse
                            Reputation:low
                            Has exited:true

                            Target ID:6
                            Start time:04:22:04
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0x100000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Target ID:7
                            Start time:04:22:04
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0x460000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:9
                            Start time:04:22:04
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0x4f0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Target ID:10
                            Start time:04:22:04
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0x4d0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 0000000A.00000002.2060330225.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:12
                            Start time:04:22:04
                            Start date:27/07/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 80
                            Imagebase:0x4d0000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:04:22:04
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe"
                            Imagebase:0x7ff6d64d0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 0000000D.00000002.2089629416.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 0000000D.00000002.2089629416.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 0000000D.00000002.2089629416.0000000002E93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 0000000D.00000002.2089629416.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 0000000D.00000002.2089629416.0000000002EA5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 51%, Virustotal, Browse
                            Reputation:low
                            Has exited:true

                            Target ID:14
                            Start time:04:22:05
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Imagebase:0x8b0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:15
                            Start time:04:22:05
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Imagebase:0x820000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:16
                            Start time:04:22:05
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Imagebase:0xb80000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:17
                            Start time:04:22:06
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
                            Imagebase:0xc80000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:21
                            Start time:04:23:05
                            Start date:27/07/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F
                            Imagebase:0x250000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:22
                            Start time:04:23:05
                            Start date:27/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:23
                            Start time:04:23:07
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0x5d0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000017.00000002.2699568740.0000000002B22000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000017.00000002.2699568740.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:24
                            Start time:04:23:07
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0xf50000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:25
                            Start time:04:23:07
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0x8b0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:26
                            Start time:04:23:07
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0xbb0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:27
                            Start time:04:23:07
                            Start date:27/07/2024
                            Path:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\efthfxj.exe
                            Imagebase:0xfc0000
                            File size:257'024 bytes
                            MD5 hash:DCB591D1FC03274934709E24B502D719
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:10.3%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:9.8%
                              Total number of Nodes:1452
                              Total number of Limit Nodes:29
                              execution_graph 23878 ca86ca 21 API calls 23879 caaa98 101 API calls 4 library calls 23028 cac0cf 23029 cac0dc 23028->23029 23030 c9d192 54 API calls 23029->23030 23031 cac0f0 23030->23031 23032 c93f2b _swprintf 51 API calls 23031->23032 23033 cac102 SetDlgItemTextW 23032->23033 23036 ca991d PeekMessageW 23033->23036 23037 ca9938 GetMessageW TranslateMessage DispatchMessageW 23036->23037 23038 ca9959 23036->23038 23037->23038 23909 ca63c2 114 API calls 23809 caaa98 96 API calls 4 library calls 23910 cb7bd9 27 API calls 2 library calls 23857 cad5df 27 API calls pre_c_initialization 23810 ca7cdc GetClientRect 23811 c994d1 72 API calls 23912 cac3e9 19 API calls ___delayLoadHelper2@8 23168 c917ed 23169 c91803 23168->23169 23180 c9185e __vswprintf_c_l 23168->23180 23170 c9182c 23169->23170 23181 c96d8f 67 API calls __vswprintf_c_l 23169->23181 23172 c9188b 23170->23172 23173 c9184b ___std_exception_copy 23170->23173 23175 cb20ce 22 API calls 23172->23175 23173->23180 23183 c96dc7 68 API calls 23173->23183 23174 c91822 23182 c96dc7 68 API calls 23174->23182 23177 c91892 23175->23177 23177->23180 23184 c96dc7 68 API calls 23177->23184 23181->23174 23182->23170 23183->23180 23184->23180 23814 cb88ec GetCommandLineA GetCommandLineW 23815 cbc0e4 51 API calls 23880 cb6ef2 21 API calls 2 library calls 23817 cb34f1 QueryPerformanceFrequency QueryPerformanceCounter 23193 cad5f1 23194 cad5fd ___FrameUnwindToState 23193->23194 23219 cad109 23194->23219 23196 cad604 23198 cad62d 23196->23198 23296 cada15 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23196->23296 23206 cad66c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23198->23206 23230 cb571c 23198->23230 23202 cad64c ___FrameUnwindToState 23203 cad6cc 23238 cadb30 23203->23238 23206->23203 23297 cb471f 38 API calls 3 library calls 23206->23297 23214 cad6f8 23216 cad701 23214->23216 23298 cb4b07 28 API calls _abort 23214->23298 23299 cad280 13 API calls 2 library calls 23216->23299 23220 cad112 23219->23220 23300 cad86b IsProcessorFeaturePresent 23220->23300 23222 cad11e 23301 cb0b06 23222->23301 23224 cad123 23225 cad127 23224->23225 23310 cb558a 23224->23310 23225->23196 23228 cad13e 23228->23196 23231 cb5733 23230->23231 23232 cad763 DloadUnlock 5 API calls 23231->23232 23233 cad646 23232->23233 23233->23202 23234 cb56c0 23233->23234 23235 cb56ef 23234->23235 23236 cad763 DloadUnlock 5 API calls 23235->23236 23237 cb5718 23236->23237 23237->23206 23360 cade40 23238->23360 23241 cad6d2 23242 cb566d 23241->23242 23362 cb8549 23242->23362 23244 cb5676 23245 cad6db 23244->23245 23366 cb88d4 38 API calls 23244->23366 23247 cac130 23245->23247 23487 c9f3a5 23247->23487 23251 cac14f 23536 ca9035 23251->23536 23253 cac158 23540 ca0710 GetCPInfo 23253->23540 23255 cac162 ___scrt_get_show_window_mode 23256 cac175 GetCommandLineW 23255->23256 23257 cac202 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23256->23257 23258 cac184 23256->23258 23259 c93f2b _swprintf 51 API calls 23257->23259 23543 caa8d3 23258->23543 23261 cac26b SetEnvironmentVariableW GetModuleHandleW LoadIconW 23259->23261 23556 ca9a75 LoadBitmapW 23261->23556 23264 cac1fc 23550 cabe09 23264->23550 23265 cac192 OpenFileMappingW 23268 cac1ab MapViewOfFile 23265->23268 23269 cac1f2 CloseHandle 23265->23269 23271 cac1e9 UnmapViewOfFile 23268->23271 23272 cac1bc __vswprintf_c_l 23268->23272 23269->23257 23271->23269 23273 cabe09 2 API calls 23272->23273 23275 cac1d8 23273->23275 23274 cac2b2 23276 cac2c4 DialogBoxParamW 23274->23276 23275->23271 23277 cac2fe 23276->23277 23278 cac310 Sleep 23277->23278 23279 cac317 23277->23279 23278->23279 23281 cac325 23279->23281 23581 ca9236 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 23279->23581 23282 cac344 DeleteObject 23281->23282 23283 cac35b DeleteObject 23282->23283 23284 cac35e 23282->23284 23283->23284 23285 cac38f 23284->23285 23286 cac3a1 23284->23286 23582 cabe68 WaitForSingleObject PeekMessageW WaitForSingleObject 23285->23582 23579 ca909d 23286->23579 23288 cac395 CloseHandle 23288->23286 23290 cac3db 23291 cb4a3b GetModuleHandleW 23290->23291 23292 cad6ee 23291->23292 23292->23214 23293 cb4b64 23292->23293 23693 cb48e1 23293->23693 23296->23196 23297->23203 23298->23216 23299->23202 23300->23222 23302 cb0b0b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23301->23302 23314 cb1bde 23302->23314 23305 cb0b19 23305->23224 23307 cb0b21 23308 cb0b2c 23307->23308 23328 cb1c1a DeleteCriticalSection 23307->23328 23308->23224 23356 cb8ab6 23310->23356 23313 cb0b2f 8 API calls 3 library calls 23313->23225 23315 cb1be7 23314->23315 23317 cb1c10 23315->23317 23318 cb0b15 23315->23318 23329 cb1e72 23315->23329 23334 cb1c1a DeleteCriticalSection 23317->23334 23318->23305 23320 cb0c46 23318->23320 23349 cb1d87 23320->23349 23322 cb0c5b 23322->23307 23323 cb0c50 23323->23322 23354 cb1e35 6 API calls try_get_function 23323->23354 23325 cb0c69 23326 cb0c76 23325->23326 23355 cb0c79 6 API calls ___vcrt_FlsFree 23325->23355 23326->23307 23328->23305 23335 cb1c66 23329->23335 23332 cb1ea9 InitializeCriticalSectionAndSpinCount 23333 cb1e95 23332->23333 23333->23315 23334->23318 23336 cb1c9a 23335->23336 23338 cb1c96 23335->23338 23336->23332 23336->23333 23338->23336 23340 cb1cba 23338->23340 23342 cb1d06 23338->23342 23339 cb1cc6 GetProcAddress 23341 cb1cd6 __crt_fast_encode_pointer 23339->23341 23340->23336 23340->23339 23341->23336 23343 cb1d2e LoadLibraryExW 23342->23343 23344 cb1d23 23342->23344 23345 cb1d4a GetLastError 23343->23345 23348 cb1d62 23343->23348 23344->23338 23346 cb1d55 LoadLibraryExW 23345->23346 23345->23348 23346->23348 23347 cb1d79 FreeLibrary 23347->23344 23348->23344 23348->23347 23350 cb1c66 try_get_function 5 API calls 23349->23350 23351 cb1da1 23350->23351 23352 cb1db9 TlsAlloc 23351->23352 23353 cb1daa 23351->23353 23353->23323 23354->23325 23355->23322 23359 cb8acf 23356->23359 23357 cad763 DloadUnlock 5 API calls 23358 cad130 23357->23358 23358->23228 23358->23313 23359->23357 23361 cadb43 GetStartupInfoW 23360->23361 23361->23241 23363 cb8552 23362->23363 23364 cb855b 23362->23364 23367 cb8448 23363->23367 23364->23244 23366->23244 23368 cb630e _abort 38 API calls 23367->23368 23369 cb8455 23368->23369 23387 cb8567 23369->23387 23371 cb845d 23396 cb81dc 23371->23396 23374 cb8474 23374->23364 23375 cb59ec __vswprintf_c_l 21 API calls 23376 cb8485 23375->23376 23383 cb84b7 23376->23383 23403 cb8609 23376->23403 23378 cb59b2 _free 20 API calls 23378->23374 23380 cb84b2 23413 cb5e2e 20 API calls _abort 23380->23413 23382 cb84fb 23382->23383 23414 cb80b2 26 API calls 23382->23414 23383->23378 23384 cb84cf 23384->23382 23385 cb59b2 _free 20 API calls 23384->23385 23385->23382 23388 cb8573 ___FrameUnwindToState 23387->23388 23389 cb630e _abort 38 API calls 23388->23389 23394 cb857d 23389->23394 23391 cb8601 ___FrameUnwindToState 23391->23371 23394->23391 23395 cb59b2 _free 20 API calls 23394->23395 23415 cb5a3a 38 API calls _abort 23394->23415 23416 cb76c7 EnterCriticalSection 23394->23416 23417 cb85f8 LeaveCriticalSection _abort 23394->23417 23395->23394 23397 cb2626 __fassign 38 API calls 23396->23397 23398 cb81ee 23397->23398 23399 cb820f 23398->23399 23400 cb81fd GetOEMCP 23398->23400 23401 cb8226 23399->23401 23402 cb8214 GetACP 23399->23402 23400->23401 23401->23374 23401->23375 23402->23401 23404 cb81dc 40 API calls 23403->23404 23406 cb8628 23404->23406 23405 cb862f 23407 cad763 DloadUnlock 5 API calls 23405->23407 23406->23405 23409 cb8679 IsValidCodePage 23406->23409 23412 cb869e ___scrt_get_show_window_mode 23406->23412 23408 cb84aa 23407->23408 23408->23380 23408->23384 23409->23405 23410 cb868b GetCPInfo 23409->23410 23410->23405 23410->23412 23418 cb82b4 GetCPInfo 23412->23418 23413->23383 23414->23383 23416->23394 23417->23394 23422 cb82ee 23418->23422 23427 cb8398 23418->23427 23421 cad763 DloadUnlock 5 API calls 23424 cb8444 23421->23424 23428 cb93e4 23422->23428 23424->23405 23426 cb75bc __vswprintf_c_l 43 API calls 23426->23427 23427->23421 23429 cb2626 __fassign 38 API calls 23428->23429 23430 cb9404 MultiByteToWideChar 23429->23430 23432 cb9442 23430->23432 23440 cb94da 23430->23440 23434 cb59ec __vswprintf_c_l 21 API calls 23432->23434 23438 cb9463 __vswprintf_c_l ___scrt_get_show_window_mode 23432->23438 23433 cad763 DloadUnlock 5 API calls 23435 cb834f 23433->23435 23434->23438 23442 cb75bc 23435->23442 23436 cb94d4 23447 cb7607 20 API calls _free 23436->23447 23438->23436 23439 cb94a8 MultiByteToWideChar 23438->23439 23439->23436 23441 cb94c4 GetStringTypeW 23439->23441 23440->23433 23441->23436 23443 cb2626 __fassign 38 API calls 23442->23443 23444 cb75cf 23443->23444 23448 cb739f 23444->23448 23447->23440 23450 cb73ba __vswprintf_c_l 23448->23450 23449 cb73e0 MultiByteToWideChar 23451 cb740a 23449->23451 23452 cb7594 23449->23452 23450->23449 23455 cb59ec __vswprintf_c_l 21 API calls 23451->23455 23457 cb742b __vswprintf_c_l 23451->23457 23453 cad763 DloadUnlock 5 API calls 23452->23453 23454 cb75a7 23453->23454 23454->23426 23455->23457 23456 cb7474 MultiByteToWideChar 23458 cb748d 23456->23458 23474 cb74e0 23456->23474 23457->23456 23457->23474 23475 cb79fa 23458->23475 23462 cb74ef 23464 cb7510 __vswprintf_c_l 23462->23464 23467 cb59ec __vswprintf_c_l 21 API calls 23462->23467 23463 cb74b7 23466 cb79fa __vswprintf_c_l 11 API calls 23463->23466 23463->23474 23465 cb7585 23464->23465 23468 cb79fa __vswprintf_c_l 11 API calls 23464->23468 23483 cb7607 20 API calls _free 23465->23483 23466->23474 23467->23464 23470 cb7564 23468->23470 23470->23465 23471 cb7573 WideCharToMultiByte 23470->23471 23471->23465 23472 cb75b3 23471->23472 23485 cb7607 20 API calls _free 23472->23485 23484 cb7607 20 API calls _free 23474->23484 23476 cb7726 _abort 5 API calls 23475->23476 23477 cb7a21 23476->23477 23480 cb7a2a 23477->23480 23486 cb7a82 10 API calls 3 library calls 23477->23486 23479 cb7a6a LCMapStringW 23479->23480 23481 cad763 DloadUnlock 5 API calls 23480->23481 23482 cb74a4 23481->23482 23482->23462 23482->23463 23482->23474 23483->23474 23484->23452 23485->23474 23486->23479 23488 cacec0 23487->23488 23489 c9f3af GetModuleHandleW 23488->23489 23490 c9f3c9 GetProcAddress 23489->23490 23491 c9f41a 23489->23491 23492 c9f3f2 GetProcAddress 23490->23492 23493 c9f3e2 23490->23493 23494 c9f74f GetModuleFileNameW 23491->23494 23589 cb461a 42 API calls __vswprintf_c_l 23491->23589 23492->23491 23495 c9f3fe 23492->23495 23493->23492 23507 c9f76a 23494->23507 23495->23491 23497 c9f68d 23497->23494 23498 c9f698 GetModuleFileNameW CreateFileW 23497->23498 23499 c9f743 CloseHandle 23498->23499 23500 c9f6c7 SetFilePointer 23498->23500 23499->23494 23500->23499 23501 c9f6d7 ReadFile 23500->23501 23501->23499 23503 c9f6f6 23501->23503 23502 c9a930 GetVersionExW 23502->23507 23503->23499 23506 c9f35b 2 API calls 23503->23506 23505 c9f79f CompareStringW 23505->23507 23506->23503 23507->23502 23507->23505 23508 c9f7d5 GetFileAttributesW 23507->23508 23509 c9f7e9 23507->23509 23583 c9f35b 23507->23583 23508->23507 23508->23509 23510 c9f7f6 23509->23510 23512 c9f828 23509->23512 23513 c9f80e GetFileAttributesW 23510->23513 23515 c9f822 23510->23515 23511 c9f937 23535 ca8b8d GetCurrentDirectoryW 23511->23535 23512->23511 23514 c9a930 GetVersionExW 23512->23514 23513->23510 23513->23515 23516 c9f842 23514->23516 23515->23512 23517 c9f849 23516->23517 23518 c9f8af 23516->23518 23520 c9f35b 2 API calls 23517->23520 23519 c93f2b _swprintf 51 API calls 23518->23519 23521 c9f8d7 AllocConsole 23519->23521 23522 c9f853 23520->23522 23523 c9f92f ExitProcess 23521->23523 23524 c9f8e4 GetCurrentProcessId AttachConsole 23521->23524 23525 c9f35b 2 API calls 23522->23525 23590 cb20a3 23524->23590 23527 c9f85d 23525->23527 23529 c9d192 54 API calls 23527->23529 23528 c9f905 GetStdHandle WriteConsoleW Sleep FreeConsole 23528->23523 23530 c9f878 23529->23530 23531 c93f2b _swprintf 51 API calls 23530->23531 23532 c9f88b 23531->23532 23533 c9d192 54 API calls 23532->23533 23534 c9f89a 23533->23534 23534->23523 23535->23251 23537 c9f35b 2 API calls 23536->23537 23538 ca9049 OleInitialize 23537->23538 23539 ca906c GdiplusStartup SHGetMalloc 23538->23539 23539->23253 23541 ca0734 IsDBCSLeadByte 23540->23541 23541->23541 23542 ca074c 23541->23542 23542->23255 23546 caa8dd 23543->23546 23544 caa9f3 23544->23264 23544->23265 23545 caa925 CharUpperW 23545->23546 23546->23544 23546->23545 23547 caa9a8 CharUpperW 23546->23547 23549 caa94c CharUpperW 23546->23549 23592 c9e030 73 API calls ___scrt_get_show_window_mode 23546->23592 23547->23546 23549->23546 23551 cacec0 23550->23551 23552 cabe16 SetEnvironmentVariableW 23551->23552 23553 cabe39 23552->23553 23554 cabe61 23553->23554 23555 cabe55 SetEnvironmentVariableW 23553->23555 23554->23257 23555->23554 23557 ca9a9f GetObjectW 23556->23557 23558 ca9a96 23556->23558 23560 ca8abf 6 API calls 23557->23560 23593 ca8bcf FindResourceW 23558->23593 23562 ca9ab1 23560->23562 23563 ca9af2 23562->23563 23564 ca9ad2 23562->23564 23566 ca8bcf 12 API calls 23562->23566 23574 c9caf7 23563->23574 23607 ca8b21 GetDC GetDeviceCaps ReleaseDC 23564->23607 23568 ca9ac7 23566->23568 23567 ca9ada 23608 ca8ade GetDC GetDeviceCaps ReleaseDC 23567->23608 23568->23564 23570 ca9acd DeleteObject 23568->23570 23570->23564 23571 ca9ae3 23609 ca8cf2 8 API calls ___scrt_get_show_window_mode 23571->23609 23573 ca9aea DeleteObject 23573->23563 23618 c9cb1c 23574->23618 23578 c9cb0a 23578->23274 23580 ca90c3 GdiplusShutdown OleUninitialize 23579->23580 23580->23290 23581->23281 23582->23288 23584 cacec0 23583->23584 23585 c9f368 GetSystemDirectoryW 23584->23585 23586 c9f39e 23585->23586 23587 c9f380 23585->23587 23586->23507 23588 c9f391 LoadLibraryW 23587->23588 23588->23586 23589->23497 23591 cb20ab 23590->23591 23591->23528 23591->23591 23592->23546 23594 ca8bf0 SizeofResource 23593->23594 23595 ca8c22 23593->23595 23594->23595 23596 ca8c04 LoadResource 23594->23596 23595->23557 23596->23595 23597 ca8c15 LockResource 23596->23597 23597->23595 23598 ca8c29 GlobalAlloc 23597->23598 23598->23595 23599 ca8c40 GlobalLock 23598->23599 23600 ca8c4b __vswprintf_c_l 23599->23600 23601 ca8cb7 GlobalFree 23599->23601 23602 ca8cb0 GlobalUnlock 23600->23602 23610 ca8b64 GdipAlloc 23600->23610 23601->23595 23602->23601 23605 ca8ca5 23605->23602 23606 ca8c8f GdipCreateHBITMAPFromBitmap 23606->23605 23607->23567 23608->23571 23609->23573 23611 ca8b76 23610->23611 23612 ca8b83 23610->23612 23614 ca8923 23611->23614 23612->23602 23612->23605 23612->23606 23615 ca894b GdipCreateBitmapFromStream 23614->23615 23616 ca8944 GdipCreateBitmapFromStreamICM 23614->23616 23617 ca8950 23615->23617 23616->23617 23617->23612 23619 c9cb26 _wcschr __EH_prolog 23618->23619 23620 c9cb52 GetModuleFileNameW 23619->23620 23621 c9cb83 23619->23621 23622 c9cb6c 23620->23622 23641 c9978d 23621->23641 23622->23621 23624 c99487 72 API calls 23625 c9cb03 23624->23625 23637 c9ce98 GetModuleHandleW FindResourceW 23625->23637 23626 c9ccef 23627 c99a30 70 API calls 23626->23627 23636 c9cd39 23626->23636 23630 c9cd09 ___std_exception_copy 23627->23630 23631 c9995d 73 API calls 23630->23631 23630->23636 23634 c9cd2f ___std_exception_copy 23631->23634 23633 c9cbb3 23633->23626 23633->23636 23650 c99b3b 23633->23650 23658 c9995d 23633->23658 23666 c99a30 23633->23666 23634->23636 23671 ca06d7 MultiByteToWideChar 23634->23671 23636->23624 23638 c9cec6 23637->23638 23640 c9cec0 23637->23640 23639 c9c96f 52 API calls 23638->23639 23639->23640 23640->23578 23642 c99797 23641->23642 23643 c997ed CreateFileW 23642->23643 23644 c9981a GetLastError 23643->23644 23646 c9986b 23643->23646 23645 c9b2c5 2 API calls 23644->23645 23647 c9983a 23645->23647 23646->23633 23647->23646 23648 c9983e CreateFileW GetLastError 23647->23648 23649 c99862 23648->23649 23649->23646 23651 c99b5f SetFilePointer 23650->23651 23652 c99b4e 23650->23652 23653 c99b98 23651->23653 23654 c99b7d GetLastError 23651->23654 23652->23653 23672 c96e6a 68 API calls 23652->23672 23653->23633 23654->23653 23656 c99b87 23654->23656 23656->23653 23673 c96e6a 68 API calls 23656->23673 23661 c99974 23658->23661 23660 c999d5 23660->23633 23661->23660 23662 c999c7 23661->23662 23664 c999d7 23661->23664 23674 c99663 23661->23674 23686 c96e30 68 API calls 23662->23686 23664->23660 23665 c99663 5 API calls 23664->23665 23665->23664 23687 c998e7 23666->23687 23669 c99a5b 23669->23633 23671->23636 23672->23651 23673->23653 23675 c9967c ReadFile 23674->23675 23676 c99671 GetStdHandle 23674->23676 23677 c996b5 23675->23677 23678 c99695 23675->23678 23676->23675 23677->23661 23679 c9976a GetFileType 23678->23679 23680 c9969c 23679->23680 23681 c996aa 23680->23681 23682 c996bd GetLastError 23680->23682 23683 c996cc 23680->23683 23685 c99663 GetFileType 23681->23685 23682->23677 23682->23683 23683->23677 23684 c996dc GetLastError 23683->23684 23684->23677 23684->23681 23685->23677 23686->23660 23688 c99952 23687->23688 23691 c998f3 23687->23691 23688->23669 23692 c96e6a 68 API calls 23688->23692 23689 c9992a SetFilePointer 23689->23688 23690 c99948 GetLastError 23689->23690 23690->23688 23691->23689 23692->23669 23694 cb48ed _abort 23693->23694 23695 cb4a3b _abort GetModuleHandleW 23694->23695 23703 cb4905 23694->23703 23697 cb48f9 23695->23697 23697->23703 23727 cb4a7f GetModuleHandleExW 23697->23727 23698 cb490d 23702 cb4982 23698->23702 23712 cb49ab 23698->23712 23735 cb5418 20 API calls _abort 23698->23735 23706 cb499a 23702->23706 23710 cb56c0 _abort 5 API calls 23702->23710 23715 cb76c7 EnterCriticalSection 23703->23715 23704 cb49c8 23719 cb49fa 23704->23719 23705 cb49f4 23736 cbf149 5 API calls DloadUnlock 23705->23736 23711 cb56c0 _abort 5 API calls 23706->23711 23710->23706 23711->23712 23716 cb49eb 23712->23716 23715->23698 23737 cb770f LeaveCriticalSection 23716->23737 23718 cb49c4 23718->23704 23718->23705 23738 cb7b04 23719->23738 23722 cb4a28 23725 cb4a7f _abort 8 API calls 23722->23725 23723 cb4a08 GetPEB 23723->23722 23724 cb4a18 GetCurrentProcess TerminateProcess 23723->23724 23724->23722 23726 cb4a30 ExitProcess 23725->23726 23728 cb4aa9 GetProcAddress 23727->23728 23729 cb4acc 23727->23729 23730 cb4abe 23728->23730 23731 cb4adb 23729->23731 23732 cb4ad2 FreeLibrary 23729->23732 23730->23729 23733 cad763 DloadUnlock 5 API calls 23731->23733 23732->23731 23734 cb4ae5 23733->23734 23734->23703 23735->23702 23737->23718 23739 cb7b29 23738->23739 23743 cb7b1f 23738->23743 23740 cb7726 _abort 5 API calls 23739->23740 23740->23743 23741 cad763 DloadUnlock 5 API calls 23742 cb4a04 23741->23742 23742->23722 23742->23723 23743->23741 23860 ca9583 GetDlgItem EnableWindow ShowWindow SendMessageW 23040 cac781 23041 cac72f 23040->23041 23041->23040 23043 cacabb 23041->23043 23071 cac7c9 23043->23071 23045 cacad5 23046 cacb32 23045->23046 23060 cacb56 23045->23060 23082 caca39 11 API calls 3 library calls 23046->23082 23048 cacb3d RaiseException 23049 cacd2b 23048->23049 23051 cad763 DloadUnlock 5 API calls 23049->23051 23050 cacbce LoadLibraryExA 23052 cacc2f 23050->23052 23053 cacbe1 GetLastError 23050->23053 23054 cacd3a 23051->23054 23055 cacc3a FreeLibrary 23052->23055 23059 cacc41 23052->23059 23056 cacc0a 23053->23056 23057 cacbf4 23053->23057 23054->23041 23055->23059 23083 caca39 11 API calls 3 library calls 23056->23083 23057->23052 23057->23056 23058 cacc9f GetProcAddress 23061 caccaf GetLastError 23058->23061 23065 caccfd 23058->23065 23059->23058 23059->23065 23060->23050 23060->23052 23060->23059 23060->23065 23069 caccc2 23061->23069 23064 cacc15 RaiseException 23064->23049 23085 caca39 11 API calls 3 library calls 23065->23085 23067 cacce3 RaiseException 23068 cac7c9 ___delayLoadHelper2@8 11 API calls 23067->23068 23070 caccfa 23068->23070 23069->23065 23084 caca39 11 API calls 3 library calls 23069->23084 23070->23065 23072 cac7fb 23071->23072 23073 cac7d5 23071->23073 23072->23045 23086 cac877 8 API calls DloadUnlock 23073->23086 23075 cac7da 23076 cac7f6 23075->23076 23087 cac9c9 VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 23075->23087 23088 cac7fc GetModuleHandleW GetProcAddress GetProcAddress 23076->23088 23079 caca86 23080 cad763 DloadUnlock 5 API calls 23079->23080 23081 cacab7 23080->23081 23081->23045 23082->23048 23083->23064 23084->23067 23085->23049 23086->23075 23087->23076 23088->23079 23091 cb7686 23093 cb7691 23091->23093 23094 cb76ba 23093->23094 23095 cb76b6 23093->23095 23097 cb7998 23093->23097 23104 cb76de DeleteCriticalSection 23094->23104 23105 cb7726 23097->23105 23100 cb79dd InitializeCriticalSectionAndSpinCount 23101 cb79c8 23100->23101 23102 cad763 DloadUnlock 5 API calls 23101->23102 23103 cb79f4 23102->23103 23103->23093 23104->23095 23106 cb7756 23105->23106 23109 cb7752 23105->23109 23106->23100 23106->23101 23107 cb7776 23107->23106 23110 cb7782 GetProcAddress 23107->23110 23109->23106 23109->23107 23112 cb77c2 23109->23112 23111 cb7792 __crt_fast_encode_pointer 23110->23111 23111->23106 23113 cb77e3 LoadLibraryExW 23112->23113 23118 cb77d8 23112->23118 23114 cb7800 GetLastError 23113->23114 23115 cb7818 23113->23115 23114->23115 23116 cb780b LoadLibraryExW 23114->23116 23117 cb782f FreeLibrary 23115->23117 23115->23118 23116->23115 23117->23118 23118->23109 23884 cb8a9b GetProcessHeap 23885 c97a9b GetCurrentProcess GetLastError CloseHandle 23862 ca8999 GdipCloneImage GdipAlloc 23155 c910a9 23160 c95b05 23155->23160 23161 c95b0f __EH_prolog 23160->23161 23162 c9acb6 75 API calls 23161->23162 23163 c95b1b 23162->23163 23167 c95cfa GetCurrentProcess GetProcessAffinityMask 23163->23167 23920 caaa98 91 API calls 3 library calls 23863 cb09a0 6 API calls 4 library calls 23189 cac7bf 23190 cac790 23189->23190 23190->23189 23191 cacabb ___delayLoadHelper2@8 19 API calls 23190->23191 23191->23190 23922 cb6fbc 71 API calls _free 23864 cb71b1 31 API calls 2 library calls 23803 c913b4 75 API calls 3 library calls 23923 ca4fb4 119 API calls __vswprintf_c_l 23830 c9604b 73 API calls 21974 ca9b4e 21975 ca9b58 __EH_prolog 21974->21975 22134 c912e7 21975->22134 21978 ca9b9a 21981 ca9c10 21978->21981 21982 ca9ba7 21978->21982 22040 ca9b86 21978->22040 21979 caa22f 22224 cab8bb 21979->22224 21984 ca9caf GetDlgItemTextW 21981->21984 21989 ca9c2a 21981->21989 21985 ca9bac 21982->21985 21986 ca9be3 21982->21986 21984->21986 21990 ca9ce6 21984->21990 21996 c9d192 54 API calls 21985->21996 21985->22040 21997 ca9c04 KiUserCallbackDispatcher 21986->21997 21986->22040 21987 caa25b 21991 caa264 SendDlgItemMessageW 21987->21991 21992 caa275 GetDlgItem SendMessageW 21987->21992 21988 caa24d SendMessageW 21988->21987 21995 c9d192 54 API calls 21989->21995 21994 ca9cfe GetDlgItem 21990->21994 22132 ca9cef 21990->22132 21991->21992 22242 ca8b8d GetCurrentDirectoryW 21992->22242 21999 ca9d38 SetFocus 21994->21999 22000 ca9d12 SendMessageW SendMessageW 21994->22000 22001 ca9c4c SetDlgItemTextW 21995->22001 22002 ca9bc6 21996->22002 21997->22040 21998 caa2a7 GetDlgItem 22003 caa2c0 21998->22003 22004 caa2c6 SetWindowTextW 21998->22004 22006 ca9d48 21999->22006 22019 ca9d54 21999->22019 22000->21999 22005 ca9c5a 22001->22005 22262 c91227 SHGetMalloc 22002->22262 22003->22004 22243 ca8fc7 GetClassNameW 22004->22243 22013 ca9c67 GetMessageW 22005->22013 22026 ca9c8d TranslateMessage DispatchMessageW 22005->22026 22005->22040 22009 c9d192 54 API calls 22006->22009 22014 ca9d52 22009->22014 22010 ca9bcd 22015 ca9bd1 SetDlgItemTextW 22010->22015 22010->22040 22011 caa1cf 22016 c9d192 54 API calls 22011->22016 22013->22005 22013->22040 22144 cab70d GetDlgItem 22014->22144 22015->22040 22017 caa1df SetDlgItemTextW 22016->22017 22020 caa1f3 22017->22020 22024 c9d192 54 API calls 22019->22024 22025 c9d192 54 API calls 22020->22025 22023 ca9da9 22152 c99d1e 22023->22152 22028 ca9d86 22024->22028 22030 caa21c 22025->22030 22026->22005 22027 caa311 22033 caa341 22027->22033 22037 c9d192 54 API calls 22027->22037 22029 c93f2b _swprintf 51 API calls 22028->22029 22029->22014 22035 c9d192 54 API calls 22030->22035 22032 caaa44 91 API calls 22032->22027 22034 caa3f9 22033->22034 22039 caaa44 91 API calls 22033->22039 22041 caa4a9 22034->22041 22069 caa487 22034->22069 22078 c9d192 54 API calls 22034->22078 22035->22040 22038 caa324 SetDlgItemTextW 22037->22038 22044 c9d192 54 API calls 22038->22044 22045 caa35c 22039->22045 22046 caa4bb 22041->22046 22047 caa4b2 EnableWindow 22041->22047 22042 ca9dde GetLastError 22043 ca9de5 22042->22043 22158 ca9022 SetCurrentDirectoryW 22043->22158 22049 caa338 SetDlgItemTextW 22044->22049 22052 caa36e 22045->22052 22071 caa393 22045->22071 22056 caa4d8 22046->22056 22271 c912a4 GetDlgItem EnableWindow 22046->22271 22047->22046 22049->22033 22050 ca9dfb 22051 ca9e04 GetLastError 22050->22051 22055 ca9e0e 22050->22055 22051->22055 22269 ca859b 6 API calls 22052->22269 22053 caa3ec 22057 caaa44 91 API calls 22053->22057 22062 ca9e89 22055->22062 22066 ca9e99 22055->22066 22068 ca9e26 GetTickCount 22055->22068 22058 caa4ff 22056->22058 22063 caa4f7 SendMessageW 22056->22063 22057->22034 22058->22040 22064 c9d192 54 API calls 22058->22064 22060 caa4ce 22272 c912a4 GetDlgItem EnableWindow 22060->22272 22062->22066 22067 caa0d2 22062->22067 22063->22058 22070 caa518 SetDlgItemTextW 22064->22070 22065 caa387 22065->22071 22073 caa06d 22066->22073 22074 ca9eb1 GetModuleFileNameW 22066->22074 22177 c912c2 GetDlgItem ShowWindow 22067->22177 22159 c93f2b 22068->22159 22270 ca859b 6 API calls 22069->22270 22070->22040 22071->22053 22077 caaa44 91 API calls 22071->22077 22073->21986 22086 c9d192 54 API calls 22073->22086 22263 c9decc 73 API calls 22074->22263 22083 caa3c1 22077->22083 22078->22034 22079 caa0e2 22178 c912c2 GetDlgItem ShowWindow 22079->22178 22081 ca9e43 22162 c99541 22081->22162 22082 caa4a6 22082->22041 22083->22053 22087 caa3ca DialogBoxParamW 22083->22087 22085 ca9edb 22089 c93f2b _swprintf 51 API calls 22085->22089 22090 caa081 22086->22090 22087->21986 22087->22053 22088 caa0ec 22179 c9d192 22088->22179 22092 ca9efd CreateFileMappingW 22089->22092 22093 c93f2b _swprintf 51 API calls 22090->22093 22096 ca9f5f GetCommandLineW 22092->22096 22128 ca9fdc __vswprintf_c_l 22092->22128 22097 caa09f 22093->22097 22101 ca9f70 22096->22101 22110 c9d192 54 API calls 22097->22110 22098 ca9e69 22102 ca9e77 22098->22102 22103 ca9e70 GetLastError 22098->22103 22099 ca9fe7 ShellExecuteExW 22123 caa004 22099->22123 22264 ca97e3 SHGetMalloc 22101->22264 22170 c99487 22102->22170 22103->22102 22104 caa10a SetDlgItemTextW GetDlgItem 22107 caa13b 22104->22107 22108 caa123 GetWindowLongW SetWindowLongW 22104->22108 22187 caaa44 22107->22187 22108->22107 22109 ca9f8c 22265 ca97e3 SHGetMalloc 22109->22265 22110->21986 22113 ca9f98 22266 ca97e3 SHGetMalloc 22113->22266 22116 caa047 22116->22073 22122 caa05d UnmapViewOfFile CloseHandle 22116->22122 22117 caaa44 91 API calls 22118 caa157 22117->22118 22212 cabc77 22118->22212 22119 ca9fa4 22267 c9e030 73 API calls ___scrt_get_show_window_mode 22119->22267 22122->22073 22123->22116 22126 caa033 Sleep 22123->22126 22125 ca9fbb MapViewOfFile 22125->22128 22126->22116 22126->22123 22128->22099 22132->21986 22132->22011 22135 c91349 22134->22135 22136 c912f0 22134->22136 22291 c9cf00 GetWindowLongW SetWindowLongW 22135->22291 22137 c91356 22136->22137 22273 c9cf27 22136->22273 22137->21978 22137->21979 22137->22040 22141 c91325 GetDlgItem 22141->22137 22142 c91335 22141->22142 22142->22137 22143 c9133b SetWindowTextW 22142->22143 22143->22137 22145 cab769 SendMessageW SendMessageW 22144->22145 22146 cab739 22144->22146 22147 cab7c0 SendMessageW SendMessageW SendMessageW 22145->22147 22148 cab7a1 22145->22148 22149 cab744 ShowWindow SendMessageW SendMessageW 22146->22149 22150 cab80a SendMessageW 22147->22150 22151 cab7eb SendMessageW 22147->22151 22148->22147 22149->22145 22150->22023 22151->22150 22154 c99d28 22152->22154 22153 c99db9 22155 c99ed6 9 API calls 22153->22155 22157 c99de2 22153->22157 22154->22153 22154->22157 22305 c99ed6 22154->22305 22155->22157 22157->22042 22157->22043 22158->22050 22352 c93efe 22159->22352 22163 c9954b 22162->22163 22164 c995b5 CreateFileW 22163->22164 22165 c995a9 22163->22165 22164->22165 22166 c99607 22165->22166 22167 c9b2c5 2 API calls 22165->22167 22166->22098 22168 c995ee 22167->22168 22168->22166 22169 c995f2 CreateFileW 22168->22169 22169->22166 22171 c994ab 22170->22171 22176 c994bc 22170->22176 22172 c994be 22171->22172 22173 c994b7 22171->22173 22171->22176 22437 c994f3 22172->22437 22432 c9963a 22173->22432 22176->22062 22177->22079 22178->22088 22180 c9d1c2 22179->22180 22181 c9d1cb LoadStringW 22180->22181 22182 c9d1e1 LoadStringW 22180->22182 22181->22182 22183 c9d1f3 22181->22183 22182->22183 22184 c9c96f 52 API calls 22183->22184 22185 c9d201 SetDlgItemTextW 22184->22185 22186 c912c2 GetDlgItem ShowWindow 22185->22186 22186->22104 22188 caaa4e __EH_prolog 22187->22188 22195 caa149 22188->22195 22452 ca96eb 22188->22452 22190 caaa85 _wcsrchr 22192 ca96eb ExpandEnvironmentStringsW 22190->22192 22193 caad85 SetWindowTextW 22190->22193 22190->22195 22205 caaf4f GetDlgItem SetWindowTextW SendMessageW 22190->22205 22208 caaf91 SendMessageW 22190->22208 22210 caab69 ___scrt_get_show_window_mode 22190->22210 22456 ca0b00 CompareStringW 22190->22456 22457 ca8b8d GetCurrentDirectoryW 22190->22457 22458 c9a1f9 7 API calls 22190->22458 22461 c9a182 FindClose 22190->22461 22462 ca9843 69 API calls ___std_exception_copy 22190->22462 22463 cb20ce 22190->22463 22192->22190 22193->22190 22195->22117 22199 caab76 SetFileAttributesW 22201 caac31 GetFileAttributesW 22199->22201 22199->22210 22203 caac3f DeleteFileW 22201->22203 22201->22210 22203->22210 22205->22190 22206 c93f2b _swprintf 51 API calls 22207 caac74 GetFileAttributesW 22206->22207 22209 caac85 MoveFileW 22207->22209 22207->22210 22208->22190 22209->22210 22211 caac9d MoveFileExW 22209->22211 22210->22190 22210->22199 22210->22201 22210->22206 22459 c9b150 52 API calls 2 library calls 22210->22459 22460 c9a1f9 7 API calls 22210->22460 22211->22210 22213 cabc81 __EH_prolog 22212->22213 22487 c9f1b7 69 API calls 22213->22487 22215 cabcb2 22488 c95b87 69 API calls 22215->22488 22217 cabcd0 22489 c97b10 73 API calls 2 library calls 22217->22489 22219 cabd14 22490 c97c84 22219->22490 22221 cabd23 22499 c97ba0 22221->22499 22225 cab8c8 22224->22225 23008 ca8abf 22225->23008 22228 caa235 22228->21987 22228->21988 22229 cab8d5 GetWindow 22229->22228 22235 cab8f1 22229->22235 22230 cab8fe GetClassNameW 23013 ca0b00 CompareStringW 22230->23013 22232 cab926 GetWindowLongW 22233 cab987 GetWindow 22232->22233 22234 cab936 SendMessageW 22232->22234 22233->22228 22233->22235 22234->22233 22236 cab94c GetObjectW 22234->22236 22235->22228 22235->22230 22235->22232 22235->22233 23014 ca8b21 GetDC GetDeviceCaps ReleaseDC 22236->23014 22238 cab961 23015 ca8ade GetDC GetDeviceCaps ReleaseDC 22238->23015 23016 ca8cf2 8 API calls ___scrt_get_show_window_mode 22238->23016 22241 cab971 SendMessageW DeleteObject 22241->22233 22242->21998 22244 ca8fe8 22243->22244 22248 ca900d 22243->22248 23019 ca0b00 CompareStringW 22244->23019 22246 ca8ffb 22247 ca8fff FindWindowExW 22246->22247 22246->22248 22247->22248 22249 ca9484 22248->22249 22250 ca948e __EH_prolog 22249->22250 22251 c913af 75 API calls 22250->22251 22252 ca94b0 22251->22252 23020 c91f0e 22252->23020 22255 ca94ca 22258 c9165f 79 API calls 22255->22258 22256 ca94d9 22257 c91927 126 API calls 22256->22257 22259 ca94fb __vswprintf_c_l ___std_exception_copy 22257->22259 22261 ca94d5 22258->22261 22260 c9165f 79 API calls 22259->22260 22260->22261 22261->22027 22261->22032 22262->22010 22263->22085 22264->22109 22265->22113 22266->22119 22267->22125 22269->22065 22270->22082 22271->22060 22272->22056 22292 c9c8de 22273->22292 22275 c9cf4d GetWindowRect GetClientRect 22276 c9d042 22275->22276 22284 c9cfa7 22275->22284 22277 c9d04c GetWindowTextW 22276->22277 22278 c9d084 GetSystemMetrics GetWindow 22276->22278 22295 c9c96f 22277->22295 22280 c9d0a4 22278->22280 22281 c91312 22280->22281 22285 c9d0b0 GetWindowTextW 22280->22285 22287 c9c96f 52 API calls 22280->22287 22288 c9d16b GetWindow 22280->22288 22289 c9d0f6 GetWindowRect 22280->22289 22281->22137 22281->22141 22282 c9d078 SetWindowTextW 22282->22278 22283 c9d008 GetWindowLongW 22286 c9d032 GetWindowRect 22283->22286 22284->22278 22284->22283 22285->22280 22286->22276 22290 c9d0e3 SetWindowTextW 22287->22290 22288->22280 22288->22281 22289->22288 22290->22280 22291->22137 22293 c9c96f 52 API calls 22292->22293 22294 c9c906 _wcschr 22293->22294 22294->22275 22296 c9c979 22295->22296 22297 c9c9ed _strlen 22296->22297 22302 c9ca4b _wcschr _wcsrchr 22296->22302 22303 ca08f3 WideCharToMultiByte 22296->22303 22304 ca08f3 WideCharToMultiByte 22297->22304 22300 c9ca18 _strlen 22301 c93f2b _swprintf 51 API calls 22300->22301 22301->22302 22302->22282 22303->22297 22304->22300 22306 c99ee3 22305->22306 22307 c99f07 22306->22307 22308 c99efa CreateDirectoryW 22306->22308 22318 c99e4f 22307->22318 22308->22307 22312 c99f3a 22308->22312 22310 c99f4d GetLastError 22315 c99f49 22310->22315 22312->22315 22331 c9a113 22312->22331 22315->22154 22316 c99f23 22316->22310 22317 c99f27 CreateDirectoryW 22316->22317 22317->22310 22317->22312 22339 c99e63 22318->22339 22321 c9b2c5 22322 c9b2d2 22321->22322 22330 c9b2dc 22322->22330 22349 c9b45f CharUpperW 22322->22349 22324 c9b2eb 22350 c9b48b CharUpperW 22324->22350 22326 c9b2fa 22327 c9b2fe 22326->22327 22328 c9b375 GetCurrentDirectoryW 22326->22328 22351 c9b45f CharUpperW 22327->22351 22328->22330 22330->22316 22332 cacec0 22331->22332 22333 c9a120 SetFileAttributesW 22332->22333 22334 c9a163 22333->22334 22335 c9a136 22333->22335 22334->22315 22336 c9b2c5 2 API calls 22335->22336 22337 c9a14a 22336->22337 22337->22334 22338 c9a14e SetFileAttributesW 22337->22338 22338->22334 22347 cacec0 22339->22347 22342 c99e58 22342->22310 22342->22321 22343 c99e81 22344 c9b2c5 2 API calls 22343->22344 22345 c99e95 22344->22345 22345->22342 22346 c99e99 GetFileAttributesW 22345->22346 22346->22342 22348 c99e70 GetFileAttributesW 22347->22348 22348->22342 22348->22343 22349->22324 22350->22326 22351->22330 22353 c93f15 ___scrt_initialize_default_local_stdio_options 22352->22353 22356 cb34cd 22353->22356 22359 cb21ab 22356->22359 22360 cb21eb 22359->22360 22361 cb21d3 22359->22361 22360->22361 22363 cb21f3 22360->22363 22383 cb5e2e 20 API calls _abort 22361->22383 22385 cb2626 22363->22385 22364 cb21d8 22384 cb5d0d 26 API calls _abort 22364->22384 22370 cb227b 22394 cb282c 51 API calls 3 library calls 22370->22394 22371 c93f1f 22371->22081 22374 cb21e3 22376 cad763 22374->22376 22375 cb2286 22395 cb26a9 20 API calls _free 22375->22395 22377 cad76e IsProcessorFeaturePresent 22376->22377 22378 cad76c 22376->22378 22380 cadd57 22377->22380 22378->22371 22396 cadd1b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22380->22396 22382 cade3a 22382->22371 22383->22364 22384->22374 22386 cb2643 22385->22386 22392 cb2203 22385->22392 22386->22392 22397 cb630e GetLastError 22386->22397 22388 cb2664 22418 cb645d 38 API calls __fassign 22388->22418 22390 cb267d 22419 cb648a 38 API calls __fassign 22390->22419 22393 cb25f1 20 API calls 2 library calls 22392->22393 22393->22370 22394->22375 22395->22374 22396->22382 22398 cb6330 22397->22398 22399 cb6324 22397->22399 22421 cb5a7d 20 API calls 3 library calls 22398->22421 22420 cb78e9 11 API calls 2 library calls 22399->22420 22402 cb633c 22409 cb6344 22402->22409 22428 cb793f 11 API calls 2 library calls 22402->22428 22403 cb632a 22403->22398 22404 cb6379 SetLastError 22403->22404 22404->22388 22407 cb6359 22407->22409 22410 cb6360 22407->22410 22408 cb634a 22411 cb6385 SetLastError 22408->22411 22422 cb59b2 22409->22422 22429 cb6180 20 API calls _abort 22410->22429 22430 cb5a3a 38 API calls _abort 22411->22430 22414 cb636b 22416 cb59b2 _free 20 API calls 22414->22416 22417 cb6372 22416->22417 22417->22404 22417->22411 22418->22390 22419->22392 22420->22403 22421->22402 22423 cb59e6 _free 22422->22423 22424 cb59bd RtlFreeHeap 22422->22424 22423->22408 22424->22423 22425 cb59d2 22424->22425 22431 cb5e2e 20 API calls _abort 22425->22431 22427 cb59d8 GetLastError 22427->22423 22428->22407 22429->22414 22431->22427 22433 c99643 22432->22433 22434 c99647 22432->22434 22433->22176 22434->22433 22443 c99dfc 22434->22443 22438 c994ff 22437->22438 22439 c9951d 22437->22439 22438->22439 22441 c9950b FindCloseChangeNotification 22438->22441 22440 c9953c 22439->22440 22451 c96d3c 67 API calls 22439->22451 22440->22176 22441->22439 22444 cacec0 22443->22444 22445 c99e09 DeleteFileW 22444->22445 22446 c99e1c 22445->22446 22447 c99661 22445->22447 22448 c9b2c5 2 API calls 22446->22448 22447->22176 22449 c99e30 22448->22449 22449->22447 22450 c99e34 DeleteFileW 22449->22450 22450->22447 22451->22440 22453 ca96f5 22452->22453 22454 ca97cb 22453->22454 22455 ca97a8 ExpandEnvironmentStringsW 22453->22455 22454->22190 22455->22454 22456->22190 22457->22190 22458->22190 22459->22210 22460->22210 22461->22190 22462->22190 22464 cb5ada 22463->22464 22465 cb5af2 22464->22465 22466 cb5ae7 22464->22466 22468 cb5afa 22465->22468 22474 cb5b03 _abort 22465->22474 22476 cb59ec 22466->22476 22469 cb59b2 _free 20 API calls 22468->22469 22472 cb5aef 22469->22472 22470 cb5b08 22483 cb5e2e 20 API calls _abort 22470->22483 22471 cb5b2d HeapReAlloc 22471->22472 22471->22474 22472->22190 22474->22470 22474->22471 22484 cb4689 7 API calls 2 library calls 22474->22484 22477 cb5a2a 22476->22477 22481 cb59fa _abort 22476->22481 22486 cb5e2e 20 API calls _abort 22477->22486 22478 cb5a15 RtlAllocateHeap 22480 cb5a28 22478->22480 22478->22481 22480->22472 22481->22477 22481->22478 22485 cb4689 7 API calls 2 library calls 22481->22485 22483->22472 22484->22474 22485->22481 22486->22480 22487->22215 22488->22217 22489->22219 22491 c97c8e 22490->22491 22492 c97cf8 22491->22492 22525 c9a195 22491->22525 22494 c97d62 22492->22494 22496 c9a195 8 API calls 22492->22496 22503 c981ed 22492->22503 22497 c97da4 22494->22497 22531 c9135c 67 API calls 22494->22531 22496->22492 22497->22221 22500 c97bae 22499->22500 22502 c97bb5 22499->22502 22501 ca0e0f 79 API calls 22500->22501 22501->22502 22504 c981f7 __EH_prolog 22503->22504 22532 c913af 22504->22532 22506 c98212 22540 c99bf2 22506->22540 22512 c98241 22660 c9165f 22512->22660 22513 c982dc 22559 c98385 22513->22559 22516 c9833c 22563 c91ebf 22516->22563 22520 c9823d 22520->22512 22520->22513 22523 c9a195 8 API calls 22520->22523 22664 c9b71b CompareStringW 22520->22664 22521 c98347 22521->22512 22567 c93a0d 22521->22567 22577 c983eb 22521->22577 22523->22520 22526 c9a1aa 22525->22526 22530 c9a1ae 22526->22530 22996 c9a2c3 22526->22996 22528 c9a1be 22529 c9a1c3 FindClose 22528->22529 22528->22530 22529->22530 22530->22491 22531->22497 22533 c913b4 __EH_prolog 22532->22533 22666 c9c463 22533->22666 22535 c913eb 22539 c91444 ___scrt_get_show_window_mode 22535->22539 22672 cacdac 22535->22672 22539->22506 22541 c99bfd 22540->22541 22542 c98228 22541->22542 22697 c96e22 67 API calls 22541->22697 22542->22512 22544 c919e2 22542->22544 22545 c919ec __EH_prolog 22544->22545 22552 c91a2e 22545->22552 22557 c91a15 22545->22557 22698 c9138d 22545->22698 22547 c91b47 22701 c9135c 67 API calls 22547->22701 22549 c93a0d 90 API calls 22554 c91b9e 22549->22554 22550 c91b57 22550->22549 22550->22557 22551 c91be8 22551->22557 22558 c91c1b 22551->22558 22702 c9135c 67 API calls 22551->22702 22552->22547 22552->22550 22552->22557 22554->22551 22555 c93a0d 90 API calls 22554->22555 22555->22554 22556 c93a0d 90 API calls 22556->22558 22557->22520 22558->22556 22558->22557 22560 c98392 22559->22560 22720 c9ffa6 GetSystemTime SystemTimeToFileTime 22560->22720 22562 c982f6 22562->22516 22665 ca06b6 65 API calls 22562->22665 22564 c91ec4 __EH_prolog 22563->22564 22565 c91ef8 22564->22565 22722 c91927 22564->22722 22565->22521 22568 c93a19 22567->22568 22569 c93a1d 22567->22569 22568->22521 22570 c93a4a 22569->22570 22571 c93a3c 22569->22571 22933 c92759 90 API calls 3 library calls 22570->22933 22572 c93a7c 22571->22572 22932 c931f0 78 API calls 3 library calls 22571->22932 22572->22521 22575 c93a48 22575->22572 22934 c91fbf 67 API calls 22575->22934 22578 c983f5 __EH_prolog 22577->22578 22579 c9842e 22578->22579 22608 c98432 22578->22608 22958 ca77e6 93 API calls 22578->22958 22580 c98457 22579->22580 22585 c984e0 22579->22585 22579->22608 22581 c98479 22580->22581 22580->22608 22959 c97a2f 150 API calls 22580->22959 22581->22608 22960 ca77e6 93 API calls 22581->22960 22585->22608 22935 c95d68 22585->22935 22587 c9856b 22587->22608 22943 c980da 22587->22943 22590 c986cf 22591 c9a195 8 API calls 22590->22591 22594 c98734 22590->22594 22591->22594 22593 c9c5cd 73 API calls 22597 c9878f _memcmp 22593->22597 22947 c97c11 22594->22947 22595 c988b9 22596 c9898c 22595->22596 22602 c98908 22595->22602 22601 c989e7 22596->22601 22612 c98997 22596->22612 22597->22593 22597->22595 22598 c988b2 22597->22598 22597->22608 22961 c980a6 75 API calls 22597->22961 22962 c9135c 67 API calls 22597->22962 22963 c9135c 67 API calls 22598->22963 22611 c98979 22601->22611 22966 c97f88 89 API calls 22601->22966 22605 c99e4f 4 API calls 22602->22605 22602->22611 22603 c989e5 22606 c99487 72 API calls 22603->22606 22604 c99487 72 API calls 22604->22608 22609 c98940 22605->22609 22606->22608 22608->22521 22609->22611 22964 c991b1 89 API calls 22609->22964 22610 c98a52 22623 c98abd 22610->22623 22656 c99005 22610->22656 22967 c9976a 22610->22967 22611->22603 22611->22610 22612->22603 22965 c97dc4 93 API calls pre_c_initialization 22612->22965 22613 c9a6f9 8 API calls 22616 c98b0c 22613->22616 22619 c9a6f9 8 API calls 22616->22619 22618 c98a95 22618->22623 22971 c96f5f 67 API calls 22618->22971 22636 c98b22 22619->22636 22621 c98aab 22972 c96f23 68 API calls 22621->22972 22623->22613 22624 c98be5 22625 c98c40 22624->22625 22626 c98d46 22624->22626 22627 c98cb2 22625->22627 22628 c98c50 22625->22628 22630 c98d58 22626->22630 22631 c98d6c 22626->22631 22647 c98c70 22626->22647 22629 c980da CharUpperW 22627->22629 22632 c98c96 22628->22632 22641 c98c5e 22628->22641 22633 c98ccd 22629->22633 22634 c99120 119 API calls 22630->22634 22635 ca1fa8 68 API calls 22631->22635 22632->22647 22975 c977d4 101 API calls 22632->22975 22643 c98cfd 22633->22643 22644 c98cf6 22633->22644 22633->22647 22634->22647 22638 c98d85 22635->22638 22636->22624 22973 c998b9 SetFilePointer GetLastError SetEndOfFile 22636->22973 22639 ca1c3f 119 API calls 22638->22639 22639->22647 22974 c96f5f 67 API calls 22641->22974 22977 c9905e 85 API calls __EH_prolog 22643->22977 22976 c97586 77 API calls pre_c_initialization 22644->22976 22648 c98e94 22647->22648 22978 c96f5f 67 API calls 22647->22978 22650 c98f2b 22648->22650 22648->22656 22979 c99bba SetEndOfFile 22648->22979 22953 c99a62 22650->22953 22653 c98f85 22654 c994f3 68 API calls 22653->22654 22655 c98f90 22654->22655 22655->22656 22657 c9a113 4 API calls 22655->22657 22656->22604 22658 c98fef 22657->22658 22658->22656 22980 c96f5f 67 API calls 22658->22980 22661 c91671 22660->22661 22995 c9c506 79 API calls 22661->22995 22664->22520 22665->22516 22667 c9c46d __EH_prolog 22666->22667 22668 cacdac new 8 API calls 22667->22668 22669 c9c4b0 22668->22669 22670 cacdac new 8 API calls 22669->22670 22671 c9c4d4 22670->22671 22671->22535 22673 cacdb1 ___std_exception_copy 22672->22673 22674 c91431 22673->22674 22684 cb4689 7 API calls 2 library calls 22673->22684 22685 cad7dc RaiseException Concurrency::cancel_current_task new 22673->22685 22686 cad7bf RaiseException Concurrency::cancel_current_task 22673->22686 22674->22539 22678 c9acb6 22674->22678 22679 c9acc0 __EH_prolog 22678->22679 22687 c9de12 73 API calls 22679->22687 22681 c9acd2 22688 c9adce 22681->22688 22684->22673 22687->22681 22689 c9ade0 ___scrt_get_show_window_mode 22688->22689 22692 c9fcd4 22689->22692 22695 c9fc94 GetCurrentProcess GetProcessAffinityMask 22692->22695 22696 c9ad48 22695->22696 22696->22539 22697->22542 22703 c91736 22698->22703 22700 c913a9 22700->22552 22701->22557 22702->22558 22704 c9174c 22703->22704 22715 c917a4 __vswprintf_c_l 22703->22715 22705 c91775 22704->22705 22716 c96d8f 67 API calls __vswprintf_c_l 22704->22716 22707 c917cb 22705->22707 22712 c91791 ___std_exception_copy 22705->22712 22709 cb20ce 22 API calls 22707->22709 22708 c9176b 22717 c96dc7 68 API calls 22708->22717 22711 c917d2 22709->22711 22711->22715 22719 c96dc7 68 API calls 22711->22719 22712->22715 22718 c96dc7 68 API calls 22712->22718 22715->22700 22716->22708 22717->22705 22718->22715 22719->22715 22721 c9ffd6 __vswprintf_c_l 22720->22721 22721->22562 22723 c9192c __EH_prolog 22722->22723 22724 c91965 22723->22724 22726 c91995 22723->22726 22727 c91940 22723->22727 22725 c93a0d 90 API calls 22724->22725 22725->22727 22731 c93e39 22726->22731 22727->22565 22734 c93e42 22731->22734 22732 c93a0d 90 API calls 22732->22734 22734->22732 22735 c919b1 22734->22735 22748 c9f944 22734->22748 22735->22727 22736 c91dd2 22735->22736 22737 c91ddc __EH_prolog 22736->22737 22756 c93a90 22737->22756 22739 c91e05 22740 c91736 69 API calls 22739->22740 22742 c91e8c 22739->22742 22741 c91e1c 22740->22741 22786 c918ad 69 API calls 22741->22786 22742->22727 22744 c91e34 22746 c91e40 22744->22746 22787 ca06d7 MultiByteToWideChar 22744->22787 22788 c918ad 69 API calls 22746->22788 22749 c9f94b 22748->22749 22750 c9f966 22749->22750 22754 c96d8a RaiseException Concurrency::cancel_current_task 22749->22754 22752 c9f977 SetThreadExecutionState 22750->22752 22755 c96d8a RaiseException Concurrency::cancel_current_task 22750->22755 22752->22734 22754->22750 22755->22752 22757 c93a9a __EH_prolog 22756->22757 22758 c93acc 22757->22758 22759 c93ab0 22757->22759 22760 c93d0c 22758->22760 22764 c93af8 22758->22764 22825 c9135c 67 API calls 22759->22825 22844 c9135c 67 API calls 22760->22844 22763 c93abb 22763->22739 22764->22763 22789 ca0bce 22764->22789 22766 c93b30 22793 ca1fa8 22766->22793 22768 c93b79 22769 c93c04 22768->22769 22785 c93b70 22768->22785 22828 c9c5cd 22768->22828 22806 c9a6f9 22769->22806 22770 c93b75 22770->22768 22827 c91fa5 69 API calls 22770->22827 22772 c93b47 22772->22768 22772->22770 22773 c93b65 22772->22773 22826 c9135c 67 API calls 22773->22826 22778 c93c17 22779 c93c88 22778->22779 22780 c93c92 22778->22780 22810 c99120 22779->22810 22834 ca1c3f 22780->22834 22783 c93c90 22783->22785 22843 c96f5f 67 API calls 22783->22843 22821 ca0e0f 22785->22821 22786->22744 22787->22746 22788->22742 22790 ca0bd8 __EH_prolog 22789->22790 22845 c9fb54 22790->22845 22792 ca0cd8 22792->22766 22794 ca1fb7 22793->22794 22796 ca1fc1 22793->22796 22856 c96dc7 68 API calls 22794->22856 22797 ca2001 22796->22797 22799 ca2006 ___std_exception_copy 22796->22799 22805 ca205f ___scrt_get_show_window_mode 22796->22805 22858 cb006c RaiseException 22797->22858 22800 ca2116 22799->22800 22801 ca203b 22799->22801 22799->22805 22859 cb006c RaiseException 22800->22859 22857 ca1ec9 68 API calls 3 library calls 22801->22857 22803 ca2139 22805->22772 22807 c9a706 22806->22807 22809 c9a710 22806->22809 22808 cacdac new 8 API calls 22807->22808 22808->22809 22809->22778 22811 c9912a __EH_prolog 22810->22811 22860 c97c6b 22811->22860 22814 c9138d 69 API calls 22815 c9913c 22814->22815 22863 c9c6a8 22815->22863 22817 c99196 22817->22783 22819 c9c6a8 114 API calls 22820 c9914e 22819->22820 22820->22817 22820->22819 22872 c9c860 90 API calls __vswprintf_c_l 22820->22872 22823 ca0e31 22821->22823 22882 c9fc3c 22823->22882 22824 ca0e4a 22824->22763 22825->22763 22826->22785 22827->22768 22829 c9c5ee 22828->22829 22830 c9c600 22828->22830 22896 c96182 73 API calls 22829->22896 22897 c96182 73 API calls 22830->22897 22833 c9c5f8 22833->22769 22835 ca1c48 22834->22835 22836 ca1c71 22834->22836 22837 ca1c65 22835->22837 22838 ca1c67 22835->22838 22840 ca1c5d 22835->22840 22836->22837 22912 ca421c 119 API calls 2 library calls 22836->22912 22837->22783 22911 ca4f34 114 API calls 22838->22911 22898 ca5983 22840->22898 22843->22785 22844->22763 22854 cacdf0 22845->22854 22847 c9fb5e EnterCriticalSection 22848 c9fb7d 22847->22848 22849 c9fba2 LeaveCriticalSection 22847->22849 22850 cacdac new 8 API calls 22848->22850 22849->22792 22851 c9fb87 22850->22851 22852 c9fb9d 22851->22852 22855 c9f982 71 API calls 22851->22855 22852->22849 22854->22847 22855->22852 22856->22796 22857->22805 22858->22800 22859->22803 22873 c9a930 22860->22873 22868 c9c6bd __vswprintf_c_l 22863->22868 22864 c9c807 22865 c9c82f 22864->22865 22876 c9c647 22864->22876 22867 c9f944 2 API calls 22865->22867 22870 c9c7fe 22867->22870 22868->22864 22868->22870 22880 c9a7e1 84 API calls 22868->22880 22881 ca77e6 93 API calls 22868->22881 22870->22820 22872->22820 22874 c9a944 GetVersionExW 22873->22874 22875 c97c70 22873->22875 22874->22875 22875->22814 22877 c9c650 22876->22877 22879 c9c6a1 22876->22879 22878 ca066e PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 22877->22878 22877->22879 22878->22879 22879->22865 22880->22868 22881->22868 22883 c9fc91 22882->22883 22884 c9fc43 EnterCriticalSection 22882->22884 22883->22824 22885 c9fc88 LeaveCriticalSection 22884->22885 22886 c9fc5d 22884->22886 22885->22883 22886->22885 22889 c9fa23 22886->22889 22888 c9fc7b 22888->22885 22890 c9fdb7 72 API calls 22889->22890 22891 c9fa45 ReleaseSemaphore 22890->22891 22892 c9fa83 DeleteCriticalSection FindCloseChangeNotification CloseHandle 22891->22892 22893 c9fa65 22891->22893 22892->22888 22894 c9fb19 70 API calls 22893->22894 22895 c9fa6f FindCloseChangeNotification 22894->22895 22895->22892 22895->22893 22896->22833 22897->22833 22913 ca21e5 22898->22913 22900 ca5994 ___BuildCatchObject __vswprintf_c_l 22901 c9c6a8 114 API calls 22900->22901 22902 ca5d66 22900->22902 22917 c9fab9 22900->22917 22923 ca2b39 114 API calls 22900->22923 22924 ca5db8 114 API calls 22900->22924 22925 c9fdb7 22900->22925 22929 ca2592 91 API calls __vswprintf_c_l 22900->22929 22930 ca63f1 119 API calls __vswprintf_c_l 22900->22930 22901->22900 22931 ca3ef0 91 API calls __vswprintf_c_l 22902->22931 22904 ca5d76 __vswprintf_c_l 22904->22837 22911->22837 22912->22837 22915 ca21ef ___std_exception_copy __EH_prolog ___scrt_get_show_window_mode 22913->22915 22914 ca22da 22914->22900 22915->22914 22916 c96dc7 68 API calls 22915->22916 22916->22915 22918 c9faca 22917->22918 22919 c9fac5 22917->22919 22921 c9fae3 22918->22921 22922 c9fdb7 72 API calls 22918->22922 22920 c9fbbd 77 API calls 22919->22920 22920->22918 22921->22900 22922->22921 22923->22900 22924->22900 22926 c9fdfc 22925->22926 22927 c9fdd1 ResetEvent ReleaseSemaphore 22925->22927 22926->22900 22928 c9fb19 70 API calls 22927->22928 22928->22926 22929->22900 22930->22900 22931->22904 22932->22575 22933->22575 22934->22572 22936 c95d76 22935->22936 22981 c95c95 22936->22981 22939 c95da9 22940 c95dea 22939->22940 22941 c95de1 22939->22941 22986 c9a9a0 CharUpperW CompareStringW CompareStringW 22939->22986 22940->22941 22987 c9f133 CompareStringW 22940->22987 22941->22587 22945 c980f8 22943->22945 22944 c98199 CharUpperW 22946 c981ac 22944->22946 22945->22944 22946->22590 22948 c97c20 22947->22948 22949 c97c60 22948->22949 22993 c96f05 67 API calls 22948->22993 22949->22597 22951 c97c58 22994 c9135c 67 API calls 22951->22994 22954 c99a73 22953->22954 22957 c99a82 22953->22957 22955 c99a79 FlushFileBuffers 22954->22955 22954->22957 22955->22957 22956 c99afb SetFileTime 22956->22653 22957->22956 22958->22579 22959->22581 22960->22608 22961->22597 22962->22597 22963->22595 22964->22611 22965->22603 22966->22611 22968 c99770 22967->22968 22969 c99773 GetFileType 22967->22969 22968->22618 22970 c99781 22969->22970 22970->22618 22971->22621 22972->22623 22973->22624 22974->22647 22975->22647 22976->22647 22977->22647 22978->22648 22979->22650 22980->22656 22988 c95b92 22981->22988 22983 c95cb6 22983->22939 22985 c95b92 3 API calls 22985->22983 22986->22939 22987->22941 22991 c95b9c 22988->22991 22989 c95c84 22989->22983 22989->22985 22991->22989 22992 c9a9a0 CharUpperW CompareStringW CompareStringW 22991->22992 22992->22991 22993->22951 22994->22949 22997 c9a2cd 22996->22997 22998 c9a2eb FindFirstFileW 22997->22998 22999 c9a35d FindNextFileW 22997->22999 23002 c9a304 22998->23002 23007 c9a341 22998->23007 23000 c9a368 GetLastError 22999->23000 23001 c9a37c 22999->23001 23000->23001 23001->23007 23003 c9b2c5 2 API calls 23002->23003 23004 c9a31d 23003->23004 23005 c9a321 FindFirstFileW 23004->23005 23006 c9a336 GetLastError 23004->23006 23005->23006 23005->23007 23006->23007 23007->22528 23017 ca8ade GetDC GetDeviceCaps ReleaseDC 23008->23017 23010 ca8ac6 23012 ca8ad2 23010->23012 23018 ca8b21 GetDC GetDeviceCaps ReleaseDC 23010->23018 23012->22228 23012->22229 23013->22235 23014->22238 23015->22238 23016->22241 23017->23010 23018->23012 23019->22246 23021 c99bf2 67 API calls 23020->23021 23022 c91f1a 23021->23022 23023 c91f1e 23022->23023 23024 c919e2 90 API calls 23022->23024 23023->22255 23023->22256 23025 c91f2b 23024->23025 23025->23023 23027 c9135c 67 API calls 23025->23027 23027->23023 23891 ca9645 92 API calls 23132 cacd5b 23133 cacd65 23132->23133 23134 cacabb ___delayLoadHelper2@8 19 API calls 23133->23134 23135 cacd72 23134->23135 23925 cad759 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 23867 ca995e 104 API calls 23868 ca955e 71 API calls 23926 cae750 51 API calls 2 library calls 23927 cb1f50 RtlUnwind 23836 cb006b RaiseException 23895 cb0e6a 48 API calls 23870 ca8962 GdipDisposeImage GdipFree pre_c_initialization 23838 c91067 75 API calls pre_c_initialization 23929 cb4b7a 52 API calls 2 library calls 23744 cab076 23746 cab07b 23744->23746 23758 caaa98 _wcsrchr 23744->23758 23745 ca96eb ExpandEnvironmentStringsW 23745->23758 23746->23758 23770 cab9a9 23746->23770 23748 cab641 23750 caad85 SetWindowTextW 23750->23758 23753 cb20ce 22 API calls 23753->23758 23755 caab76 SetFileAttributesW 23757 caac31 GetFileAttributesW 23755->23757 23767 caab69 ___scrt_get_show_window_mode 23755->23767 23760 caac3f DeleteFileW 23757->23760 23757->23767 23758->23745 23758->23748 23758->23750 23758->23753 23762 caaf4f GetDlgItem SetWindowTextW SendMessageW 23758->23762 23765 caaf91 SendMessageW 23758->23765 23758->23767 23769 ca0b00 CompareStringW 23758->23769 23793 ca8b8d GetCurrentDirectoryW 23758->23793 23794 c9a1f9 7 API calls 23758->23794 23797 c9a182 FindClose 23758->23797 23798 ca9843 69 API calls ___std_exception_copy 23758->23798 23760->23767 23762->23758 23763 c93f2b _swprintf 51 API calls 23764 caac74 GetFileAttributesW 23763->23764 23766 caac85 MoveFileW 23764->23766 23764->23767 23765->23758 23766->23767 23768 caac9d MoveFileExW 23766->23768 23767->23755 23767->23757 23767->23758 23767->23763 23795 c9b150 52 API calls 2 library calls 23767->23795 23796 c9a1f9 7 API calls 23767->23796 23768->23767 23769->23758 23771 cab9b3 ___scrt_get_show_window_mode 23770->23771 23772 caba9e 23771->23772 23778 cabc0b 23771->23778 23799 ca0b00 CompareStringW 23771->23799 23773 c99e4f 4 API calls 23772->23773 23775 cabab3 23773->23775 23776 cabad2 ShellExecuteExW 23775->23776 23800 c9ae70 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23775->23800 23776->23778 23784 cabae5 23776->23784 23778->23758 23779 cabaca 23779->23776 23780 cabb20 23801 cabe68 WaitForSingleObject PeekMessageW WaitForSingleObject 23780->23801 23781 cabb76 CloseHandle 23782 cabb8f 23781->23782 23783 cabb84 23781->23783 23782->23778 23789 cabc06 ShowWindow 23782->23789 23802 ca0b00 CompareStringW 23783->23802 23784->23780 23784->23781 23787 cabb1a ShowWindow 23784->23787 23787->23780 23788 cabb38 23788->23781 23790 cabb4b GetExitCodeProcess 23788->23790 23789->23778 23790->23781 23791 cabb5e 23790->23791 23791->23781 23793->23758 23794->23758 23795->23767 23796->23767 23797->23758 23798->23758 23799->23772 23800->23779 23801->23788 23802->23782 23899 cb4e74 55 API calls _free 23931 cbd774 IsProcessorFeaturePresent 23872 cb550a 8 API calls ___vcrt_uninitialize 23844 cad002 38 API calls 2 library calls 23932 cbc301 21 API calls __vswprintf_c_l 23900 cb7207 21 API calls 23846 c91019 29 API calls pre_c_initialization 23119 c99c18 23120 c99c2b 23119->23120 23125 c99c24 23119->23125 23121 c99c31 GetStdHandle 23120->23121 23126 c99c3c 23120->23126 23121->23126 23122 c99c91 WriteFile 23122->23126 23123 c99c5c 23124 c99c61 WriteFile 23123->23124 23123->23126 23124->23123 23124->23126 23126->23122 23126->23123 23126->23124 23126->23125 23128 c99d04 23126->23128 23130 c96d16 56 API calls 23126->23130 23131 c96f23 68 API calls 23128->23131 23130->23126 23131->23125 23848 cab81f 72 API calls 23933 cb1b10 5 API calls 2 library calls 23138 cb6417 23146 cb783d 23138->23146 23142 cb6433 23143 cb6440 23142->23143 23154 cb6443 11 API calls 23142->23154 23145 cb642b 23147 cb7726 _abort 5 API calls 23146->23147 23148 cb7864 23147->23148 23149 cb786d 23148->23149 23150 cb787c TlsAlloc 23148->23150 23151 cad763 DloadUnlock 5 API calls 23149->23151 23150->23149 23152 cb6421 23151->23152 23152->23145 23153 cb6392 20 API calls 2 library calls 23152->23153 23153->23142 23154->23145 23934 cad716 20 API calls 23904 cbee16 CloseHandle 23935 c91714 79 API calls 23936 cad72a 28 API calls 2 library calls 23874 ca0d28 26 API calls std::bad_exception::bad_exception 23905 c9de2a FreeLibrary 23185 c9192c 126 API calls __EH_prolog 23875 ca9122 73 API calls 23852 cbf820 DeleteCriticalSection 23188 cac725 19 API calls ___delayLoadHelper2@8 23876 cad533 46 API calls 5 library calls 23877 caa536 93 API calls _swprintf

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00C9F3A5: GetModuleHandleW.KERNEL32 ref: 00C9F3BD
                                • Part of subcall function 00C9F3A5: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00C9F3D5
                                • Part of subcall function 00C9F3A5: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00C9F3F8
                                • Part of subcall function 00CA8B8D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00CA8B95
                                • Part of subcall function 00CA9035: OleInitialize.OLE32(00000000), ref: 00CA904E
                                • Part of subcall function 00CA9035: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00CA9085
                                • Part of subcall function 00CA9035: SHGetMalloc.SHELL32(00CD20E8), ref: 00CA908F
                                • Part of subcall function 00CA0710: GetCPInfo.KERNEL32(00000000,?), ref: 00CA0721
                                • Part of subcall function 00CA0710: IsDBCSLeadByte.KERNEL32(00000000), ref: 00CA0735
                              • GetCommandLineW.KERNEL32 ref: 00CAC178
                              • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00CAC19F
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00CAC1B0
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00CAC1EA
                                • Part of subcall function 00CABE09: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00CABE1F
                                • Part of subcall function 00CABE09: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00CABE5B
                              • CloseHandle.KERNEL32(00000000), ref: 00CAC1F3
                              • GetModuleFileNameW.KERNEL32(00000000,00CE7938,00000800), ref: 00CAC20E
                              • SetEnvironmentVariableW.KERNEL32(sfxname,00CE7938), ref: 00CAC220
                              • GetLocalTime.KERNEL32(?), ref: 00CAC227
                              • _swprintf.LIBCMT ref: 00CAC266
                              • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00CAC278
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00CAC27B
                              • LoadIconW.USER32(00000000,00000064), ref: 00CAC292
                              • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00019B4E,00000000), ref: 00CAC2E3
                              • Sleep.KERNEL32(?), ref: 00CAC311
                              • DeleteObject.GDI32 ref: 00CAC350
                              • DeleteObject.GDI32(?), ref: 00CAC35C
                                • Part of subcall function 00CAA8D3: CharUpperW.USER32(?,?,?,?,00001000), ref: 00CAA92B
                                • Part of subcall function 00CAA8D3: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00CAA952
                              • CloseHandle.KERNEL32 ref: 00CAC39B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                              • API String ID: 985665271-3710569615
                              • Opcode ID: 371449cbcbb1ad94f527c4dff1613b702019a4af24cd1a6ce32c41e2a0ef093d
                              • Instruction ID: bb5d16844bd8a872ada141d5e365f3b6efd47551610f09b9c3e38e117e09f1a3
                              • Opcode Fuzzy Hash: 371449cbcbb1ad94f527c4dff1613b702019a4af24cd1a6ce32c41e2a0ef093d
                              • Instruction Fuzzy Hash: 9F612D71905345AFD720ABA5EC8AF6F37ECEB4A708F04442AF905D21A2DB748D44D7A1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 598 ca8bcf-ca8bea FindResourceW 599 ca8bf0-ca8c02 SizeofResource 598->599 600 ca8cc5-ca8cc7 598->600 601 ca8c22-ca8c24 599->601 602 ca8c04-ca8c13 LoadResource 599->602 604 ca8cc4 601->604 602->601 603 ca8c15-ca8c20 LockResource 602->603 603->601 605 ca8c29-ca8c3e GlobalAlloc 603->605 604->600 606 ca8cbe-ca8cc3 605->606 607 ca8c40-ca8c49 GlobalLock 605->607 606->604 608 ca8c4b-ca8c69 call cadfa0 607->608 609 ca8cb7-ca8cb8 GlobalFree 607->609 613 ca8c6b-ca8c83 call ca8b64 608->613 614 ca8cb0-ca8cb1 GlobalUnlock 608->614 609->606 613->614 618 ca8c85-ca8c8d 613->618 614->609 619 ca8ca8-ca8cac 618->619 620 ca8c8f-ca8ca3 GdipCreateHBITMAPFromBitmap 618->620 619->614 620->619 621 ca8ca5 620->621 621->619
                              APIs
                              • FindResourceW.KERNEL32(00000066,PNG,?,?,00CA9AC7,00000066), ref: 00CA8BE0
                              • SizeofResource.KERNEL32(00000000,75FD5780,?,?,00CA9AC7,00000066), ref: 00CA8BF8
                              • LoadResource.KERNEL32(00000000,?,?,00CA9AC7,00000066), ref: 00CA8C0B
                              • LockResource.KERNEL32(00000000,?,?,00CA9AC7,00000066), ref: 00CA8C16
                              • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,00CA9AC7,00000066), ref: 00CA8C34
                              • GlobalLock.KERNEL32(00000000,?,?,?,00CA9AC7,00000066), ref: 00CA8C41
                              • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00CA8C9C
                              • GlobalUnlock.KERNEL32(00000000), ref: 00CA8CB1
                              • GlobalFree.KERNEL32(00000000), ref: 00CA8CB8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                              • String ID: PNG
                              • API String ID: 4097654274-364855578
                              • Opcode ID: ae1daf429423a3e1aeb2fc8fb7d3bc24375a117e84e8000463c816f4359e10a5
                              • Instruction ID: 006909c1acbdeab821246e5950588282c75692c8e5ecc4fdd1bf2c579e81c06f
                              • Opcode Fuzzy Hash: ae1daf429423a3e1aeb2fc8fb7d3bc24375a117e84e8000463c816f4359e10a5
                              • Instruction Fuzzy Hash: 27218F71602306AFC7219F61DC48F2FBBA8EF467A9B14452CF856C2260EF31DC04CAA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 870 c9a2c3-c9a2e9 call cacec0 873 c9a2eb-c9a2fe FindFirstFileW 870->873 874 c9a35d-c9a366 FindNextFileW 870->874 877 c9a384-c9a42d call c9f160 call c9b952 call ca01af * 3 873->877 878 c9a304-c9a31f call c9b2c5 873->878 875 c9a368-c9a376 GetLastError 874->875 876 c9a37c-c9a37e 874->876 875->876 876->877 879 c9a432-c9a445 876->879 877->879 885 c9a321-c9a334 FindFirstFileW 878->885 886 c9a336-c9a33f GetLastError 878->886 885->877 885->886 888 c9a341-c9a344 886->888 889 c9a350 886->889 888->889 890 c9a346-c9a349 888->890 891 c9a352-c9a358 889->891 890->889 893 c9a34b-c9a34e 890->893 891->879 893->891
                              APIs
                              • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00C9A1BE,000000FF,?,?), ref: 00C9A2F8
                              • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,?,?,?,00C9A1BE,000000FF,?,?), ref: 00C9A32E
                              • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00C9A1BE,000000FF,?,?), ref: 00C9A336
                              • FindNextFileW.KERNEL32(?,?,?,?,?,?,00C9A1BE,000000FF,?,?), ref: 00C9A35E
                              • GetLastError.KERNEL32(?,?,?,?,00C9A1BE,000000FF,?,?), ref: 00C9A36A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: FileFind$ErrorFirstLast$Next
                              • String ID:
                              • API String ID: 869497890-0
                              • Opcode ID: 8afd715558be9295f21bbbfa58c890bd5cd52ac9d1fcbd44f9dd6753c807fcfa
                              • Instruction ID: bce174e6a5ee10ae2b220a08d671c64382c1cc89a402d1a24b4a73805aa00927
                              • Opcode Fuzzy Hash: 8afd715558be9295f21bbbfa58c890bd5cd52ac9d1fcbd44f9dd6753c807fcfa
                              • Instruction Fuzzy Hash: 98417E72604245AFC724EF68C884AEEF7E8BB49340F044A2AF5E9D3250D734E9548B92
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,00CB49D0,?,00CC7F60,0000000C,00CB4B27,?,00000002,00000000), ref: 00CB4A1B
                              • TerminateProcess.KERNEL32(00000000,?,00CB49D0,?,00CC7F60,0000000C,00CB4B27,?,00000002,00000000), ref: 00CB4A22
                              • ExitProcess.KERNEL32 ref: 00CB4A34
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 92726fd54c8d8aae254a99aee01dad85f742c98f8215b117fc093518b421a419
                              • Instruction ID: fbab60bab7b812b61a76e8ce59329f244bafd97827a96ec6c42bcf43e83fb468
                              • Opcode Fuzzy Hash: 92726fd54c8d8aae254a99aee01dad85f742c98f8215b117fc093518b421a419
                              • Instruction Fuzzy Hash: 67E09931454608ABCF16AB64D909B9C7B69EB55382F120518F8099A132CB36EE82EB84
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C983F0
                              • _memcmp.LIBVCRUNTIME ref: 00C98858
                                • Part of subcall function 00C980DA: CharUpperW.USER32(?,?,00000000,?,?,?,?,?,?,?,00000800,?,00C986CF,?,-00000930,?), ref: 00C9819D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CharH_prologUpper_memcmp
                              • String ID:
                              • API String ID: 4047935103-0
                              • Opcode ID: 61cae352dbeaffac9d9b213f4a8888b442099854adbbc23e99fda392cd5a9602
                              • Instruction ID: 27dd7e41ecdccfd7447af19631c39ee381f656ccd240b2f9c13dcf5148d79792
                              • Opcode Fuzzy Hash: 61cae352dbeaffac9d9b213f4a8888b442099854adbbc23e99fda392cd5a9602
                              • Instruction Fuzzy Hash: 70721971904185AEDF25DF64C899BF977A8AF06300F0840FAE9699B182DF319F8DD760
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 4b2d65133c5eac351394c952b72d2a0f5f6fdf5d6fdd6ef9761f2ba67c5de409
                              • Instruction ID: 6194d51ccbc59554867204acf940910b7b6fcda0f03137b6f5c764e19f43676c
                              • Opcode Fuzzy Hash: 4b2d65133c5eac351394c952b72d2a0f5f6fdf5d6fdd6ef9761f2ba67c5de409
                              • Instruction Fuzzy Hash: ECD127B1A047468FCB14CF28D88479BBBE0BF9630CF08856DE8559B642D334EE55CB96
                              APIs
                              • __EH_prolog.LIBCMT ref: 00CA9B53
                                • Part of subcall function 00C912E7: GetDlgItem.USER32(00000000,00003021), ref: 00C9132B
                                • Part of subcall function 00C912E7: SetWindowTextW.USER32(00000000,00CC02E4), ref: 00C91341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prologItemTextWindow
                              • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                              • API String ID: 810644672-2803697902
                              • Opcode ID: b3a9a835425c6d565f600f27132e6c01891441f5646cfcd35aca5af3bfea93d4
                              • Instruction ID: 8671fec15c75767dbc459e23fadb4d115c4eaac78ab6a560b0954b248c0248d1
                              • Opcode Fuzzy Hash: b3a9a835425c6d565f600f27132e6c01891441f5646cfcd35aca5af3bfea93d4
                              • Instruction Fuzzy Hash: 5C42167194134ABFEB21AB60DD8AFAE3BBCEB16718F044055F611A60D2C7744E44EB62

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 257 c9f3a5-c9f3c7 call cacec0 GetModuleHandleW 260 c9f3c9-c9f3e0 GetProcAddress 257->260 261 c9f41a-c9f681 257->261 262 c9f3f2-c9f3fc GetProcAddress 260->262 263 c9f3e2-c9f3ef 260->263 264 c9f74f-c9f780 GetModuleFileNameW call c9b8dc call c9f160 261->264 265 c9f687-c9f692 call cb461a 261->265 262->261 266 c9f3fe-c9f415 262->266 263->262 277 c9f782-c9f78c call c9a930 264->277 265->264 273 c9f698-c9f6c5 GetModuleFileNameW CreateFileW 265->273 266->261 275 c9f743-c9f74a CloseHandle 273->275 276 c9f6c7-c9f6d5 SetFilePointer 273->276 275->264 276->275 278 c9f6d7-c9f6f4 ReadFile 276->278 284 c9f799 277->284 285 c9f78e-c9f792 call c9f35b 277->285 278->275 280 c9f6f6-c9f71b 278->280 282 c9f738-c9f741 call c9ef59 280->282 282->275 292 c9f71d-c9f737 call c9f35b 282->292 286 c9f79b-c9f79d 284->286 289 c9f797 285->289 290 c9f7bf-c9f7e1 call c9b952 GetFileAttributesW 286->290 291 c9f79f-c9f7bd CompareStringW 286->291 289->286 294 c9f7e3-c9f7e7 290->294 299 c9f7eb 290->299 291->290 291->294 292->282 294->277 298 c9f7e9 294->298 300 c9f7ef-c9f7f4 298->300 299->300 301 c9f828-c9f82a 300->301 302 c9f7f6 300->302 303 c9f830-c9f847 call c9b926 call c9a930 301->303 304 c9f937-c9f941 301->304 305 c9f7f8-c9f81a call c9b952 GetFileAttributesW 302->305 315 c9f849-c9f8aa call c9f35b * 2 call c9d192 call c93f2b call c9d192 call ca8cca 303->315 316 c9f8af-c9f8e2 call c93f2b AllocConsole 303->316 311 c9f81c-c9f820 305->311 312 c9f824 305->312 311->305 313 c9f822 311->313 312->301 313->301 321 c9f92f-c9f931 ExitProcess 315->321 316->321 322 c9f8e4-c9f929 GetCurrentProcessId AttachConsole call cb20a3 GetStdHandle WriteConsoleW Sleep FreeConsole 316->322 322->321
                              APIs
                              • GetModuleHandleW.KERNEL32 ref: 00C9F3BD
                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00C9F3D5
                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00C9F3F8
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00C9F6A3
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C9F6BB
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00C9F6CD
                              • ReadFile.KERNEL32(00000000,?,00007FFE,00CC0858,00000000), ref: 00C9F6EC
                              • CloseHandle.KERNEL32(00000000), ref: 00C9F744
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00C9F75A
                              • CompareStringW.KERNEL32(00000400,00001001,00CC08A4,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 00C9F7B4
                              • GetFileAttributesW.KERNELBASE(?,?,00CC0870,00000800,?,00000000,?,00000800), ref: 00C9F7DD
                              • GetFileAttributesW.KERNEL32(?,?,00CC0930,00000800), ref: 00C9F816
                                • Part of subcall function 00C9F35B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C9F376
                                • Part of subcall function 00C9F35B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00C9DF18,Crypt32.dll,?,00C9DF9C,?,00C9DF7E,?,?,?,?), ref: 00C9F398
                              • _swprintf.LIBCMT ref: 00C9F886
                              • _swprintf.LIBCMT ref: 00C9F8D2
                                • Part of subcall function 00C93F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C93F3E
                              • AllocConsole.KERNEL32 ref: 00C9F8DA
                              • GetCurrentProcessId.KERNEL32 ref: 00C9F8E4
                              • AttachConsole.KERNEL32(00000000), ref: 00C9F8EB
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00C9F911
                              • WriteConsoleW.KERNEL32(00000000), ref: 00C9F918
                              • Sleep.KERNEL32(00002710), ref: 00C9F923
                              • FreeConsole.KERNEL32 ref: 00C9F929
                              • ExitProcess.KERNEL32 ref: 00C9F931
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                              • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                              • API String ID: 1201351596-3298887752
                              • Opcode ID: 0364b1da6a6b23e93f76d1e0851ba5270f9657e743b8f4bcec760a4eda965398
                              • Instruction ID: 8ef8f55ae8ce12e8972019c65170066a26ddb748db204a3982397c8edc0c056b
                              • Opcode Fuzzy Hash: 0364b1da6a6b23e93f76d1e0851ba5270f9657e743b8f4bcec760a4eda965398
                              • Instruction Fuzzy Hash: 85D16FF1048384EBDB70DF90D849F9FBBE8BB84704F60492DF59996181C7B09649CB66

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 404 caaa44-caaa5c call cacdf0 call cacec0 409 caaa62-caaa8c call ca96eb 404->409 410 cab644-cab651 404->410 409->410 413 caaa92-caaa97 409->413 414 caaa98-caaaa6 413->414 415 caaaa7-caaab7 call ca93b9 414->415 418 caaab9 415->418 419 caaabb-caaad0 call ca0b00 418->419 422 caaadd-caaae0 419->422 423 caaad2-caaad6 419->423 425 cab610-cab63b call ca96eb 422->425 426 caaae6 422->426 423->419 424 caaad8 423->424 424->425 425->414 439 cab641-cab643 425->439 427 caad9a-caad9c 426->427 428 caacdc-caacde 426->428 429 caaaed-caaaf0 426->429 430 caad7d-caad7f 426->430 427->425 434 caada2-caada9 427->434 428->425 436 caace4-caacf0 428->436 429->425 433 caaaf6-caab63 call ca8b8d call c9b5be call c9a16c call c9a2a6 call c96fa3 call c9a1f9 429->433 430->425 432 caad85-caad95 SetWindowTextW 430->432 432->425 503 caacc8-caacd7 call c9a182 433->503 504 caab69-caab6f 433->504 434->425 438 caadaf-caadc8 434->438 440 caacf2-caad03 call cb4644 436->440 441 caad04-caad09 436->441 443 caadca 438->443 444 caadd0-caadde call cb20a3 438->444 439->410 440->441 446 caad0b-caad11 441->446 447 caad13-caad1e call ca9843 441->447 443->444 444->425 461 caade4-caaded 444->461 448 caad23-caad25 446->448 447->448 454 caad30-caad50 call cb20a3 call cb20ce 448->454 455 caad27-caad2e call cb20a3 448->455 481 caad69-caad6b 454->481 482 caad52-caad59 454->482 455->454 465 caadef-caadf3 461->465 466 caae16-caae19 461->466 465->466 467 caadf5-caadfd 465->467 468 caaefe-caaf0c call c9f160 466->468 469 caae1f-caae22 466->469 467->425 473 caae03-caae11 call c9f160 467->473 484 caaf0e-caaf22 call cb02bb 468->484 474 caae2f-caae4a 469->474 475 caae24-caae29 469->475 473->484 493 caae4c-caae86 474->493 494 caae94-caae9b 474->494 475->468 475->474 481->425 485 caad71-caad78 call cb20be 481->485 488 caad5b-caad5d 482->488 489 caad60-caad68 call cb4644 482->489 505 caaf2f-caaf82 call c9f160 call ca9591 GetDlgItem SetWindowTextW SendMessageW call cb20d9 484->505 506 caaf24-caaf28 484->506 485->425 488->489 489->481 528 caae8a-caae8c 493->528 529 caae88 493->529 497 caaec9-caaeec call cb20a3 * 2 494->497 498 caae9d-caaeb5 call cb20a3 494->498 497->484 534 caaeee-caaefc call c9f138 497->534 498->497 515 caaeb7-caaec4 call c9f138 498->515 503->425 510 caab76-caab8b SetFileAttributesW 504->510 542 caaf87-caaf8b 505->542 506->505 511 caaf2a-caaf2c 506->511 516 caac31-caac3d GetFileAttributesW 510->516 517 caab91-caabc4 call c9b150 call c9ae45 call cb20a3 510->517 511->505 515->497 525 caac3f-caac4e DeleteFileW 516->525 526 caacad-caacc2 call c9a1f9 516->526 552 caabc6-caabd5 call cb20a3 517->552 553 caabd7-caabe5 call c9b57e 517->553 525->526 533 caac50-caac53 525->533 526->503 540 caab71 526->540 528->494 529->528 538 caac57-caac83 call c93f2b GetFileAttributesW 533->538 534->484 548 caac55-caac56 538->548 549 caac85-caac9b MoveFileW 538->549 540->510 542->425 547 caaf91-caafa3 SendMessageW 542->547 547->425 548->538 549->526 551 caac9d-caaca7 MoveFileExW 549->551 551->526 552->553 558 caabeb-caac2a call cb20a3 call cade40 552->558 553->503 553->558 558->516
                              APIs
                              • __EH_prolog.LIBCMT ref: 00CAAA49
                                • Part of subcall function 00CA96EB: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00CA97B3
                              • SetFileAttributesW.KERNEL32(?,00000005,?,?,?,00000800,?,?,00000000,00000001,00CAA35C,?,00000000), ref: 00CAAB7E
                              • GetFileAttributesW.KERNEL32(?), ref: 00CAAC38
                              • DeleteFileW.KERNEL32(?), ref: 00CAAC46
                              • SetWindowTextW.USER32(?,?), ref: 00CAAD8F
                              • _wcsrchr.LIBVCRUNTIME ref: 00CAAF19
                              • GetDlgItem.USER32(?,00000066), ref: 00CAAF54
                              • SetWindowTextW.USER32(00000000,?), ref: 00CAAF64
                              • SendMessageW.USER32(00000000,00000143,00000000,00CD412A), ref: 00CAAF78
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00CAAFA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                              • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                              • API String ID: 3676479488-312220925
                              • Opcode ID: 7fc31b9a797bb84284709cb8a826ef0d50b28841d70e095ea3f56b5bd95e67ff
                              • Instruction ID: e232c2b699ddd4b5c081bc9cf90cea6438018d2c3084c352bd5b99815bbb7d43
                              • Opcode Fuzzy Hash: 7fc31b9a797bb84284709cb8a826ef0d50b28841d70e095ea3f56b5bd95e67ff
                              • Instruction Fuzzy Hash: F5E1517290011AAAEF24ABA0ED85EEE737CEF06354F1044A6F519E3051EF709F84DB61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 563 c9cf27-c9cfa1 call c9c8de GetWindowRect GetClientRect 566 c9d042-c9d04a 563->566 567 c9cfa7-c9cfaf 563->567 568 c9d04c-c9d07e GetWindowTextW call c9c96f SetWindowTextW 566->568 569 c9d084-c9d09f GetSystemMetrics GetWindow 566->569 567->569 570 c9cfb5-c9cffe 567->570 568->569 572 c9d17d-c9d17f 569->572 573 c9d000 570->573 574 c9d002-c9d004 570->574 575 c9d185-c9d18f 572->575 576 c9d0a4-c9d0aa 572->576 573->574 578 c9d008-c9d03e GetWindowLongW GetWindowRect 574->578 579 c9d006 574->579 576->575 580 c9d0b0-c9d0c8 GetWindowTextW 576->580 578->566 579->578 581 c9d0ca-c9d0e9 call c9c96f SetWindowTextW 580->581 582 c9d0ef-c9d0f4 580->582 581->582 585 c9d16b-c9d17a GetWindow 582->585 586 c9d0f6-c9d164 GetWindowRect 582->586 585->575 588 c9d17c 585->588 586->585 588->572
                              APIs
                                • Part of subcall function 00C9C8DE: _wcschr.LIBVCRUNTIME ref: 00C9C90D
                              • GetWindowRect.USER32(?,?), ref: 00C9CF5E
                              • GetClientRect.USER32(?,?), ref: 00C9CF6A
                              • GetWindowLongW.USER32(?,000000F0), ref: 00C9D00B
                              • GetWindowRect.USER32(?,?), ref: 00C9D038
                              • GetWindowTextW.USER32(?,?,00000400), ref: 00C9D057
                              • SetWindowTextW.USER32(?,?), ref: 00C9D07E
                              • GetSystemMetrics.USER32(00000008), ref: 00C9D086
                              • GetWindow.USER32(?,00000005), ref: 00C9D091
                              • GetWindowTextW.USER32(00000000,?,00000400), ref: 00C9D0BC
                              • SetWindowTextW.USER32(00000000,00000000), ref: 00C9D0E9
                              • GetWindowRect.USER32(00000000,?), ref: 00C9D0FC
                              • GetWindow.USER32(00000000,00000002), ref: 00C9D16E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                              • String ID: d
                              • API String ID: 4134264131-2564639436
                              • Opcode ID: e011bd38340848f0e074dec28775c43830d9ac25f9ab0899e5d48a4bcbe4e6e6
                              • Instruction ID: 7513574e4d73e594bda7302a3533ab085595d0b5032514866eae4e4278580a49
                              • Opcode Fuzzy Hash: e011bd38340848f0e074dec28775c43830d9ac25f9ab0899e5d48a4bcbe4e6e6
                              • Instruction Fuzzy Hash: 08615AB2208305AFD710DF69CD88F6FBBEAEB89714F04591DF68592290CA74E9058B52

                              Control-flow Graph

                              APIs
                              • GetDlgItem.USER32(00000068,00CE8958), ref: 00CAB71C
                              • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,00CA9324), ref: 00CAB747
                              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00CAB756
                              • SendMessageW.USER32(00000000,000000C2,00000000,00CC02E4), ref: 00CAB760
                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00CAB776
                              • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00CAB78C
                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00CAB7CC
                              • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00CAB7D6
                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00CAB7E5
                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00CAB808
                              • SendMessageW.USER32(00000000,000000C2,00000000,00CC1368), ref: 00CAB813
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: MessageSend$ItemShowWindow
                              • String ID: \
                              • API String ID: 1207805008-2967466578
                              • Opcode ID: 01447fb0394af2ed0c3d3044fc081bf1f63fc4e3bcbda528c081895255f46388
                              • Instruction ID: 7599e365478a25c1706f3e028d843b1c4723472663780b21727e192f946b5fc5
                              • Opcode Fuzzy Hash: 01447fb0394af2ed0c3d3044fc081bf1f63fc4e3bcbda528c081895255f46388
                              • Instruction Fuzzy Hash: BF2146712857457BE311EB24DC45FAF7BDCEF82718F000619FAA0961D1C7A55E088AB7

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 622 cab9a9-cab9c1 call cacec0 625 cabc0d-cabc15 622->625 626 cab9c7-cab9d3 call cb20a3 622->626 626->625 629 cab9d9-caba01 call cade40 626->629 632 caba0b-caba18 629->632 633 caba03 629->633 634 caba1a 632->634 635 caba1c-caba25 632->635 633->632 634->635 636 caba5d 635->636 637 caba27-caba29 635->637 638 caba61-caba63 636->638 639 caba31-caba34 637->639 640 caba6a-caba6c 638->640 641 caba65-caba68 638->641 642 caba3a-caba42 639->642 643 cabbc1-cabbc6 639->643 648 caba7f-caba91 call c9b0ec 640->648 649 caba6e-caba75 640->649 641->640 641->648 644 cabbda-cabbe2 642->644 645 caba48-caba4e 642->645 646 cabbbb-cabbbf 643->646 647 cabbc8 643->647 652 cabbea-cabbf2 644->652 653 cabbe4-cabbe6 644->653 645->644 650 caba54-caba5b 645->650 646->643 651 cabbcd-cabbd1 646->651 647->651 657 cabaaa-cabab5 call c99e4f 648->657 658 caba93-cabaa0 call ca0b00 648->658 649->648 654 caba77 649->654 650->636 650->639 651->644 652->638 653->652 654->648 663 cabad2-cabadf ShellExecuteExW 657->663 664 cabab7-cabace call c9ae70 657->664 658->657 665 cabaa2 658->665 667 cabc0b-cabc0c 663->667 668 cabae5-cabaf8 663->668 664->663 665->657 667->625 670 cabafa-cabb01 668->670 671 cabb0b-cabb0d 668->671 670->671 672 cabb03-cabb09 670->672 673 cabb0f-cabb18 671->673 674 cabb20-cabb3f call cabe68 671->674 672->671 675 cabb76-cabb82 CloseHandle 672->675 673->674 684 cabb1a-cabb1e ShowWindow 673->684 674->675 689 cabb41-cabb49 674->689 677 cabb93-cabba1 675->677 678 cabb84-cabb91 call ca0b00 675->678 682 cabbfe-cabc00 677->682 683 cabba3-cabba5 677->683 678->677 690 cabbf7 678->690 682->667 687 cabc02-cabc04 682->687 683->682 688 cabba7-cabbad 683->688 684->674 687->667 691 cabc06-cabc09 ShowWindow 687->691 688->682 692 cabbaf-cabbb9 688->692 689->675 693 cabb4b-cabb5c GetExitCodeProcess 689->693 690->682 691->667 692->682 693->675 694 cabb5e-cabb68 693->694 695 cabb6a 694->695 696 cabb6f 694->696 695->696 696->675
                              APIs
                              • ShellExecuteExW.SHELL32(000001C0), ref: 00CABAD7
                              • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 00CABB1C
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00CABB54
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00CABB7A
                              • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 00CABC09
                                • Part of subcall function 00CA0B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00C9AC99,?,?,?,00C9AC48,?,-00000002,?,00000000,?), ref: 00CA0B16
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                              • String ID: $.exe$.inf
                              • API String ID: 3686203788-2452507128
                              • Opcode ID: dc1639d66ae36ec09b52c39fc9d06db758b3a1de7a55c0e0ad31b2374d7e30f1
                              • Instruction ID: 06a923e80f22abe04013db6bff7e2458f759db6d8d85334ddc822eb7d6d306bb
                              • Opcode Fuzzy Hash: dc1639d66ae36ec09b52c39fc9d06db758b3a1de7a55c0e0ad31b2374d7e30f1
                              • Instruction Fuzzy Hash: 0551D1704093829BD7319F20E990BBFB7E8EF86708F04081DE4D597156E7B19E48D762

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 697 c9cb1c-c9cb50 call cacdf0 call cacec0 call cb00da 704 c9cb83-c9cb8c call c9f160 697->704 705 c9cb52-c9cb81 GetModuleFileNameW call c9b8dc call c9f138 697->705 708 c9cb91-c9cbb5 call c99451 call c9978d 704->708 705->708 716 c9ce08-c9ce23 call c99487 708->716 717 c9cbbb-c9cbc4 708->717 719 c9cbc7-c9cbca 717->719 721 c9ccf8-c9cd18 call c99a30 call cb20c3 719->721 722 c9cbd0-c9cbd6 call c99b3b 719->722 721->716 731 c9cd1e-c9cd37 call c9995d 721->731 726 c9cbdb-c9cc02 call c9995d 722->726 732 c9cc08-c9cc10 726->732 733 c9ccc1-c9ccc4 726->733 743 c9cd39-c9cd3e 731->743 744 c9cd40-c9cd52 call cb20c3 731->744 736 c9cc3b-c9cc46 732->736 737 c9cc12-c9cc1a 732->737 734 c9ccc7-c9cce9 call c99a30 733->734 734->719 754 c9ccef-c9ccf2 734->754 740 c9cc48-c9cc54 736->740 741 c9cc71-c9cc79 736->741 737->736 738 c9cc1c-c9cc36 call cb3650 737->738 758 c9cc38 738->758 759 c9ccb7-c9ccbf 738->759 740->741 747 c9cc56-c9cc5b 740->747 748 c9cc7b-c9cc83 741->748 749 c9cca5-c9cca9 741->749 751 c9cd77-c9cd7f 743->751 744->716 764 c9cd58-c9cd75 call ca06d7 call cb20be 744->764 747->741 755 c9cc5d-c9cc6f call cb3579 747->755 748->749 756 c9cc85-c9cc9f call cb3650 748->756 749->733 750 c9ccab-c9ccae 749->750 750->732 761 c9cd81 751->761 762 c9cd84-c9cd91 751->762 754->716 754->721 755->741 770 c9ccb3 755->770 756->716 756->749 758->736 759->734 761->762 766 c9cdfd-c9ce05 762->766 767 c9cd93-c9cd95 762->767 764->751 766->716 771 c9cd96-c9cda0 767->771 770->759 771->766 773 c9cda2-c9cda6 771->773 775 c9cda8-c9cdaf 773->775 776 c9cde0-c9cde3 773->776 777 c9cdb1-c9cdb4 775->777 778 c9cdd6 775->778 780 c9cded-c9cdef 776->780 781 c9cde5-c9cdeb 776->781 782 c9cdd2-c9cdd4 777->782 783 c9cdb6-c9cdb9 777->783 784 c9cdd8-c9cdde 778->784 785 c9cdf0 780->785 781->780 781->785 782->784 786 c9cdbb-c9cdbe 783->786 787 c9cdce-c9cdd0 783->787 788 c9cdf4-c9cdfb 784->788 785->788 789 c9cdca-c9cdcc 786->789 790 c9cdc0-c9cdc4 786->790 787->784 788->766 788->771 789->784 790->785 791 c9cdc6-c9cdc8 790->791 791->784
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C9CB21
                              • _wcschr.LIBVCRUNTIME ref: 00C9CB3F
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00C9CB03,?), ref: 00C9CB5A
                                • Part of subcall function 00CA06D7: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00C9B2AB,00000000,?,?,?,?), ref: 00CA06F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                              • String ID: *messages***$*messages***$R$a
                              • API String ID: 803915177-2900423073
                              • Opcode ID: de879d9b7f41e9becc6554badc8ce70077b28fe4e460c891242591478dd84b6b
                              • Instruction ID: e760777b589de2955ef7a4e7a73e5ee2e33bda5fb67f47cfcac4205fb9eba0ef
                              • Opcode Fuzzy Hash: de879d9b7f41e9becc6554badc8ce70077b28fe4e460c891242591478dd84b6b
                              • Instruction Fuzzy Hash: E89115B2A002059BDF30DF68CC9DBEE7BA4EF55300F104469E669E7291DB709A85CB94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 792 cb739f-cb73b8 793 cb73ba-cb73ca call cbb9ae 792->793 794 cb73ce-cb73d3 792->794 793->794 801 cb73cc 793->801 796 cb73e0-cb7404 MultiByteToWideChar 794->796 797 cb73d5-cb73dd 794->797 799 cb740a-cb7416 796->799 800 cb7597-cb75aa call cad763 796->800 797->796 802 cb746a 799->802 803 cb7418-cb7429 799->803 801->794 806 cb746c-cb746e 802->806 807 cb742b-cb743a call cbf160 803->807 808 cb7448-cb7459 call cb59ec 803->808 810 cb758c 806->810 811 cb7474-cb7487 MultiByteToWideChar 806->811 807->810 817 cb7440-cb7446 807->817 808->810 818 cb745f 808->818 816 cb758e-cb7595 call cb7607 810->816 811->810 815 cb748d-cb749f call cb79fa 811->815 822 cb74a4-cb74a8 815->822 816->800 821 cb7465-cb7468 817->821 818->821 821->806 822->810 824 cb74ae-cb74b5 822->824 825 cb74ef-cb74fb 824->825 826 cb74b7-cb74bc 824->826 827 cb74fd-cb750e 825->827 828 cb7547 825->828 826->816 829 cb74c2-cb74c4 826->829 832 cb7529-cb753a call cb59ec 827->832 833 cb7510-cb751f call cbf160 827->833 830 cb7549-cb754b 828->830 829->810 831 cb74ca-cb74e4 call cb79fa 829->831 834 cb754d-cb7566 call cb79fa 830->834 835 cb7585-cb758b call cb7607 830->835 831->816 845 cb74ea 831->845 832->835 848 cb753c 832->848 833->835 847 cb7521-cb7527 833->847 834->835 849 cb7568-cb756f 834->849 835->810 845->810 850 cb7542-cb7545 847->850 848->850 851 cb75ab-cb75b1 849->851 852 cb7571-cb7572 849->852 850->830 853 cb7573-cb7583 WideCharToMultiByte 851->853 852->853 853->835 854 cb75b3-cb75ba call cb7607 853->854 854->816
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00CB2FB2,00CB2FB2,?,?,?,00CB75F0,00000001,00000001,F5E85006), ref: 00CB73F9
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00CB75F0,00000001,00000001,F5E85006,?,?,?), ref: 00CB747F
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00CB7579
                              • __freea.LIBCMT ref: 00CB7586
                                • Part of subcall function 00CB59EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CB239A,?,0000015D,?,?,?,?,00CB2F19,000000FF,00000000,?,?), ref: 00CB5A1E
                              • __freea.LIBCMT ref: 00CB758F
                              • __freea.LIBCMT ref: 00CB75B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                              • String ID:
                              • API String ID: 1414292761-0
                              • Opcode ID: 7f1f11d6805b9b49b02d8926f470822be63d01bc11f43aa06837ccab1f98f6f7
                              • Instruction ID: 408d95f388c7b7a5eae19eb926ce267a695e993d3be885c4ee41fb0e64a7073a
                              • Opcode Fuzzy Hash: 7f1f11d6805b9b49b02d8926f470822be63d01bc11f43aa06837ccab1f98f6f7
                              • Instruction Fuzzy Hash: 1C51CF72A04216AFDB258F64CC81EFF7BAAEB84750F254768FC14D7180EB34DD449AA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 857 ca8fc7-ca8fe6 GetClassNameW 858 ca8fe8-ca8ffd call ca0b00 857->858 859 ca900e-ca9010 857->859 864 ca8fff-ca900b FindWindowExW 858->864 865 ca900d 858->865 860 ca901b-ca901f 859->860 861 ca9012-ca9014 859->861 861->860 864->865 865->859
                              APIs
                              • GetClassNameW.USER32(?,?,00000050), ref: 00CA8FDE
                              • SHAutoComplete.SHLWAPI(?,00000010), ref: 00CA9015
                                • Part of subcall function 00CA0B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00C9AC99,?,?,?,00C9AC48,?,-00000002,?,00000000,?), ref: 00CA0B16
                              • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00CA9005
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AutoClassCompareCompleteFindNameStringWindow
                              • String ID: @Ut$EDIT
                              • API String ID: 4243998846-2065656831
                              • Opcode ID: 207dca9558d0293e0940ed944e612aec055ede7764c26283270a6a9e9fb46b51
                              • Instruction ID: b35341b518c3cefac184ca8ffcdf0cfb0450ed018fd0c35c141f621d611b5a23
                              • Opcode Fuzzy Hash: 207dca9558d0293e0940ed944e612aec055ede7764c26283270a6a9e9fb46b51
                              • Instruction Fuzzy Hash: 94F08932A0171D77E7305665AD09FDF766CDB4BB55F040055FD00E2180D7609901DAF6

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00C9F35B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C9F376
                                • Part of subcall function 00C9F35B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00C9DF18,Crypt32.dll,?,00C9DF9C,?,00C9DF7E,?,?,?,?), ref: 00C9F398
                              • OleInitialize.OLE32(00000000), ref: 00CA904E
                              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00CA9085
                              • SHGetMalloc.SHELL32(00CD20E8), ref: 00CA908F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                              • String ID: riched20.dll$3So
                              • API String ID: 3498096277-3464455743
                              • Opcode ID: f2faabdd4aadbdc155dd7b5ef36cc379e134a6b3d0b3110299d34ab5ccccd511
                              • Instruction ID: 15a94dcf97daf4b71917202ec6016d5bada793efd1deb8fd3a253093e3ffcf4f
                              • Opcode Fuzzy Hash: f2faabdd4aadbdc155dd7b5ef36cc379e134a6b3d0b3110299d34ab5ccccd511
                              • Instruction Fuzzy Hash: 91F04FB1C0010DABCB10AF9AD849AEEFFFCEF84704F00416AE814E2211C7B45645CFA1

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00C9FDB7: ResetEvent.KERNEL32(?,0072D298,00C9FA45,00CD1E74,0072D298,?,-00000001,00CBF605,000000FF,?,00C9FC7B,?,?,00C9A5F0,?), ref: 00C9FDD7
                                • Part of subcall function 00C9FDB7: ReleaseSemaphore.KERNEL32(?,?,00000000,?,-00000001,00CBF605,000000FF,?,00C9FC7B,?,?,00C9A5F0,?), ref: 00C9FDEB
                              • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 00C9FA57
                              • FindCloseChangeNotification.KERNELBASE(0072D29C,0072D29C), ref: 00C9FA71
                              • DeleteCriticalSection.KERNEL32(0072D438), ref: 00C9FA8A
                              • FindCloseChangeNotification.KERNELBASE(?), ref: 00C9FA96
                              • CloseHandle.KERNEL32(?), ref: 00C9FAA2
                                • Part of subcall function 00C9FB19: WaitForSingleObject.KERNEL32(?,000000FF,00C9FCF9,?,?,00C9FD6E,?,?,?,?,?,00C9FD58), ref: 00C9FB1F
                                • Part of subcall function 00C9FB19: GetLastError.KERNEL32(?,?,00C9FD6E,?,?,?,?,?,00C9FD58), ref: 00C9FB2B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Close$ChangeFindNotificationReleaseSemaphore$CriticalDeleteErrorEventHandleLastObjectResetSectionSingleWait
                              • String ID:
                              • API String ID: 3803654862-0
                              • Opcode ID: 1bddf7689d5fe08a29ba61e7c4d925873385a41e481065345f6c6b97b16285f0
                              • Instruction ID: 3f37252b58064966f72fd640ad634cd041dd4eef24b92ad659222c6e32d8fd38
                              • Opcode Fuzzy Hash: 1bddf7689d5fe08a29ba61e7c4d925873385a41e481065345f6c6b97b16285f0
                              • Instruction Fuzzy Hash: BC018832100B44EBCB219F28DD88F8ABBAAFB45710F10456DF2AA92561CB712801DB60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 906 cabe09-cabe34 call cacec0 SetEnvironmentVariableW call c9ef59 910 cabe39-cabe3d 906->910 911 cabe3f-cabe43 910->911 912 cabe61-cabe65 910->912 913 cabe4c-cabe53 call c9f050 911->913 916 cabe45-cabe4b 913->916 917 cabe55-cabe5b SetEnvironmentVariableW 913->917 916->913 917->912
                              APIs
                              • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00CABE1F
                              • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00CABE5B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: EnvironmentVariable
                              • String ID: sfxcmd$sfxpar
                              • API String ID: 1431749950-3493335439
                              • Opcode ID: 079ba407f0d69425bc611d675871856f3b17ee35fc5206a3415d76d896b75f61
                              • Instruction ID: 9d7355fc14be04a89571240f46fb5ced55d6a65094d1dec6b95c2efb24681f1d
                              • Opcode Fuzzy Hash: 079ba407f0d69425bc611d675871856f3b17ee35fc5206a3415d76d896b75f61
                              • Instruction Fuzzy Hash: 27F0EC72801226AADB256BD2DC0DFFEB79CDF16B41B040016FD4896143D7618D40D7F1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 918 c9978d-c997ae call cacec0 921 c997b0-c997b5 918->921 922 c997b7 918->922 921->922 923 c997b9-c997d6 921->923 922->923 924 c997d8 923->924 925 c997de-c997e8 923->925 924->925 926 c997ea 925->926 927 c997ed-c99818 CreateFileW 925->927 926->927 928 c9981a-c9983c GetLastError call c9b2c5 927->928 929 c9987c-c99891 927->929 935 c9986b-c99870 928->935 936 c9983e-c99860 CreateFileW GetLastError 928->936 930 c998ab-c998b6 929->930 931 c99893-c998a6 call c9f160 929->931 931->930 935->929 939 c99872 935->939 937 c99862 936->937 938 c99866-c99869 936->938 937->938 938->929 938->935 939->929
                              APIs
                              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,00000000,?,?,00C9777A,?,00000005,?,00000011), ref: 00C9980D
                              • GetLastError.KERNEL32(?,?,00C9777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00C9981A
                              • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00C9777A,?,00000005,?), ref: 00C9984F
                              • GetLastError.KERNEL32(?,?,00C9777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00C99857
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CreateErrorFileLast
                              • String ID:
                              • API String ID: 1214770103-0
                              • Opcode ID: 6692484e052f9952e1b875d56eae077e8e300a3c116df18a1792fd2c4bd529b0
                              • Instruction ID: cb683b42ffe5c8941fc27895dfdc067c4a8c4bc8a972de7ce0ea13f5c119c4c6
                              • Opcode Fuzzy Hash: 6692484e052f9952e1b875d56eae077e8e300a3c116df18a1792fd2c4bd529b0
                              • Instruction Fuzzy Hash: 6F3154708407456BDB209F68CC49BEABAA8FB49324F10472DF8A0872D1D7759A888B90
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00C99673
                              • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00C9968B
                              • GetLastError.KERNEL32 ref: 00C996BD
                              • GetLastError.KERNEL32 ref: 00C996DC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorLast$FileHandleRead
                              • String ID:
                              • API String ID: 2244327787-0
                              • Opcode ID: 0f201efce8b3ced63fbb3f4f2f31616e374ff8732630f51e3fac7999676ef63f
                              • Instruction ID: 3fda79411b8df10c1c8f0510276a507d73a8dda90e1f83b91ce806cf537579eb
                              • Opcode Fuzzy Hash: 0f201efce8b3ced63fbb3f4f2f31616e374ff8732630f51e3fac7999676ef63f
                              • Instruction Fuzzy Hash: 6D118B30500214EFCFA0AFA9C848F6E77ACEB15321F10852EF92A85290DB368E50DF52
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00CB2203,00000000,00000000,?,00CB7769,00CB2203,00000000,00000000,00000000,?,00CB7966,00000006,FlsSetValue), ref: 00CB77F4
                              • GetLastError.KERNEL32(?,00CB7769,00CB2203,00000000,00000000,00000000,?,00CB7966,00000006,FlsSetValue,00CC3768,00CC3770,00000000,00000364,?,00CB63E0), ref: 00CB7800
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00CB7769,00CB2203,00000000,00000000,00000000,?,00CB7966,00000006,FlsSetValue,00CC3768,00CC3770,00000000), ref: 00CB780E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: 739211b8d4a5f22fa2c7ca2d1513420d5edba424f2ab017de6b931b85ea2607b
                              • Instruction ID: 84e268c0ce31367bf80e17bd50204c1360baa0f5b4d8689d77e42e9b3f75b93d
                              • Opcode Fuzzy Hash: 739211b8d4a5f22fa2c7ca2d1513420d5edba424f2ab017de6b931b85ea2607b
                              • Instruction Fuzzy Hash: 0301F7326492229BC7214A69EC48FAF7798AF95BA1F210720FD1AF7180D721DD01C6E0
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CA992E
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CA993F
                              • TranslateMessage.USER32(?), ref: 00CA9949
                              • DispatchMessageW.USER32(?), ref: 00CA9953
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Message$DispatchPeekTranslate
                              • String ID:
                              • API String ID: 4217535847-0
                              • Opcode ID: 889a2d1a2308e780de4edbc371a85a54039fa385971a6d766855dfac7af2b3d4
                              • Instruction ID: 15ceda1bf9c5a7052ef1b4b51924de5168cf47ceb30d5c49f530f1ffe7fd3dce
                              • Opcode Fuzzy Hash: 889a2d1a2308e780de4edbc371a85a54039fa385971a6d766855dfac7af2b3d4
                              • Instruction Fuzzy Hash: 90E0ED72C0212EB78B20ABF6EC4CEDFBF6CEE0A2A97004015F519D2000D6789506CBF1
                              APIs
                              • CreateThread.KERNELBASE(00000000,00010000,Function_0000FD4F,?,00000000,00000000), ref: 00C9FBE1
                              • SetThreadPriority.KERNEL32(?,00000000), ref: 00C9FC28
                                • Part of subcall function 00C96D8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C96DAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Thread$CreatePriority__vswprintf_c_l
                              • String ID: CreateThread failed
                              • API String ID: 2655393344-3849766595
                              • Opcode ID: 67c2b5c5b782874bd1c391f5dc6ce71c8923634aab98b9c925abeca2a19b3005
                              • Instruction ID: 396ede0894bee776c261be287dac2507c15e25cce223be56a5eba28bd061d533
                              • Opcode Fuzzy Hash: 67c2b5c5b782874bd1c391f5dc6ce71c8923634aab98b9c925abeca2a19b3005
                              • Instruction Fuzzy Hash: B701F976345309BFDB206F98DC9AF667359EB41751F20003EF995D61C0CAE16C428760
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,?,?,00C9C8A3,00000001,?,?,?,00000000,00CA420A,?,?,?,?,?,00CA3CAF), ref: 00C99C33
                              • WriteFile.KERNEL32(?,00000000,?,00CA3EB7,00000000,?,?,00000000,00CA420A,?,?,?,?,?,00CA3CAF,?), ref: 00C99C73
                              • WriteFile.KERNELBASE(?,00000000,?,00CA3EB7,00000000,?,00000001,?,?,00C9C8A3,00000001,?,?,?,00000000,00CA420A), ref: 00C99CA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: FileWrite$Handle
                              • String ID:
                              • API String ID: 4209713984-0
                              • Opcode ID: 3c3efa0668e96cc4462cc5da8fae2c60e4534763c1e23b292a6dfd3a07b85ddf
                              • Instruction ID: 39be3da11c40ed847ccbb16d5bd100c78c421dd31f131706d785d9cef1596258
                              • Opcode Fuzzy Hash: 3c3efa0668e96cc4462cc5da8fae2c60e4534763c1e23b292a6dfd3a07b85ddf
                              • Instruction Fuzzy Hash: 6B312572148609AFDF209F18DC4DFAAB7A8FB51301F10411DF5A5935C0C775EA89CBA1
                              APIs
                              • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00C99DE2,?,00000001,00000000,?,?), ref: 00C99EFD
                              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00C99DE2,?,00000001,00000000,?,?), ref: 00C99F30
                              • GetLastError.KERNEL32(?,?,?,?,00C99DE2,?,00000001,00000000,?,?), ref: 00C99F4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CreateDirectory$ErrorLast
                              • String ID:
                              • API String ID: 2485089472-0
                              • Opcode ID: 7a66ed331c42dcf68c343b8573a9442f675738de0529472b535c629c76b374a7
                              • Instruction ID: 8680322edbded15f0af2050565177f01f53e21cc355b5c8975ba01f4d3ff3c3f
                              • Opcode Fuzzy Hash: 7a66ed331c42dcf68c343b8573a9442f675738de0529472b535c629c76b374a7
                              • Instruction Fuzzy Hash: AE01BC31104258A6DF21ABAC8C4EFEEB34CEF0AB81F180489F815E6081D774DA80A7E5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID: CMT
                              • API String ID: 3519838083-2756464174
                              • Opcode ID: 51ab31198e46a9e2674d9b4d6c1612cb4c07f6420e630beecd77633617dd2ee6
                              • Instruction ID: 5a36088283c3df671660385b4246be6969dd4f6b635cc16be64f4fc4716c592c
                              • Opcode Fuzzy Hash: 51ab31198e46a9e2674d9b4d6c1612cb4c07f6420e630beecd77633617dd2ee6
                              • Instruction Fuzzy Hash: 0861AA71100F84AADF21DF74CC99AEBB7E8AB14301F44496EE5AB87142DB326B48DF50
                              APIs
                              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00CB82D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Info
                              • String ID:
                              • API String ID: 1807457897-3916222277
                              • Opcode ID: 3280bac2317e6425b92fb9eeaf129a45ebaaefd437667b7a0e70247a72726bc0
                              • Instruction ID: b9fc4f2a6373985a0b373c69b4ce1b4eb4aeb1c5c6252f4c4f4173ea7bcf1e34
                              • Opcode Fuzzy Hash: 3280bac2317e6425b92fb9eeaf129a45ebaaefd437667b7a0e70247a72726bc0
                              • Instruction Fuzzy Hash: C541387050838C9BDF228E68CC84BFABBFDEB45708F1404ECE59A87142D6359A49DF60
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C91DD7
                                • Part of subcall function 00C93A90: __EH_prolog.LIBCMT ref: 00C93A95
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID: CMT
                              • API String ID: 3519838083-2756464174
                              • Opcode ID: e4f1cacfd5fea63fef2ee3c8a89bd2cd79980e1e7bed261633cfd5207a8379b9
                              • Instruction ID: 1d722d7a546920efc0a396529067b03f410803e4fc72fcba3b60fed0c98a5ef3
                              • Opcode Fuzzy Hash: e4f1cacfd5fea63fef2ee3c8a89bd2cd79980e1e7bed261633cfd5207a8379b9
                              • Instruction Fuzzy Hash: 58214B7190020A9FCF15EF98C94A9EEFBF6BF59300F14006DE855A3251C7326E11EB64
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID: CMT
                              • API String ID: 3519838083-2756464174
                              • Opcode ID: e42465eb3eaa5eff7d3c8305e42511feb188ab5e7bef33534ffc8b875b2da7a7
                              • Instruction ID: e330dad2fbe31fa3509510c90649a3b1c691a6e3e2a92e3ea6d6937fca159b1e
                              • Opcode Fuzzy Hash: e42465eb3eaa5eff7d3c8305e42511feb188ab5e7bef33534ffc8b875b2da7a7
                              • Instruction Fuzzy Hash: 9D11D371A00206AFCF04DF65C49AABEF7AAFF55300F08401AEC5A97341DB349950EB90
                              APIs
                              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F5E85006,00000001,?,000000FF), ref: 00CB7A6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: String
                              • String ID: LCMapStringEx
                              • API String ID: 2568140703-3893581201
                              • Opcode ID: 6c2146ab853ef8477cc46741a31a831fdea727a72fdf560a24f2a0def3d9d7ec
                              • Instruction ID: fe1d76693b5a1cae1a0c7b59ecabffb87ca10e549e59f8d6d2bf3831f5e418d9
                              • Opcode Fuzzy Hash: 6c2146ab853ef8477cc46741a31a831fdea727a72fdf560a24f2a0def3d9d7ec
                              • Instruction Fuzzy Hash: 4601257654020DFBCF02AF90DD09EEE7FA2EF48750F148214FE1966160DA328A31EB80
                              APIs
                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00CB708B), ref: 00CB79E3
                              Strings
                              • InitializeCriticalSectionEx, xrefs: 00CB79B3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CountCriticalInitializeSectionSpin
                              • String ID: InitializeCriticalSectionEx
                              • API String ID: 2593887523-3084827643
                              • Opcode ID: 910e8eefd6a8909b7ca8246ec57858c0c90c944500536e8a6a7b814b2eb1f52b
                              • Instruction ID: c4c4e5bb1759539d011e870df303c9d16e70f6393a67230d43f63abdb3fd6e91
                              • Opcode Fuzzy Hash: 910e8eefd6a8909b7ca8246ec57858c0c90c944500536e8a6a7b814b2eb1f52b
                              • Instruction Fuzzy Hash: 88F0B475A45218FBCB01AF51DD05E9EBF61DB44720F144169FC1566160DE714E20E7D1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Alloc
                              • String ID: FlsAlloc
                              • API String ID: 2773662609-671089009
                              • Opcode ID: c9fe68f86b2d6596fb0c3c16f6c8a6ffe74b750ceb7eabb01970180ee0f6527f
                              • Instruction ID: 43d0a4f9a6760480d1b6e877ef9fee0052d9091d38d4878e9fd7cbe586065bd8
                              • Opcode Fuzzy Hash: c9fe68f86b2d6596fb0c3c16f6c8a6ffe74b750ceb7eabb01970180ee0f6527f
                              • Instruction Fuzzy Hash: 2CE0E570B45218BB8705BB61ED0AFAEBB94CB85B20F140169FD06B7281DE614F00D7D5
                              APIs
                              • try_get_function.LIBVCRUNTIME ref: 00CB1D9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: try_get_function
                              • String ID: FlsAlloc
                              • API String ID: 2742660187-671089009
                              • Opcode ID: cf30b194e32af2a7dc797603c9ec5a677bce8003bac48192645fd710d8ffceea
                              • Instruction ID: db495aaab137651cf903abdc7ee2a026dc170db2caae288affc01e1db52257fe
                              • Opcode Fuzzy Hash: cf30b194e32af2a7dc797603c9ec5a677bce8003bac48192645fd710d8ffceea
                              • Instruction Fuzzy Hash: 96D05B35B823347BD51536D5DC02FDEBE84CB02FB1F4C0075FF096514795514590A5D1
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CACD6D
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID: 3So
                              • API String ID: 1269201914-1105799393
                              • Opcode ID: 6ac72d1124a1a9b76d90b49441152868c03fbabefcb213d5b68c7f0968ef4c17
                              • Instruction ID: aec4f2c6767c3b7351ce8b781282d7a3031d14afb7e5c044673b30880113009a
                              • Opcode Fuzzy Hash: 6ac72d1124a1a9b76d90b49441152868c03fbabefcb213d5b68c7f0968ef4c17
                              • Instruction Fuzzy Hash: C3B012C2668006FD35149219EE4ED37010CC2C1F19330843FF402D0041B8400C477032
                              APIs
                                • Part of subcall function 00CB81DC: GetOEMCP.KERNEL32(00000000,?,?,00CB8465,?), ref: 00CB8207
                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00CB84AA,?,00000000), ref: 00CB867D
                              • GetCPInfo.KERNEL32(00000000,00CB84AA,?,?,?,00CB84AA,?,00000000), ref: 00CB8690
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CodeInfoPageValid
                              • String ID:
                              • API String ID: 546120528-0
                              • Opcode ID: 0434a34c6ae903672399e6b4dde774f0f82cb79f4f6bee39f9b2340a9c393d60
                              • Instruction ID: 748a7ded0037bba6a6f9799e74355d791bf385c42b35efab7581363acab3ae4c
                              • Opcode Fuzzy Hash: 0434a34c6ae903672399e6b4dde774f0f82cb79f4f6bee39f9b2340a9c393d60
                              • Instruction Fuzzy Hash: C85138709002459EDB24CF35C485AFBBBEDEF41308F28406EE1569B151DF35DA4ADB91
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C913B4
                                • Part of subcall function 00C95F9E: __EH_prolog.LIBCMT ref: 00C95FA3
                                • Part of subcall function 00C9C463: __EH_prolog.LIBCMT ref: 00C9C468
                                • Part of subcall function 00C9C463: new.LIBCMT ref: 00C9C4AB
                                • Part of subcall function 00C9C463: new.LIBCMT ref: 00C9C4CF
                              • new.LIBCMT ref: 00C9142C
                                • Part of subcall function 00C9ACB6: __EH_prolog.LIBCMT ref: 00C9ACBB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: daedf4c2b3d749e20f005035a20d81a5f85e06b9560c026f6eb73d85db3067e8
                              • Instruction ID: bb24b82ce60bafd295073a8edf1f6492fcc635681e57206da63d64d9d4d63f1a
                              • Opcode Fuzzy Hash: daedf4c2b3d749e20f005035a20d81a5f85e06b9560c026f6eb73d85db3067e8
                              • Instruction Fuzzy Hash: AB4125B0905B41DEDB20CF7A8489AE6FBE5FF29300F54492ED5EE87282CB326554CB11
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C913B4
                                • Part of subcall function 00C95F9E: __EH_prolog.LIBCMT ref: 00C95FA3
                                • Part of subcall function 00C9C463: __EH_prolog.LIBCMT ref: 00C9C468
                                • Part of subcall function 00C9C463: new.LIBCMT ref: 00C9C4AB
                                • Part of subcall function 00C9C463: new.LIBCMT ref: 00C9C4CF
                              • new.LIBCMT ref: 00C9142C
                                • Part of subcall function 00C9ACB6: __EH_prolog.LIBCMT ref: 00C9ACBB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 674fc3e0963132aa36e6d66283312e5fdaac5d8cfd7b5cc298282815ba1091ff
                              • Instruction ID: 9f573db0f74ce98b1e5678d11033e570993a39293f3d2544f623d656a148368f
                              • Opcode Fuzzy Hash: 674fc3e0963132aa36e6d66283312e5fdaac5d8cfd7b5cc298282815ba1091ff
                              • Instruction Fuzzy Hash: 404125B0805B40DED720CF7A8489AE6FBE5FF29300F54492ED5EE87282CB326554CB11
                              APIs
                                • Part of subcall function 00CB630E: GetLastError.KERNEL32(?,00CCCBE8,00CB2664,00CCCBE8,?,?,00CB2203,?,?,00CCCBE8), ref: 00CB6312
                                • Part of subcall function 00CB630E: _free.LIBCMT ref: 00CB6345
                                • Part of subcall function 00CB630E: SetLastError.KERNEL32(00000000,?,00CCCBE8), ref: 00CB6386
                                • Part of subcall function 00CB630E: _abort.LIBCMT ref: 00CB638C
                                • Part of subcall function 00CB8567: _abort.LIBCMT ref: 00CB8599
                                • Part of subcall function 00CB8567: _free.LIBCMT ref: 00CB85CD
                                • Part of subcall function 00CB81DC: GetOEMCP.KERNEL32(00000000,?,?,00CB8465,?), ref: 00CB8207
                              • _free.LIBCMT ref: 00CB84C0
                              • _free.LIBCMT ref: 00CB84F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free$ErrorLast_abort
                              • String ID:
                              • API String ID: 2991157371-0
                              • Opcode ID: b6b8cbed739c9a3fc2fe630a96ba66b15242c31d74e96260b119bba8fbe6ab0c
                              • Instruction ID: 04294883097416ac23afa2f15604cb53822f3d3d248f93bba3719f970179f392
                              • Opcode Fuzzy Hash: b6b8cbed739c9a3fc2fe630a96ba66b15242c31d74e96260b119bba8fbe6ab0c
                              • Instruction Fuzzy Hash: 4C31B131904209AFDB10EBA9D445BEDB7F9EF40320F254099F9189B2A1EF369E49DF50
                              APIs
                              • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00C99BD7,?,?,00C97735), ref: 00C995C9
                              • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00C99BD7,?,?,00C97735), ref: 00C995FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 7ed3b110ecbee8f0d204043ccde17a36b47e5dd8f5cd6a4720bc220a37dbed3c
                              • Instruction ID: 0fbfb0abe1cda7637dd499f1ef30a38cff6ab64aeeac54324f991fcb1fdffff7
                              • Opcode Fuzzy Hash: 7ed3b110ecbee8f0d204043ccde17a36b47e5dd8f5cd6a4720bc220a37dbed3c
                              • Instruction Fuzzy Hash: A921F6B1404748AFDB308F28CC89BAB77ECEB09764F014A2DF4E5821D1C374AD499A61
                              APIs
                              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,00C97436,?,?,?), ref: 00C99A7C
                              • SetFileTime.KERNELBASE(?,?,?,?), ref: 00C99B2C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: File$BuffersFlushTime
                              • String ID:
                              • API String ID: 1392018926-0
                              • Opcode ID: 2d9d08a43612be9bb4be866ceba0af3babacbbf108fbb369e4d8958335017dbe
                              • Instruction ID: e9fa6da1c00aa21bf7a2bd29fcf282f1caca6e9590335f9ed60713a7c0fa331e
                              • Opcode Fuzzy Hash: 2d9d08a43612be9bb4be866ceba0af3babacbbf108fbb369e4d8958335017dbe
                              • Instruction Fuzzy Hash: 2E21E431158241ABCB11CE68C489ABABBD8EB92704F08091CF8E5C7141DB39DE08E751
                              APIs
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00CB7786
                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00CB7793
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AddressProc__crt_fast_encode_pointer
                              • String ID:
                              • API String ID: 2279764990-0
                              • Opcode ID: ca6f3373120bccdcafef71def553620cf69ff43d932ff9313b5932f341d16206
                              • Instruction ID: 4bddcd5cebdb2794c763cb5b3550ead08b59b5d57aab0f0d532424b2a004a40e
                              • Opcode Fuzzy Hash: ca6f3373120bccdcafef71def553620cf69ff43d932ff9313b5932f341d16206
                              • Instruction Fuzzy Hash: 9B11E337A041249F9B239E29EC94EDE73A5ABC4724F1A4320ED24FB254EF31DD4186D1
                              APIs
                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00C99B71
                              • GetLastError.KERNEL32 ref: 00C99B7D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: fd56fb4d7f51d9c5aeb1b3942b53cc3acb7921dc5463d3a2ee9e8cc2f6e86a83
                              • Instruction ID: fecf64a037ddfce82408d8cced38875c26356618aaa1641e4adc582d89686309
                              • Opcode Fuzzy Hash: fd56fb4d7f51d9c5aeb1b3942b53cc3acb7921dc5463d3a2ee9e8cc2f6e86a83
                              • Instruction Fuzzy Hash: 85019E70701304ABEF349E6DEC88B6AB7D9EB84319F14463EF162C36C0CA39DD088621
                              APIs
                              • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 00C9993B
                              • GetLastError.KERNEL32 ref: 00C99948
                                • Part of subcall function 00C996FA: __EH_prolog.LIBCMT ref: 00C996FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorFileH_prologLastPointer
                              • String ID:
                              • API String ID: 4236474358-0
                              • Opcode ID: f34aa98412099b48f354f0f06ad971d7b60d3bc4ccfa5e54b9058080d6b2f460
                              • Instruction ID: d88b51e809bdc521a817ee85244ab7628148eea0cb8b71661df3acc39d10ce0d
                              • Opcode Fuzzy Hash: f34aa98412099b48f354f0f06ad971d7b60d3bc4ccfa5e54b9058080d6b2f460
                              • Instruction Fuzzy Hash: 6D019E32201246DB8F188E1E984CAAF7769FF52330716822DED3E8B290D630ED019662
                              APIs
                              • _free.LIBCMT ref: 00CB5AFB
                                • Part of subcall function 00CB59EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CB239A,?,0000015D,?,?,?,?,00CB2F19,000000FF,00000000,?,?), ref: 00CB5A1E
                              • HeapReAlloc.KERNEL32(00000000,?,00200000,?,?,00CCCBE8,00C917D2,?,?,?,?,00000000,?,00C913A9,?,?), ref: 00CB5B37
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Heap$AllocAllocate_free
                              • String ID:
                              • API String ID: 2447670028-0
                              • Opcode ID: ea26334c45fd10d7b179de44deb3e99fe58eff84f23b6f6a2b9158d6ec3532e6
                              • Instruction ID: fe3d2a2b00b19acb7beaf1062f371dafe922041d947f2c78e167863026b0bc1f
                              • Opcode Fuzzy Hash: ea26334c45fd10d7b179de44deb3e99fe58eff84f23b6f6a2b9158d6ec3532e6
                              • Instruction Fuzzy Hash: 2AF0F632761E15ABDB312B26AC01FEF372C8F81771F144119F824961A0EE30DE01A160
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?), ref: 00C9FCA1
                              • GetProcessAffinityMask.KERNEL32(00000000), ref: 00C9FCA8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Process$AffinityCurrentMask
                              • String ID:
                              • API String ID: 1231390398-0
                              • Opcode ID: b6de561ef86c5d70b1070f32f72fea904f86c0a975fa9489a1eeb5cb90062842
                              • Instruction ID: e7e3d9a904becbd624cedfe7256f8ff0482407f4dcbc59d25c5b6a34857e0df8
                              • Opcode Fuzzy Hash: b6de561ef86c5d70b1070f32f72fea904f86c0a975fa9489a1eeb5cb90062842
                              • Instruction Fuzzy Hash: 22E09232B4011EA78F2886A89C09AEF739DEB14201B20857EEC17D3204F934EE4387A4
                              APIs
                              • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00C99F49,?,?,?,00C99DE2,?,00000001,00000000,?,?), ref: 00C9A127
                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00C99F49,?,?,?,00C99DE2,?,00000001,00000000,?,?), ref: 00C9A158
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: e90d74155827650cb8e49d68e3c539754b06b4e6b7bb8689f151cd8b574f1123
                              • Instruction ID: b0d9976d3105c4fe4d0042634e82fd7c08b3af74d7868d4cac0266ad87028ad6
                              • Opcode Fuzzy Hash: e90d74155827650cb8e49d68e3c539754b06b4e6b7bb8689f151cd8b574f1123
                              • Instruction Fuzzy Hash: 87F0393124020DABDF116F60EC45BEE776DAF04385F448061F988D6160DB32DEA8AB90
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ItemText_swprintf
                              • String ID:
                              • API String ID: 3011073432-0
                              • Opcode ID: 4f2efd8cd1523e02d5957c593e870a4107191f5c3540e62831799d8789aba493
                              • Instruction ID: 9af756f81de161bef3b0b4facbfa3c3a0bb0658acd85d217859f4b7b3887bed9
                              • Opcode Fuzzy Hash: 4f2efd8cd1523e02d5957c593e870a4107191f5c3540e62831799d8789aba493
                              • Instruction Fuzzy Hash: 3BF05C32540349B6EB21A7708C0BF9E376D9B05345F004086B605920A2D6316A20A7A1
                              APIs
                              • DeleteFileW.KERNELBASE(?,?,?,00C99661,?,?,00C994BC), ref: 00C99E0D
                              • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00C99661,?,?,00C994BC), ref: 00C99E3B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: d07d5eb3f9bdc70e268f5002b60445fa1e76355947504f6336e85736a575358e
                              • Instruction ID: fda929d60a8acf29783121989d050caf713ff47acb126de577ca81b500c5cdd2
                              • Opcode Fuzzy Hash: d07d5eb3f9bdc70e268f5002b60445fa1e76355947504f6336e85736a575358e
                              • Instruction Fuzzy Hash: 01E09271640209ABDF119F65DC45FEE779DEF08781F844065F988C2050DB31DD94AA90
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,?,?,00C99E58,?,00C975A0,?,?,?,?), ref: 00C99E74
                              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00C99E58,?,00C975A0,?,?,?,?), ref: 00C99EA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 4d02ace3eb57f4fbc629ad47ffca46e0e0fba9e9be01d36f062399a65cbd46fd
                              • Instruction ID: 453e2bc39acf4551f82ebadb4f5d2f55fc844f03e2b1ddb15cd67d3817143d73
                              • Opcode Fuzzy Hash: 4d02ace3eb57f4fbc629ad47ffca46e0e0fba9e9be01d36f062399a65cbd46fd
                              • Instruction Fuzzy Hash: 2FE092325001286BDF10AB68DC09BDAB75CEB093E2F0002A1FD58E32A0D7719D949BD0
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C9F376
                              • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00C9DF18,Crypt32.dll,?,00C9DF9C,?,00C9DF7E,?,?,?,?), ref: 00C9F398
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystem
                              • String ID:
                              • API String ID: 1175261203-0
                              • Opcode ID: 61a333d32d2ce890cefd564555df85abde90190f63d2d09a2275e6260bdf3416
                              • Instruction ID: fe91afd542dbdd257646d34e0a8205e14ba14c00b9e7bc9cd135ea174b781de1
                              • Opcode Fuzzy Hash: 61a333d32d2ce890cefd564555df85abde90190f63d2d09a2275e6260bdf3416
                              • Instruction Fuzzy Hash: 95E0127281012CA7DB119AA4DC09FDA776CEB09381F0540A6F948D2004DA749A808BF0
                              APIs
                              • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00CA8944
                              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00CA894B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: BitmapCreateFromGdipStream
                              • String ID:
                              • API String ID: 1918208029-0
                              • Opcode ID: 3476a53300bc0ba3ba072631d0f21d637c189fc37d84acadf84bef3626f34f6c
                              • Instruction ID: 2d6e3034bc9e501b9cd90f3ddb3baba5dd78953db22addf5bc7101bc65c43fb2
                              • Opcode Fuzzy Hash: 3476a53300bc0ba3ba072631d0f21d637c189fc37d84acadf84bef3626f34f6c
                              • Instruction Fuzzy Hash: 9CE06D71800209EFCB20DFA9C541BEABBE8EB05325F10806AE85493601D670AE04AB92
                              APIs
                              • GdiplusShutdown.GDIPLUS(?,?,?,00CBF605,000000FF), ref: 00CA90C6
                              • OleUninitialize.OLE32(?,?,?,00CBF605,000000FF), ref: 00CA90CB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: GdiplusShutdownUninitialize
                              • String ID:
                              • API String ID: 3856339756-0
                              • Opcode ID: 4bf8a40ca2a6634b92ee98067b3266fb782fdb4e1183a41d40eeb412cccc2242
                              • Instruction ID: bb03dcbe364a0bc81e5eb4bdc77baae7166b6e0ff719029e02036785b8200b76
                              • Opcode Fuzzy Hash: 4bf8a40ca2a6634b92ee98067b3266fb782fdb4e1183a41d40eeb412cccc2242
                              • Instruction Fuzzy Hash: ADE01A76548644DFC311DB48DD45F45BBE9FB09B20F10476AF81A83B60DB386C00CA95
                              APIs
                                • Part of subcall function 00CB1D87: try_get_function.LIBVCRUNTIME ref: 00CB1D9C
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00CB0C64
                              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00CB0C6F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                              • String ID:
                              • API String ID: 806969131-0
                              • Opcode ID: 3eb4326d52d2e314c3214977d48b418b2e8ec586803ecbf6b45053d77bdcc0cf
                              • Instruction ID: bd92d409b5ec63c1c7c29f78c6cb6af64a72333ae3b1524a0aa9f560bd262690
                              • Opcode Fuzzy Hash: 3eb4326d52d2e314c3214977d48b418b2e8ec586803ecbf6b45053d77bdcc0cf
                              • Instruction Fuzzy Hash: 68D022AC2483424C6D0436B0B8279CF1F8069227BAFB00396E831891C2EF2285427017
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ItemShowWindow
                              • String ID:
                              • API String ID: 3351165006-0
                              • Opcode ID: d40ccc4f4b50b78b777d2ddcb62c503c3d5733c3bd53e7480e89bf13baf8a13c
                              • Instruction ID: ab29b1ead2d9b2709e09c71bddf72241e62b30b4bddebb0587c1f008e947b00f
                              • Opcode Fuzzy Hash: d40ccc4f4b50b78b777d2ddcb62c503c3d5733c3bd53e7480e89bf13baf8a13c
                              • Instruction Fuzzy Hash: AAC01232058204BFCB010BB0DC1DE2EFBAAABA5216F00C908F4A5C00A0C238C820DB12
                              APIs
                              • EnterCriticalSection.KERNEL32(00CD1E74,?,?,00C9A5F0,?,?,?,?,00CBF605,000000FF), ref: 00C9FC4B
                              • LeaveCriticalSection.KERNEL32(00CD1E74,?,?,00C9A5F0,?,?,?,?,00CBF605,000000FF), ref: 00C9FC89
                                • Part of subcall function 00C9FA23: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 00C9FA57
                                • Part of subcall function 00C9FA23: FindCloseChangeNotification.KERNELBASE(0072D29C,0072D29C), ref: 00C9FA71
                                • Part of subcall function 00C9FA23: DeleteCriticalSection.KERNEL32(0072D438), ref: 00C9FA8A
                                • Part of subcall function 00C9FA23: FindCloseChangeNotification.KERNELBASE(?), ref: 00C9FA96
                                • Part of subcall function 00C9FA23: CloseHandle.KERNEL32(?), ref: 00C9FAA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CloseCriticalSection$ChangeFindNotification$DeleteEnterHandleLeaveReleaseSemaphore
                              • String ID:
                              • API String ID: 2076764878-0
                              • Opcode ID: e7fd57d0bd447b867678d7fa0d435b025fbb5e2dfb7f557e6d71d476ae4d7a88
                              • Instruction ID: 151205045b43d4957437e328362a08a6c09ac5cd37c9a1422b48938b160b7fec
                              • Opcode Fuzzy Hash: e7fd57d0bd447b867678d7fa0d435b025fbb5e2dfb7f557e6d71d476ae4d7a88
                              • Instruction Fuzzy Hash: F2F0A032A02214AB8B215B14E80DBAE7768AB86B65B08803EFC04E3990CB708D03D791
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 7c78d05ac8a4e660be1edc7c923600c003e638fe35c9a3732b806087cac71f66
                              • Instruction ID: 91a08de1c80765c1dec4b46e2869a2cf036c4547e8252fead8eabdbc447843f9
                              • Opcode Fuzzy Hash: 7c78d05ac8a4e660be1edc7c923600c003e638fe35c9a3732b806087cac71f66
                              • Instruction Fuzzy Hash: 63B1D470A00647AFEF19CF78C44EAB9FBA6FF05314F1C4159E86693281CB319A64DB91
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C981F2
                                • Part of subcall function 00C913AF: __EH_prolog.LIBCMT ref: 00C913B4
                                • Part of subcall function 00C913AF: new.LIBCMT ref: 00C9142C
                                • Part of subcall function 00C919E2: __EH_prolog.LIBCMT ref: 00C919E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: e15e1e5a809938161fb864cd633d79b8a88a030f374063c45bf57aee5efb0358
                              • Instruction ID: 1f7cffa3252b30af1b7883071cc9ec4ded5174af4e1cf4e1c8600cf9188b80bc
                              • Opcode Fuzzy Hash: e15e1e5a809938161fb864cd633d79b8a88a030f374063c45bf57aee5efb0358
                              • Instruction Fuzzy Hash: EE41B3719406549EDF24EB60CC5ABEA73A9AF51704F0400EAE58AA3093DF745FCCEB50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 947ed9705924fd0ea6f1a77161938c1cb8dac220454061977fbeae400a1ea332
                              • Instruction ID: 85a1bb1a62289e051d795e8e082aa8989e2aae010e954cc8422daa0ffdc224f8
                              • Opcode Fuzzy Hash: 947ed9705924fd0ea6f1a77161938c1cb8dac220454061977fbeae400a1ea332
                              • Instruction Fuzzy Hash: DB21DBB1E402276FDB14DFB8CC45B6A7668FB16318F00463AE515EB681D7749D40C7A4
                              APIs
                              • __EH_prolog.LIBCMT ref: 00CA9489
                                • Part of subcall function 00C913AF: __EH_prolog.LIBCMT ref: 00C913B4
                                • Part of subcall function 00C913AF: new.LIBCMT ref: 00C9142C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: e8b3cf3cc0695ea0b243dab7be3ca2172e71fb6d5a95798d4feea68baa0b2ed7
                              • Instruction ID: 8b9f9590dc4ed18ae54013928b526d1c457498280fb02ca9621242d3581f6df3
                              • Opcode Fuzzy Hash: e8b3cf3cc0695ea0b243dab7be3ca2172e71fb6d5a95798d4feea68baa0b2ed7
                              • Instruction Fuzzy Hash: 9D213B71C0424A9ECF15DF99D9929EEB7B4EF1A304F1404EAE809A7212D635AE05EB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 7ad6e02d48e1296a2ca4b2518ab99ac740788a6d00d2dae32b846ad9906da5d0
                              • Instruction ID: d575affb66fc1b29137f8479f20e55e837e831ff9aba648d251620c5f833bdc3
                              • Opcode Fuzzy Hash: 7ad6e02d48e1296a2ca4b2518ab99ac740788a6d00d2dae32b846ad9906da5d0
                              • Instruction Fuzzy Hash: F5117073E0092A9BCF12AE58CC999DEB735FF88740F054169F81567211CA308D1096A0
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,00CB239A,?,0000015D,?,?,?,?,00CB2F19,000000FF,00000000,?,?), ref: 00CB5A1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 5a3d783d65df11afaf1116d3b50527f69f50afcac2089257c2d4751cf0e69cb2
                              • Instruction ID: 7d77a82f93c4704379f73576149b89815a5cd1e93f427bc1af93a2ba1e3ac3ef
                              • Opcode Fuzzy Hash: 5a3d783d65df11afaf1116d3b50527f69f50afcac2089257c2d4751cf0e69cb2
                              • Instruction Fuzzy Hash: 82E0E531160A605AE62027619C82BFB375CDB063A1F150324AC25B6090EB51CE00A5A0
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C95B0A
                                • Part of subcall function 00C9ACB6: __EH_prolog.LIBCMT ref: 00C9ACBB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 47fab304b298264ae56fdcbca33bd26ebd55de22c8597b28180b7c3ba9fe26d3
                              • Instruction ID: a0e4e3393f57fa5ce6caa07bfab15bd3eb41f0569384ea4969f41a828dd08fef
                              • Opcode Fuzzy Hash: 47fab304b298264ae56fdcbca33bd26ebd55de22c8597b28180b7c3ba9fe26d3
                              • Instruction Fuzzy Hash: BD018634900A45DACB05E7A4D4597DDF7E49F15300F00809DB85963242CFB41B09D7E3
                              APIs
                              • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00C994C3), ref: 00C9950E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ChangeCloseFindNotification
                              • String ID:
                              • API String ID: 2591292051-0
                              • Opcode ID: e8996764402e90b7bb00fa45b8843220b0bc909db6a01c454d773602fe850229
                              • Instruction ID: 3d509527b7669381c10795aec1cb80d908c8e80c827381b078e3ae239bcb2e60
                              • Opcode Fuzzy Hash: e8996764402e90b7bb00fa45b8843220b0bc909db6a01c454d773602fe850229
                              • Instruction Fuzzy Hash: 8CF0BEB0482B448FDF318A28D54DB93B3E49B11721F048B1EC0F6838E08372AA488F10
                              APIs
                              • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00C9A1C4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CloseFind
                              • String ID:
                              • API String ID: 1863332320-0
                              • Opcode ID: 1d1ec689013a7f2a333a552df4cb083a24fbb6b7a82f40ac42a16cb4b79472f1
                              • Instruction ID: aea0e646c7bc37e0d2d042f8d02d016ec85d50711cab93a78d042e7d291ef50c
                              • Opcode Fuzzy Hash: 1d1ec689013a7f2a333a552df4cb083a24fbb6b7a82f40ac42a16cb4b79472f1
                              • Instruction Fuzzy Hash: 3EF08231408790EECF229BB48809BCBBBA59F1A331F148A4DF1FD521D2C37554D9A762
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C91EC4
                                • Part of subcall function 00C91927: __EH_prolog.LIBCMT ref: 00C9192C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 83143faf9785862e34772e9d4979997323e13d55cd2782fca3ecd7d1df3b8669
                              • Instruction ID: dc07200fcdecb7569a4a4b5369a2a86a24f2225fa55a18955eb38f32e764b389
                              • Opcode Fuzzy Hash: 83143faf9785862e34772e9d4979997323e13d55cd2782fca3ecd7d1df3b8669
                              • Instruction Fuzzy Hash: C3F0ACB1D006898ECF41DFE8C54A6EEBBF4FB19304F0845BED819E7202E73556049B91
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C91EC4
                                • Part of subcall function 00C91927: __EH_prolog.LIBCMT ref: 00C9192C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 9174b26c55bc6689883bf4742441a397630375c3705d662e38516824eb19a35e
                              • Instruction ID: 4c07911133daca55b6bafd49d18c2c3a5ee7a41fbe37f3e454eb358a1c12d495
                              • Opcode Fuzzy Hash: 9174b26c55bc6689883bf4742441a397630375c3705d662e38516824eb19a35e
                              • Instruction Fuzzy Hash: BFF0ACB1C006498ECF41DFA8C54A6EEBBF0BB19304F0845BED809E7202E73556048B91
                              APIs
                              • SetThreadExecutionState.KERNEL32(00000001), ref: 00C9F979
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ExecutionStateThread
                              • String ID:
                              • API String ID: 2211380416-0
                              • Opcode ID: 1eee7e77b741c6b0ee82948ffa32c4bbf93a3cbafd4126e4470a422c30081444
                              • Instruction ID: 27f94580d11cbee08ccc57df3ff0c1ab22e89c9098b05a6a463c2b0b18c6f6a3
                              • Opcode Fuzzy Hash: 1eee7e77b741c6b0ee82948ffa32c4bbf93a3cbafd4126e4470a422c30081444
                              • Instruction Fuzzy Hash: B7D02E1270001222EE213368A84FFFD161A0FC239CF1E00BEF469A72C2CA950C43B2A2
                              APIs
                              • GdipAlloc.GDIPLUS(00000010), ref: 00CA8B6A
                                • Part of subcall function 00CA8923: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00CA8944
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Gdip$AllocBitmapCreateFromStream
                              • String ID:
                              • API String ID: 1915507550-0
                              • Opcode ID: b3ecc342144db532c8dedf8b776bc33c6e15ccf428a3dce563ad8a90b77a80c7
                              • Instruction ID: 7539f9192f65297e0db9e7ac07595e7e201ce5bc520be7ae77e5c1fbf43da229
                              • Opcode Fuzzy Hash: b3ecc342144db532c8dedf8b776bc33c6e15ccf428a3dce563ad8a90b77a80c7
                              • Instruction Fuzzy Hash: 8AD0A77060010E7BDF41AF719C0697E7A98EB03364F408135BC0485150FE71CD247261
                              APIs
                              • GetFileType.KERNELBASE(000000FF,00C9969C), ref: 00C99776
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID:
                              • API String ID: 3081899298-0
                              • Opcode ID: 8f789859f2c8038d854a5af45ae6f6ebcce8261558be23aefba79e108cb2a19f
                              • Instruction ID: 0f4c8e041963b3e3d5740d67ffc7333872ee9abb6010470f393be1d266fa4dec
                              • Opcode Fuzzy Hash: 8f789859f2c8038d854a5af45ae6f6ebcce8261558be23aefba79e108cb2a19f
                              • Instruction Fuzzy Hash: 30D01230021200958F610E7C9D8D1696651DB833A7728CAECE135C40B1CB32C943F540
                              APIs
                              • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00CABF9B
                                • Part of subcall function 00CA991D: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CA992E
                                • Part of subcall function 00CA991D: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CA993F
                                • Part of subcall function 00CA991D: TranslateMessage.USER32(?), ref: 00CA9949
                                • Part of subcall function 00CA991D: DispatchMessageW.USER32(?), ref: 00CA9953
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Message$DispatchItemPeekSendTranslate
                              • String ID:
                              • API String ID: 4142818094-0
                              • Opcode ID: aedc4b8d91da6ff8cca89b61c44f84092b45c104170265d23c1974921f17f3af
                              • Instruction ID: 307b71a2577b8ce1f41920dc08ad282c8fefa7fc772eb28175ea9ab78949fd75
                              • Opcode Fuzzy Hash: aedc4b8d91da6ff8cca89b61c44f84092b45c104170265d23c1974921f17f3af
                              • Instruction Fuzzy Hash: EAD09E31144200BADB112B51CE0AF0E7AE3BB98B08F404554B248340B18662AD20EB02
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC798
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 99189316ac86ae990c8fc63f46fcb67a0f9a57e042042a31ba0a74a396e0f9fa
                              • Instruction ID: b7b3c7a7bcfa73171f01a729c21a2f0b9357ec30ea577b25cb3ac51517bcdcea
                              • Opcode Fuzzy Hash: 99189316ac86ae990c8fc63f46fcb67a0f9a57e042042a31ba0a74a396e0f9fa
                              • Instruction Fuzzy Hash: F3B012F22781067D3144D1C2AC8EE37010DC2C3F19330C02FF800C004098402C09203A
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC798
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: e8d629907f052c493cc67f1182219612fa88770b00ad312ee16430c75c276926
                              • Instruction ID: 4e7f6cd3f0181914595f93e2c267645bee9c64a74a4e0ee6edbd55f12f0ea1d8
                              • Opcode Fuzzy Hash: e8d629907f052c493cc67f1182219612fa88770b00ad312ee16430c75c276926
                              • Instruction Fuzzy Hash: 46B012E227C0066D3144D1C6AD4EE37010DC2C6F19330C02FF400C1140D8400C0E3036
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC798
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 90cad05744a9d611d39e5b7d17ea36861b66a32497c22151cc232b7010c9678f
                              • Instruction ID: f201cdc2b27b1bdbd6333ddc4916c83307c7222ea546d81b03a62fc676b1e2c1
                              • Opcode Fuzzy Hash: 90cad05744a9d611d39e5b7d17ea36861b66a32497c22151cc232b7010c9678f
                              • Instruction Fuzzy Hash: A2B012E227810A6D3148D1C7AC9EE37010CC2C6F19330C02FF400C0140D8404C05213A
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 92eda664378cf54f87feacecd8174885a68a5d0d0012681954131bc610637ddb
                              • Instruction ID: df7294423e3916af196c99152efab022ed6facd5bea07d813245363941b9e4f5
                              • Opcode Fuzzy Hash: 92eda664378cf54f87feacecd8174885a68a5d0d0012681954131bc610637ddb
                              • Instruction Fuzzy Hash: 9CB012D22685077C3104E209AD8EE37010CC2C2F18330C02FF800C0140DC404C093C32
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 242cc84b14c97ec26045f4ee80106c8a778829771f4f411a7dbf07b931f89fa7
                              • Instruction ID: 54bdaa3d978330890f04ac440c9a10524a3f6c44a4846f2f3018104b3d21c171
                              • Opcode Fuzzy Hash: 242cc84b14c97ec26045f4ee80106c8a778829771f4f411a7dbf07b931f89fa7
                              • Instruction Fuzzy Hash: 9EB012D22684076C3104E20AED4EE37010CC2C2F18330812FF401C0140DC400C093832
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 3183ed70f7deecc64bf41077e8bb31d31135037f132649fe3d3e009216f11635
                              • Instruction ID: 2f1f8e3597faa698fccc6310e3918c86f22f80b1c5ab31247a990372c24f1dc1
                              • Opcode Fuzzy Hash: 3183ed70f7deecc64bf41077e8bb31d31135037f132649fe3d3e009216f11635
                              • Instruction Fuzzy Hash: 8FB012D22586076D3104E209BF8EE37010CC2C2F18330802FF400C0140DC404C0A3C32
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 65a98ce7ec301ea975e17364888610547688aef163a009ea11479ce4febd9d6f
                              • Instruction ID: 39d9d1aa5835f424ec421712c04ed04085ca4fb0f47f82d4beb0035753bb932e
                              • Opcode Fuzzy Hash: 65a98ce7ec301ea975e17364888610547688aef163a009ea11479ce4febd9d6f
                              • Instruction Fuzzy Hash: 8FB012D22586077C3508A205ADCED37011CC2C6F28330812FF400C0040DC404C497C32
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: fa2d1920ae46412ff152a6f6f434b52b7476ea56bffb256e75f900d2f0b84ee2
                              • Instruction ID: 6612e93fde8c6650a0e4276f69f3235c1ad30290dca2514649be5216c2908eaa
                              • Opcode Fuzzy Hash: fa2d1920ae46412ff152a6f6f434b52b7476ea56bffb256e75f900d2f0b84ee2
                              • Instruction Fuzzy Hash: 18A001E66A9917BC7108A256AD8AD3B021CC6D6FA9331892EF802C4181AD801C4A2831
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC798
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: ddb1b54f158f4c55cc996130f14781f0e20fd36275a6eefcf2ee4a257ea9dadd
                              • Instruction ID: eaaa1bab62ed27c8f623cbe8f7e0bd44430b5f241be423ee4865dda55254f6b8
                              • Opcode Fuzzy Hash: ddb1b54f158f4c55cc996130f14781f0e20fd36275a6eefcf2ee4a257ea9dadd
                              • Instruction Fuzzy Hash: 30A001E62B9507BC7148A2D2AD8AD3B021CC6DAF6A331892EF802C4181A9801C4A2439
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC798
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 84242982ed3cf84ab1650e48c870a837827d1bcf482bfe0bfb82586cfd5d65bc
                              • Instruction ID: eaaa1bab62ed27c8f623cbe8f7e0bd44430b5f241be423ee4865dda55254f6b8
                              • Opcode Fuzzy Hash: 84242982ed3cf84ab1650e48c870a837827d1bcf482bfe0bfb82586cfd5d65bc
                              • Instruction Fuzzy Hash: 30A001E62B9507BC7148A2D2AD8AD3B021CC6DAF6A331892EF802C4181A9801C4A2439
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: bee7351ddfcd06ef21418bbd95ebcba5a6496c8544336efe16579df5b888b98d
                              • Instruction ID: 6612e93fde8c6650a0e4276f69f3235c1ad30290dca2514649be5216c2908eaa
                              • Opcode Fuzzy Hash: bee7351ddfcd06ef21418bbd95ebcba5a6496c8544336efe16579df5b888b98d
                              • Instruction Fuzzy Hash: 18A001E66A9917BC7108A256AD8AD3B021CC6D6FA9331892EF802C4181AD801C4A2831
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 56c415526d609654ac28cd27287dc0527fb54180a96eacbef28d74f95917c878
                              • Instruction ID: 6612e93fde8c6650a0e4276f69f3235c1ad30290dca2514649be5216c2908eaa
                              • Opcode Fuzzy Hash: 56c415526d609654ac28cd27287dc0527fb54180a96eacbef28d74f95917c878
                              • Instruction Fuzzy Hash: 18A001E66A9917BC7108A256AD8AD3B021CC6D6FA9331892EF802C4181AD801C4A2831
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 00CAC737
                                • Part of subcall function 00CACABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CACB38
                                • Part of subcall function 00CACABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CACB49
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 00c828b1deb70e5aa26b0dc97464a8352dfd9f2021646e8b762617bb98feeecb
                              • Instruction ID: 6612e93fde8c6650a0e4276f69f3235c1ad30290dca2514649be5216c2908eaa
                              • Opcode Fuzzy Hash: 00c828b1deb70e5aa26b0dc97464a8352dfd9f2021646e8b762617bb98feeecb
                              • Instruction Fuzzy Hash: 18A001E66A9917BC7108A256AD8AD3B021CC6D6FA9331892EF802C4181AD801C4A2831
                              APIs
                              • SetCurrentDirectoryW.KERNELBASE(?,00CA9279,00CD2120,00000000,00CD3122,00000006), ref: 00CA9026
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CurrentDirectory
                              • String ID:
                              • API String ID: 1611563598-0
                              • Opcode ID: cacca53e74b28e2d659caa339bafe61c0eeb876f8070c9c394df1939c358a022
                              • Instruction ID: 37766ab9b66068f9886858583dd342bf2ace17e417c36ec38de66464f0333ed1
                              • Opcode Fuzzy Hash: cacca53e74b28e2d659caa339bafe61c0eeb876f8070c9c394df1939c358a022
                              • Instruction Fuzzy Hash: 6DA0123019410686CA000B30CC09D1DB6505760702F108624B002C00A0CB30C810E500
                              APIs
                                • Part of subcall function 00C912E7: GetDlgItem.USER32(00000000,00003021), ref: 00C9132B
                                • Part of subcall function 00C912E7: SetWindowTextW.USER32(00000000,00CC02E4), ref: 00C91341
                              • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00CAA5C7
                              • EndDialog.USER32(?,00000006), ref: 00CAA5DA
                              • GetDlgItem.USER32(?,0000006C), ref: 00CAA5F6
                              • SetFocus.USER32(00000000), ref: 00CAA5FD
                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 00CAA63D
                              • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00CAA670
                              • FindFirstFileW.KERNEL32(?,?), ref: 00CAA686
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00CAA6A4
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CAA6B4
                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00CAA6D1
                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00CAA6EF
                                • Part of subcall function 00C9D192: LoadStringW.USER32(?,?,00000200,?), ref: 00C9D1D7
                                • Part of subcall function 00C9D192: LoadStringW.USER32(?,?,00000200,?), ref: 00C9D1ED
                              • _swprintf.LIBCMT ref: 00CAA71F
                                • Part of subcall function 00C93F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C93F3E
                              • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00CAA732
                              • FindClose.KERNEL32(00000000), ref: 00CAA735
                              • _swprintf.LIBCMT ref: 00CAA790
                              • SetDlgItemTextW.USER32(?,00000068,?), ref: 00CAA7A3
                              • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00CAA7B9
                              • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00CAA7D9
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CAA7E9
                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00CAA803
                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00CAA81B
                              • _swprintf.LIBCMT ref: 00CAA84C
                              • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00CAA85F
                              • _swprintf.LIBCMT ref: 00CAA8AF
                              • SetDlgItemTextW.USER32(?,00000069,?), ref: 00CAA8C2
                                • Part of subcall function 00CA932E: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00CA9354
                                • Part of subcall function 00CA932E: GetNumberFormatW.KERNEL32(00000400,00000000,?,00CCA154,?,?), ref: 00CA93A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                              • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                              • API String ID: 3227067027-1840816070
                              • Opcode ID: 669796713de4a15e15047d926d0135e762a5dbc23fe8bd6de9010f6275558fd7
                              • Instruction ID: 3ab30d3fd077515b79407569895bbca3e0083818e8dc0d75a95f81815330dbf6
                              • Opcode Fuzzy Hash: 669796713de4a15e15047d926d0135e762a5dbc23fe8bd6de9010f6275558fd7
                              • Instruction Fuzzy Hash: 7E91CE72548349BBE621DBA0CC49FFF77ACEB4A708F044819F649D2081D775AA05DB63
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C97075
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 00C971D5
                              • CloseHandle.KERNEL32(00000000), ref: 00C971E5
                                • Part of subcall function 00C97A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00C97AAC
                                • Part of subcall function 00C97A9D: GetLastError.KERNEL32 ref: 00C97AF2
                                • Part of subcall function 00C97A9D: CloseHandle.KERNEL32(?), ref: 00C97B01
                              • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 00C971F0
                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00C972FE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00C9732A
                              • CloseHandle.KERNEL32(?), ref: 00C9733C
                              • GetLastError.KERNEL32(00000015,00000000,?), ref: 00C9734C
                              • RemoveDirectoryW.KERNEL32(?), ref: 00C97398
                              • DeleteFileW.KERNEL32(?), ref: 00C973C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                              • API String ID: 3935142422-3508440684
                              • Opcode ID: bf5ccd2c2116af0b7b82926c873d55d95498063656e5290b2ec48bbd91275bf7
                              • Instruction ID: 99616d18d7c1f2d22378a9e7a18f794eb44e106c4af0ace72ac685f6fc6f164c
                              • Opcode Fuzzy Hash: bf5ccd2c2116af0b7b82926c873d55d95498063656e5290b2ec48bbd91275bf7
                              • Instruction Fuzzy Hash: 0EB1BF71914208EBDF20DFA4DC89BEE77B8EF08700F1445A9F929E7152D730AA45DB61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prolog_memcmp
                              • String ID: CMT$h%u$hc%u
                              • API String ID: 3004599000-3282847064
                              • Opcode ID: e5706fc77c162e5ec41b53ecfc7b36f90163bbf96dbf0b97e3dff90b2ba77e52
                              • Instruction ID: db43bdc7abc515c7268d20fde2851b638a1cc1cace0b1b4f8440e42cf8634ab9
                              • Opcode Fuzzy Hash: e5706fc77c162e5ec41b53ecfc7b36f90163bbf96dbf0b97e3dff90b2ba77e52
                              • Instruction Fuzzy Hash: C232B2715143849FDF14DF74C89ABEA37A5AF15300F08447EFD9A8B282EB709A49CB60
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 4168288129-2761157908
                              • Opcode ID: 20a14ccd284da2fd0d12fb808975c4cf96fd99f46096c44916201ac89c5870e4
                              • Instruction ID: 3da50799a66819597ef8013a077e4a793cb82dc79d78fcf514148273768812ff
                              • Opcode Fuzzy Hash: 20a14ccd284da2fd0d12fb808975c4cf96fd99f46096c44916201ac89c5870e4
                              • Instruction Fuzzy Hash: 29C25B71E086288FDF25CE28DD407EAB7B9EB44305F1441EAE85EE7240E775AE858F41
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C92762
                              • _strlen.LIBCMT ref: 00C92CEC
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C92E43
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_strlen
                              • String ID: CMT
                              • API String ID: 3741668355-2756464174
                              • Opcode ID: 8226521d85d3c9c189736e6305512feb2adaa381b30e2c711eed8a4e64d4d068
                              • Instruction ID: 1129810a62099c3da647d07afd39ef46d0fb5d919c943bb4bd55ccd075ed3ec2
                              • Opcode Fuzzy Hash: 8226521d85d3c9c189736e6305512feb2adaa381b30e2c711eed8a4e64d4d068
                              • Instruction Fuzzy Hash: BD6217725006849FDF18DF78C899BEA3BE1EF54304F04457EEC9A9B282DB709A45DB60
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00CB5C3B
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00CB5C45
                              • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00CB5C52
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: ee5254e024340c5d596c1666a63ff7a4f26b68d7aa65b9a36f0732a3916aac23
                              • Instruction ID: ef29d11fd35f1ed4f58005c75be3f506c862b945025df042a93361f6fe56c355
                              • Opcode Fuzzy Hash: ee5254e024340c5d596c1666a63ff7a4f26b68d7aa65b9a36f0732a3916aac23
                              • Instruction Fuzzy Hash: B531B375901319ABCB21DF64D889BDDBBB8BF08310F5041EAE81DA7290EB709B818F44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID: .
                              • API String ID: 0-248832578
                              • Opcode ID: 0d9d431053ae4f7d07f8e38d81630d7fcd21a0a0abb1b2c59078c952e9f37d93
                              • Instruction ID: 72c7aad25e57f0365de9121ee1d8fc401bddd569f1357c1bae9f0fd064d13a63
                              • Opcode Fuzzy Hash: 0d9d431053ae4f7d07f8e38d81630d7fcd21a0a0abb1b2c59078c952e9f37d93
                              • Instruction Fuzzy Hash: D8310372804249AFCB249E78CC88EFE7BBDDF85344F1402A8F829D7251E630DE408B50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d8cca871330e4123537bb6ab64568d03676673747229a1061e8821d119ab4a2
                              • Instruction ID: 0cabc82c3861ef6d321f0392cd7ac4c8db92e81dd5940b00739bef314a6300dc
                              • Opcode Fuzzy Hash: 1d8cca871330e4123537bb6ab64568d03676673747229a1061e8821d119ab4a2
                              • Instruction Fuzzy Hash: 85021B71E002199FDF14CFA9D8806EEBBF5EF48314F25826AD969E7240D731AE418B91
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00CA9354
                              • GetNumberFormatW.KERNEL32(00000400,00000000,?,00CCA154,?,?), ref: 00CA93A3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: FormatInfoLocaleNumber
                              • String ID:
                              • API String ID: 2169056816-0
                              • Opcode ID: 1346e64f9efa5fc83fdd7dadfd4b81ed3a2d9a6cc6dcb30fbd47b54218027b58
                              • Instruction ID: 27923a9750e8d1868fe9460c50b113816114a403029309e977bcdd4bef29d851
                              • Opcode Fuzzy Hash: 1346e64f9efa5fc83fdd7dadfd4b81ed3a2d9a6cc6dcb30fbd47b54218027b58
                              • Instruction Fuzzy Hash: 2A015A75500349AADB10CFA5DC49FAFB7BCEF09714F105426FA08E71A1D7709928CBA6
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00CBE8CF,?,?,00000008,?,?,00CBE56F,00000000), ref: 00CBEB01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 4d545fc806f663bb9e451d4ceee8587b27e31e6ba8e9bc834718cb2c99bd697c
                              • Instruction ID: 74200178a2002b9d0175aa49c6c87a60306738eb1836000b39814d37f763a762
                              • Opcode Fuzzy Hash: 4d545fc806f663bb9e451d4ceee8587b27e31e6ba8e9bc834718cb2c99bd697c
                              • Instruction Fuzzy Hash: E7B13B31610608DFD715CF28C48ABE57BE0FF45765F258658E8AACF2A1C335EA81CB44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID: gj
                              • API String ID: 0-4203073231
                              • Opcode ID: 8fbe8f9c448a747aac16472a266e87d33145a64bb69ee035d78bb27984e03b4c
                              • Instruction ID: fc8a07993305d76c28a900edea476b537e6506f0420c8753ed737c2350e57c87
                              • Opcode Fuzzy Hash: 8fbe8f9c448a747aac16472a266e87d33145a64bb69ee035d78bb27984e03b4c
                              • Instruction Fuzzy Hash: CCF1D4B1A083818FD748CF29D880A1AFBE1BFC8208F19892EF598D7715D734E9558F56
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 00C9A955
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Version
                              • String ID:
                              • API String ID: 1889659487-0
                              • Opcode ID: df54ddcd648e1dbcbe20a5ee37e6bb1ce83ee4bca8a3610a706da20a3fd5f754
                              • Instruction ID: 8cc8078dd702523c6d4dd5c35455f8efdf802ca485d320fb4c9cd643b97384c2
                              • Opcode Fuzzy Hash: df54ddcd648e1dbcbe20a5ee37e6bb1ce83ee4bca8a3610a706da20a3fd5f754
                              • Instruction Fuzzy Hash: 5FF030B4D002088BCB28CF58EC9AFED77B5F759314F224295D92953390D771AD808F96
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001DB6F,00CAD5E4), ref: 00CADB68
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 0d53abc38d217af532aa2cc5af50c8d8342953e962c85aec709613aecd08d837
                              • Instruction ID: 519f221c54da4bf79b22241764a876487a6773d0ce02a5fcfe0a22d5370dfd19
                              • Opcode Fuzzy Hash: 0d53abc38d217af532aa2cc5af50c8d8342953e962c85aec709613aecd08d837
                              • Instruction Fuzzy Hash:
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: 60009a43f9412ffe0daea3cbdbed54f5d2a34e007b23e4ef271dbae7769d2c1c
                              • Instruction ID: 40ecb67cb0efcee18bcb871a0df855fae57ebcaaf0623019f54131cbc07ffd6f
                              • Opcode Fuzzy Hash: 60009a43f9412ffe0daea3cbdbed54f5d2a34e007b23e4ef271dbae7769d2c1c
                              • Instruction Fuzzy Hash: 8DA02430101140CF53004F31DF0730D35D475013C0715501CD004C5130DF3044004700
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 289fefe8c5a67303e04c4f7979b92612d24f26a9e9caf40240c5c4cc4755c92c
                              • Instruction ID: 48f2dd7acfd2067c1fa275d7a4bd636ad33a46cf0054fb86b5ad101752530ac8
                              • Opcode Fuzzy Hash: 289fefe8c5a67303e04c4f7979b92612d24f26a9e9caf40240c5c4cc4755c92c
                              • Instruction Fuzzy Hash: D2620971604B869FCB25CF38C8906B9B7E1AF96308F08C96DD9AB8F746D630A945D710
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a7df07331dc8246d27593e118a7ee815c0dd8300ee0f02b9d281ebf78cfae13a
                              • Instruction ID: 1baadc1de382425623ef34a094671f4b6dd4a1b650d7605e41ceb43fe9c24c83
                              • Opcode Fuzzy Hash: a7df07331dc8246d27593e118a7ee815c0dd8300ee0f02b9d281ebf78cfae13a
                              • Instruction Fuzzy Hash: 8462037160478B9FC719CF28C9805A9FBE0FB5630CF18866DD9A687742D730EA56DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4dd2caf385a59822b9a14fbc93f7aaa4fbbe767d050e2cf75e0f52348a67b4f0
                              • Instruction ID: 2542a1765f7b90fab08ea1a8d6381997fedc413fa7b33d51184bf3d6648756df
                              • Opcode Fuzzy Hash: 4dd2caf385a59822b9a14fbc93f7aaa4fbbe767d050e2cf75e0f52348a67b4f0
                              • Instruction Fuzzy Hash: 575248B26087019FC758CF18C891A6AF7E1FFC8304F89892DF99687255D334E919CB82
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ab4ec420f9a3a83c7509315784d948476334718c13a2b8fa695bea50c2831fae
                              • Instruction ID: 3cff1b083a31bf19a06a04af00fe058052831b13fa19df069eee9b39794fc518
                              • Opcode Fuzzy Hash: ab4ec420f9a3a83c7509315784d948476334718c13a2b8fa695bea50c2831fae
                              • Instruction Fuzzy Hash: 8512E2B1604B078FCB28CF28C8946B9B7E0FB55308F14892EE997C7A81D774A995CB45
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f7a1520f1181234eb45886932516cb36103320c246dc55b64259d5223f3ba13e
                              • Instruction ID: 6ca0242b70bdafcfaf074341294705fbc0add15cf4ce01b169662bcde921c473
                              • Opcode Fuzzy Hash: f7a1520f1181234eb45886932516cb36103320c246dc55b64259d5223f3ba13e
                              • Instruction Fuzzy Hash: 41F17A72608345AFCB14CF29D68866ABBE6FFC9714F144A2EF49587345D730EE068B42
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: b40cbed9cf7e0ca3a40d79002bf462c6e666844f0fc11694004b5b6f0def7946
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: 7FC1763220519349EB2D467EC83453EBAA1AE937B531A077ED4B3CB1D4EE30C626D710
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: ba6c84e9bbd358a79f41ea499566939090712b6b9cefb12d9976f26f366e8a42
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 7EC1783220519349EF2D467EC87413EBAA19A937B931A077ED4B3DB1D5EE30C625D720
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                              • Instruction ID: 54aa80a2e078d9063f91a50a0eb1908653e4a9989ac64695ff393d0df9e810cc
                              • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                              • Instruction Fuzzy Hash: CFC189322051934AEF2D467EC87413EBAA19A937B531A077ED4B3DB1D5EE30C626D720
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: b990d2e3265ccc2e612000421999d9feda0f08157330a2cfb107966639be4525
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 93C1633220519349EF6D467EC87413EBAA1AAA37B531A077ED4B3CB1D5EE30C625D720
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5353bd877d51368d6a14d3c75ce38d78d59749625536757f9d4f0580f28ef633
                              • Instruction ID: feeda89a8cb1c3ba7dbdd50a02b4411e9be84ef5142003130702e1a3c696f562
                              • Opcode Fuzzy Hash: 5353bd877d51368d6a14d3c75ce38d78d59749625536757f9d4f0580f28ef633
                              • Instruction Fuzzy Hash: C7E11A755093808FC344CF29D894A6ABBF0EFCA300F89495EF9D597362C234D656DB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 27f2a4d6ddd3b585317645cc5051d726e6ea8aecf25b64319d1df32cbac21ee2
                              • Instruction ID: 87ef663a4cf49f7755c44654c142dba825aa4744f55fb510f4a129e584b9f24f
                              • Opcode Fuzzy Hash: 27f2a4d6ddd3b585317645cc5051d726e6ea8aecf25b64319d1df32cbac21ee2
                              • Instruction Fuzzy Hash: 1E91587120035B9BDB24EF68C894BBE73E5AB52308F10092DF59BC7282DA74A645D792
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bfa97faab0b08c63e2f347ad96aeeece54a108284c4a0e99a0bea3a3684bfa44
                              • Instruction ID: b280a979a153cdbf43ea222c2238f5c1fdfb893d3e19e7a6f400af54e86e5f6f
                              • Opcode Fuzzy Hash: bfa97faab0b08c63e2f347ad96aeeece54a108284c4a0e99a0bea3a3684bfa44
                              • Instruction Fuzzy Hash: F3619B7170070867EF385E688899BFF7794EF01300F240919E8A3DB281DA55DF86D756
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 00179462e72e715994715ee1dba655cee4073e68508d321703d4c828cdcba7bf
                              • Instruction ID: f5f7bd0b943a901ec50aaa91aaa1672bd176d54c87714f08a30f2c9fcdb6c563
                              • Opcode Fuzzy Hash: 00179462e72e715994715ee1dba655cee4073e68508d321703d4c828cdcba7bf
                              • Instruction Fuzzy Hash: 227159713043C75BDF24DE68C8E5BAD77D1AB9230CF00092DFA868B283CA748B858756
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ed4608e1ca69652c31ed93df1bed4b83036c159a4f9d114a37eb6237f94628f
                              • Instruction ID: c21934e4218b3e5f88251eb928b49c0cc4ecd3fb075aef000c12239595c8d87d
                              • Opcode Fuzzy Hash: 7ed4608e1ca69652c31ed93df1bed4b83036c159a4f9d114a37eb6237f94628f
                              • Instruction Fuzzy Hash: 85816F9221A2D4ADC7064F7D78D83E93FA15777341F1D44BBD8C6862B3C0368659E722
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e662ccabb22cc6e0a887168dea41e7f6bdb26cba6a7cd321da45add5257b48ff
                              • Instruction ID: 8bb2decc5af9ee9b0e5276c46cba1493b5e8eca4f38d3c20bc14399eb4bf36e0
                              • Opcode Fuzzy Hash: e662ccabb22cc6e0a887168dea41e7f6bdb26cba6a7cd321da45add5257b48ff
                              • Instruction Fuzzy Hash: 1651E3725083954ECB12CF29C1844AEBFE1AFDB314F49489DE4E66B252C230D789DB63
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 17163c1a8474e91f72bcd754284e3c91bd2c31dece9804a3816e690b7fd1d418
                              • Instruction ID: 476d2a400afded64994c699a7aacf7fd43d84f74a99f748a47ce5f6dc9c2d5d2
                              • Opcode Fuzzy Hash: 17163c1a8474e91f72bcd754284e3c91bd2c31dece9804a3816e690b7fd1d418
                              • Instruction Fuzzy Hash: C7511571A083129FC748CF19D48059AF7E1FF88314F054A2EE899A7741DB34EA59CBD6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                              • Instruction ID: 65c4bb96a5404fc36796460d9ebc78a3fd48d790cd2dd089d7a728368c8eebb6
                              • Opcode Fuzzy Hash: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                              • Instruction Fuzzy Hash: 0531F6716047569FCB14DF28D8552AEFBE0FB96304F00452DE4DAD7741C678EA09CBA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c6349af770d6e6546b5ec63ad831dcd2688bad15d1e0777dd29277d614d0a322
                              • Instruction ID: 66a0394ab4b8557004ecb6f5ae94ada8eb2b5f83937357501c15b6f681a98f13
                              • Opcode Fuzzy Hash: c6349af770d6e6546b5ec63ad831dcd2688bad15d1e0777dd29277d614d0a322
                              • Instruction Fuzzy Hash: 3F210D31A200655BCB08CF6DECECA3E73559746301786812BED468B2D0C535DE65CBA0
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 00CB95C2
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB917A
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB918C
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB919E
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB91B0
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB91C2
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB91D4
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB91E6
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB91F8
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB920A
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB921C
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB922E
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB9240
                                • Part of subcall function 00CB915D: _free.LIBCMT ref: 00CB9252
                              • _free.LIBCMT ref: 00CB95B7
                                • Part of subcall function 00CB59B2: RtlFreeHeap.NTDLL(00000000,00000000,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?), ref: 00CB59C8
                                • Part of subcall function 00CB59B2: GetLastError.KERNEL32(?,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?,?), ref: 00CB59DA
                              • _free.LIBCMT ref: 00CB95D9
                              • _free.LIBCMT ref: 00CB95EE
                              • _free.LIBCMT ref: 00CB95F9
                              • _free.LIBCMT ref: 00CB961B
                              • _free.LIBCMT ref: 00CB962E
                              • _free.LIBCMT ref: 00CB963C
                              • _free.LIBCMT ref: 00CB9647
                              • _free.LIBCMT ref: 00CB967F
                              • _free.LIBCMT ref: 00CB9686
                              • _free.LIBCMT ref: 00CB96A3
                              • _free.LIBCMT ref: 00CB96BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 070091288b5dee80622e8f660e80d5d7157695acd3ac0141f95a0f57e8316123
                              • Instruction ID: f70030eafef37bd3213eca2e6bcdae09ab28d96a00e91bbab085f0c6ce2158b9
                              • Opcode Fuzzy Hash: 070091288b5dee80622e8f660e80d5d7157695acd3ac0141f95a0f57e8316123
                              • Instruction Fuzzy Hash: 27313971A05600DFEB71AB79D845BD6B3E8EF00320F10841AF569D7251DA31AE82DB60
                              APIs
                              • GetWindow.USER32(?,00000005), ref: 00CAB8DC
                              • GetClassNameW.USER32(00000000,?,00000800), ref: 00CAB90B
                                • Part of subcall function 00CA0B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00C9AC99,?,?,?,00C9AC48,?,-00000002,?,00000000,?), ref: 00CA0B16
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00CAB929
                              • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00CAB940
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00CAB953
                                • Part of subcall function 00CA8B21: GetDC.USER32(00000000), ref: 00CA8B2D
                                • Part of subcall function 00CA8B21: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CA8B3C
                                • Part of subcall function 00CA8B21: ReleaseDC.USER32(00000000,00000000), ref: 00CA8B4A
                                • Part of subcall function 00CA8ADE: GetDC.USER32(00000000), ref: 00CA8AEA
                                • Part of subcall function 00CA8ADE: GetDeviceCaps.GDI32(00000000,00000058), ref: 00CA8AF9
                                • Part of subcall function 00CA8ADE: ReleaseDC.USER32(00000000,00000000), ref: 00CA8B07
                              • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00CAB97A
                              • DeleteObject.GDI32(00000000), ref: 00CAB981
                              • GetWindow.USER32(00000000,00000002), ref: 00CAB98A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                              • String ID: STATIC
                              • API String ID: 1444658586-1882779555
                              • Opcode ID: bb4f39a8ddb529b3ef5cba49306e6ea26dea2942c455fcecb84c99281ba7a6a2
                              • Instruction ID: 1e00fb5392972b94932047850af1a9e40c91d05f2a5f026eee8e448f949b5a5d
                              • Opcode Fuzzy Hash: bb4f39a8ddb529b3ef5cba49306e6ea26dea2942c455fcecb84c99281ba7a6a2
                              • Instruction Fuzzy Hash: F721D57250022A7FEB216B74DC4EFEF766CEF06718F004111FA11E6092DB745E42AAB6
                              APIs
                              • _free.LIBCMT ref: 00CB622E
                                • Part of subcall function 00CB59B2: RtlFreeHeap.NTDLL(00000000,00000000,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?), ref: 00CB59C8
                                • Part of subcall function 00CB59B2: GetLastError.KERNEL32(?,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?,?), ref: 00CB59DA
                              • _free.LIBCMT ref: 00CB623A
                              • _free.LIBCMT ref: 00CB6245
                              • _free.LIBCMT ref: 00CB6250
                              • _free.LIBCMT ref: 00CB625B
                              • _free.LIBCMT ref: 00CB6266
                              • _free.LIBCMT ref: 00CB6271
                              • _free.LIBCMT ref: 00CB627C
                              • _free.LIBCMT ref: 00CB6287
                              • _free.LIBCMT ref: 00CB6295
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 6cf9a246873f6e73156877d561b37f1083bc5bcda362b08ff6955727642d721c
                              • Instruction ID: 13315006c7d37f6f90d248e329f09dae74ffc58d892de7f113ba67a2ab15e5bd
                              • Opcode Fuzzy Hash: 6cf9a246873f6e73156877d561b37f1083bc5bcda362b08ff6955727642d721c
                              • Instruction Fuzzy Hash: 5E117775921508FFDF01EF94C942DD93BB5FF04360F5140A5F9894B222DA31DA92AB80
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID: ;%u$x%u$xc%u
                              • API String ID: 0-2277559157
                              • Opcode ID: aa72a91630868498ce3c1e6bbafed81a777c91bb85156a390d404dea09acc481
                              • Instruction ID: f239b2353e886a4ae10e46abda7a75385582db0b7469cdff0a37654f65544c81
                              • Opcode Fuzzy Hash: aa72a91630868498ce3c1e6bbafed81a777c91bb85156a390d404dea09acc481
                              • Instruction Fuzzy Hash: 69F14371604380AADF14EB64C8DDBFE7799AF91300F08446DF8D59B683DA24DA89C762
                              APIs
                                • Part of subcall function 00C912E7: GetDlgItem.USER32(00000000,00003021), ref: 00C9132B
                                • Part of subcall function 00C912E7: SetWindowTextW.USER32(00000000,00CC02E4), ref: 00C91341
                              • EndDialog.USER32(?,00000001), ref: 00CA99AE
                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00CA99DB
                              • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00CA99F0
                              • SetWindowTextW.USER32(?,?), ref: 00CA9A01
                              • GetDlgItem.USER32(?,00000065), ref: 00CA9A0A
                              • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00CA9A1E
                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00CA9A30
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: MessageSend$Item$TextWindow$Dialog
                              • String ID: LICENSEDLG
                              • API String ID: 3214253823-2177901306
                              • Opcode ID: 09c8427e84346ee2e46f392c425489737cc8acff130d49ba358dd614a5fd0ec0
                              • Instruction ID: a5a60ffd9757c4b86d4ee40226775a0e23c847408ab66f7ca32a7e6dcdc5a799
                              • Opcode Fuzzy Hash: 09c8427e84346ee2e46f392c425489737cc8acff130d49ba358dd614a5fd0ec0
                              • Instruction Fuzzy Hash: 1021F9322002097FE6116B72ED8AF7F7BACEB4BB8DF004019F604A5491CB769D01E632
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C99282
                              • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00C992A5
                              • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00C992C4
                                • Part of subcall function 00CA0B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00C9AC99,?,?,?,00C9AC48,?,-00000002,?,00000000,?), ref: 00CA0B16
                              • _swprintf.LIBCMT ref: 00C99360
                                • Part of subcall function 00C93F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C93F3E
                              • MoveFileW.KERNEL32(?,?), ref: 00C993D5
                              • MoveFileW.KERNEL32(?,?), ref: 00C99411
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                              • String ID: rtmp%d
                              • API String ID: 2111052971-3303766350
                              • Opcode ID: e66319dcad405d2b5a893d399418d15143c7e3cd30004fcfed0c0f6298a82067
                              • Instruction ID: 0da0adde03e191230ac1ece5b854442b696dc2b0489109303fc6f074ddc1e8d6
                              • Opcode Fuzzy Hash: e66319dcad405d2b5a893d399418d15143c7e3cd30004fcfed0c0f6298a82067
                              • Instruction Fuzzy Hash: B041AE72911159AACF21EBA4CE49FDE777CEF44381F4044A9F905E3042EA309B46DF64
                              APIs
                              • GetTickCount.KERNEL32 ref: 00CA7DAE
                              • GetTickCount.KERNEL32 ref: 00CA7DCC
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CA7DE2
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CA7DF6
                              • TranslateMessage.USER32(?), ref: 00CA7E01
                              • DispatchMessageW.USER32(?), ref: 00CA7E0C
                              • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00CA7EBC
                              • SetWindowTextW.USER32(?,00000000), ref: 00CA7EC6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                              • String ID:
                              • API String ID: 4150546248-0
                              • Opcode ID: 8028eb135fb8ae33a062e71b9d3c7c83580225ad061a06b3d88d4deae2748189
                              • Instruction ID: d673b22be43e45d3b84b56747b349121ba0b3dbc1309eedddc07cbbe2a3544cc
                              • Opcode Fuzzy Hash: 8028eb135fb8ae33a062e71b9d3c7c83580225ad061a06b3d88d4deae2748189
                              • Instruction Fuzzy Hash: A1413871208306AFD710DF65DD88E2BBBE9FF89708B00096DF555C6251DB21ED45CB62
                              APIs
                              • __aulldiv.LIBCMT ref: 00C9FE21
                                • Part of subcall function 00C9A930: GetVersionExW.KERNEL32(?), ref: 00C9A955
                              • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 00C9FE4A
                              • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 00C9FE5C
                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00C9FE69
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C9FE7F
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C9FE8B
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C9FEC1
                              • __aullrem.LIBCMT ref: 00C9FF4B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                              • String ID:
                              • API String ID: 1247370737-0
                              • Opcode ID: e0b180b1f3a58531603036ffd82af4fd7eadb739eaa8d956fc0173c35cceadde
                              • Instruction ID: 9ab84c143cf71f5e0109ee3d4f5637a8cd4edfc718b5884156806593dab7fa03
                              • Opcode Fuzzy Hash: e0b180b1f3a58531603036ffd82af4fd7eadb739eaa8d956fc0173c35cceadde
                              • Instruction Fuzzy Hash: E94147B24083059FC710DFA5C884AAFFBF8FB88704F004A2EF59692650E775E649DB52
                              APIs
                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00CBCCE2,00000000,00000000,00000000,00000000,00000000,00CB2C3E), ref: 00CBC5AF
                              • __fassign.LIBCMT ref: 00CBC62A
                              • __fassign.LIBCMT ref: 00CBC645
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00CBC66B
                              • WriteFile.KERNEL32(?,00000000,00000000,00CBCCE2,00000000,?,?,?,?,?,?,?,?,?,00CBCCE2,00000000), ref: 00CBC68A
                              • WriteFile.KERNEL32(?,00000000,00000001,00CBCCE2,00000000,?,?,?,?,?,?,?,?,?,00CBCCE2,00000000), ref: 00CBC6C3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: 45fbb591180f2a2ebbd98883932161b48d6b3281c0195a3638f24215965e4594
                              • Instruction ID: dfb0396bf75806a861d34f959e5b24ea945cbbdaf9e1af859b21b380d1753c8b
                              • Opcode Fuzzy Hash: 45fbb591180f2a2ebbd98883932161b48d6b3281c0195a3638f24215965e4594
                              • Instruction Fuzzy Hash: 15517EB1A002499FCB10CFA8D885FEEBBF8EF19300F15415AE955F7251E730AA41CB65
                              APIs
                              • GetTempPathW.KERNEL32(00000800,?), ref: 00CAB0EE
                              • _swprintf.LIBCMT ref: 00CAB122
                                • Part of subcall function 00C93F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C93F3E
                              • SetDlgItemTextW.USER32(?,00000066,00CD3122), ref: 00CAB142
                              • _wcschr.LIBVCRUNTIME ref: 00CAB175
                              • EndDialog.USER32(?,00000001), ref: 00CAB256
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                              • String ID: %s%s%u
                              • API String ID: 2892007947-1360425832
                              • Opcode ID: 549b1ba5cad9b08cd9fd3eb004b01022163b01c25853ee5feb8fed60e61e1c09
                              • Instruction ID: e48f51807be907deb738f1a99905f65bade5f497d0eddb8f00921694ee92f4e2
                              • Opcode Fuzzy Hash: 549b1ba5cad9b08cd9fd3eb004b01022163b01c25853ee5feb8fed60e61e1c09
                              • Instruction Fuzzy Hash: 1A418E7190025AAEEF25DB60DD85FEE77BCEB05308F0040A6F519E6052EB709F849FA5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _strlen$_swprintf_wcschr_wcsrchr
                              • String ID: %08x
                              • API String ID: 1593746830-3682738293
                              • Opcode ID: 2d451bb66520e86e7db14a6d6a8fc36a442bc11e91f21ac5effe2b7e611b6116
                              • Instruction ID: 00903df038d26f41c42a78fceaad4994a2154335655f419ea3c2500417743775
                              • Opcode Fuzzy Hash: 2d451bb66520e86e7db14a6d6a8fc36a442bc11e91f21ac5effe2b7e611b6116
                              • Instruction Fuzzy Hash: F4410573904344AEEB31EA64CC8DFFB73ECEB84310F15052AF95597182DA359E05E2A1
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00CA8704,?), ref: 00CA7FB9
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00CA7FDA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AllocByteCharGlobalMultiWide
                              • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                              • API String ID: 3286310052-4209811716
                              • Opcode ID: ded1af9821fbcce1f57681a6eeba26d587561c9025f410c59f76dab95fcfb5c1
                              • Instruction ID: a9f4b8b0f30d6204796cd97fdb216ff72b4566387408f29bb82683f28fea0ba0
                              • Opcode Fuzzy Hash: ded1af9821fbcce1f57681a6eeba26d587561c9025f410c59f76dab95fcfb5c1
                              • Instruction Fuzzy Hash: EE3103321083167ED728ABA5DC06FAFB798EF53724F14421EF510961C2EB749A0987A6
                              APIs
                              • ShowWindow.USER32(?,00000000), ref: 00CA85B4
                              • GetWindowRect.USER32(?,?), ref: 00CA85D9
                              • ShowWindow.USER32(?,00000005,?), ref: 00CA8670
                              • SetWindowTextW.USER32(?,00000000), ref: 00CA8678
                              • ShowWindow.USER32(00000000,00000005), ref: 00CA868E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Window$Show$RectText
                              • String ID: RarHtmlClassName
                              • API String ID: 3937224194-1658105358
                              • Opcode ID: 7fa885fa196d195cb57a91f1f2f01fe9241bab5eb5c4e9c5535a584fb3f81d56
                              • Instruction ID: 38450822f9a50e9acd76817d60e9474d947b60dba0452026a072f721c6895fdb
                              • Opcode Fuzzy Hash: 7fa885fa196d195cb57a91f1f2f01fe9241bab5eb5c4e9c5535a584fb3f81d56
                              • Instruction Fuzzy Hash: A531AE32101204AFDB119FA4DD4CF5FBFA8EB49709F044459FD09AA192DB30E914CFA2
                              APIs
                                • Part of subcall function 00CB92C4: _free.LIBCMT ref: 00CB92ED
                              • _free.LIBCMT ref: 00CB934E
                                • Part of subcall function 00CB59B2: RtlFreeHeap.NTDLL(00000000,00000000,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?), ref: 00CB59C8
                                • Part of subcall function 00CB59B2: GetLastError.KERNEL32(?,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?,?), ref: 00CB59DA
                              • _free.LIBCMT ref: 00CB9359
                              • _free.LIBCMT ref: 00CB9364
                              • _free.LIBCMT ref: 00CB93B8
                              • _free.LIBCMT ref: 00CB93C3
                              • _free.LIBCMT ref: 00CB93CE
                              • _free.LIBCMT ref: 00CB93D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: f1ac33a155eeba0822e17f5f402666ce6a004e9925b6c7aeea596f78182db2dd
                              • Instruction ID: 45de236429b69a228206c939fb677a5b4b692e18b0fbc324b9d11da41c3f4c2f
                              • Opcode Fuzzy Hash: f1ac33a155eeba0822e17f5f402666ce6a004e9925b6c7aeea596f78182db2dd
                              • Instruction Fuzzy Hash: 13114C71D42B04FAEE30BBB0CC47FCB77ACEF00710F404915B7A9A6092DA75B94AA651
                              APIs
                              • GetLastError.KERNEL32(?,?,00CB0BAB,00CAE602), ref: 00CB0BC2
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00CB0BD0
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00CB0BE9
                              • SetLastError.KERNEL32(00000000,?,00CB0BAB,00CAE602), ref: 00CB0C3B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 01907e36626a0a96a4f3e33e6792cd794efe78f4c2ec8625f48c4cd34842151f
                              • Instruction ID: 229c43e539c07555c554783d9956e025c1285fcc47c90bf82b6aa9c9098ae10f
                              • Opcode Fuzzy Hash: 01907e36626a0a96a4f3e33e6792cd794efe78f4c2ec8625f48c4cd34842151f
                              • Instruction Fuzzy Hash: 3A01D4321596169EEB252775FC8DBEF2B54EB113B8F38032AF920411E1EF214D02A141
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                              • API String ID: 0-1718035505
                              • Opcode ID: 6fbcaa89fa0aeca86eae85742497b674343553b24aba0579497ea1ecdd010fdf
                              • Instruction ID: 1c0cd2772a9af89aff509c8966f893f06315e83d632003d0cd7efe46f1720c9a
                              • Opcode Fuzzy Hash: 6fbcaa89fa0aeca86eae85742497b674343553b24aba0579497ea1ecdd010fdf
                              • Instruction Fuzzy Hash: DD01F471A42323DB4F204F76ACC4FAA27887B03759326013AE931D71D1EB29C980A7A0
                              APIs
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CA009C
                                • Part of subcall function 00C9A930: GetVersionExW.KERNEL32(?), ref: 00C9A955
                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00CA00BE
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CA00D8
                              • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00CA00E9
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CA00F9
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CA0105
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Time$File$System$Local$SpecificVersion
                              • String ID:
                              • API String ID: 2092733347-0
                              • Opcode ID: 11089dd099a5ff13b0f41cd20ddf482a660421b7354b1664d7195bb2c39e7ce2
                              • Instruction ID: ccbd6c415de265e998aadec795e2fe81aa8a05f4143f635461a0dd92abf18565
                              • Opcode Fuzzy Hash: 11089dd099a5ff13b0f41cd20ddf482a660421b7354b1664d7195bb2c39e7ce2
                              • Instruction Fuzzy Hash: 7731C47A1083469BC700DFA5C98099FB7F8BF98704F04491EFA99C3210E630D549CB6A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: 15d2b62b8e6e0d0f8aac48adb0d7a358055d9ac0b024e779914418c2f884a7ba
                              • Instruction ID: a309c8a959abce1b2da59ab8aa60371845f54445d41f2e3b092ff52c929d082a
                              • Opcode Fuzzy Hash: 15d2b62b8e6e0d0f8aac48adb0d7a358055d9ac0b024e779914418c2f884a7ba
                              • Instruction Fuzzy Hash: 7321C5B1A0050BAFD7049A16DC82F7BB7ACAF5274CB148238FC049A142F734DE49A7D0
                              APIs
                              • GetLastError.KERNEL32(?,00CCCBE8,00CB2664,00CCCBE8,?,?,00CB2203,?,?,00CCCBE8), ref: 00CB6312
                              • _free.LIBCMT ref: 00CB6345
                              • _free.LIBCMT ref: 00CB636D
                              • SetLastError.KERNEL32(00000000,?,00CCCBE8), ref: 00CB637A
                              • SetLastError.KERNEL32(00000000,?,00CCCBE8), ref: 00CB6386
                              • _abort.LIBCMT ref: 00CB638C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: ea006c2c2116a05e962ee04f0fa0abc0951460e51c1b598f1253a2657840d87c
                              • Instruction ID: 595fa8cbec2875727ab2a6a4224bdd23868822edf17550348f00abde415f7d5a
                              • Opcode Fuzzy Hash: ea006c2c2116a05e962ee04f0fa0abc0951460e51c1b598f1253a2657840d87c
                              • Instruction Fuzzy Hash: BDF0C835505910AAD7113775EC0EFEF22A99BD1775F350214F924A22A1FF29CD036251
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\vkXe5gkY34.exe,00000104), ref: 00CB4BBA
                              • _free.LIBCMT ref: 00CB4C85
                              • _free.LIBCMT ref: 00CB4C8F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Desktop\vkXe5gkY34.exe$%n
                              • API String ID: 2506810119-3034941397
                              • Opcode ID: 08b97686da4023bb39c78085996dd439275290597dd6760877769b6783dbab48
                              • Instruction ID: 9e79c5a06ccc59482bd2378b4202de0909017efd2ca785a7208bbed5b28e16ec
                              • Opcode Fuzzy Hash: 08b97686da4023bb39c78085996dd439275290597dd6760877769b6783dbab48
                              • Instruction Fuzzy Hash: 3F316F71A05658EFDB25DF999981EEEBBFCEB88710F104066F9149B212DB708E40DB90
                              APIs
                                • Part of subcall function 00C912E7: GetDlgItem.USER32(00000000,00003021), ref: 00C9132B
                                • Part of subcall function 00C912E7: SetWindowTextW.USER32(00000000,00CC02E4), ref: 00C91341
                              • EndDialog.USER32(?,00000001), ref: 00CAB86A
                              • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 00CAB880
                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 00CAB89A
                              • SetDlgItemTextW.USER32(?,00000066), ref: 00CAB8A5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ItemText$DialogWindow
                              • String ID: RENAMEDLG
                              • API String ID: 445417207-3299779563
                              • Opcode ID: d87b5d5974482569ee4b18df14da9ba04fdd13a85dbbfafd21b9b5971f2716eb
                              • Instruction ID: 6324303827cd3628859edb7626d68b668ea8de65258b297e180cf5a46f5b6944
                              • Opcode Fuzzy Hash: d87b5d5974482569ee4b18df14da9ba04fdd13a85dbbfafd21b9b5971f2716eb
                              • Instruction Fuzzy Hash: 9A01B9329442177AD1114F6A9E89F7B776CA747B48F000419F245B64D2C75A9D04AA72
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00CB4A30,?,?,00CB49D0,?,00CC7F60,0000000C,00CB4B27,?,00000002), ref: 00CB4A9F
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00CB4AB2
                              • FreeLibrary.KERNEL32(00000000,?,?,?,00CB4A30,?,?,00CB49D0,?,00CC7F60,0000000C,00CB4B27,?,00000002,00000000), ref: 00CB4AD5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 15a525eddfa3fae7bd8dbbc764b57225d6a67bd41b5c0db5be8cf44a6bae2592
                              • Instruction ID: af09dde023a332544d729552958b8a7ae84d40f38c4291e40c6393ea59df38ff
                              • Opcode Fuzzy Hash: 15a525eddfa3fae7bd8dbbc764b57225d6a67bd41b5c0db5be8cf44a6bae2592
                              • Instruction Fuzzy Hash: 18F04930A44219FBCB199F90DC09FEEBFB8EF44B15F184169F805A21A1DB758A80DA94
                              APIs
                                • Part of subcall function 00C9F35B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C9F376
                                • Part of subcall function 00C9F35B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00C9DF18,Crypt32.dll,?,00C9DF9C,?,00C9DF7E,?,?,?,?), ref: 00C9F398
                              • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00C9DF24
                              • GetProcAddress.KERNEL32(00CD1E58,CryptUnprotectMemory), ref: 00C9DF34
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AddressProc$DirectoryLibraryLoadSystem
                              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                              • API String ID: 2141747552-1753850145
                              • Opcode ID: 687ed74b716fbdc9dcdb9280d7c5fb374b0790b38bf2d0924d6a638bb8287a4a
                              • Instruction ID: 4615e2d999b64e82b2b8d8b95f2da626b383354d214831c84090a5008399bb9f
                              • Opcode Fuzzy Hash: 687ed74b716fbdc9dcdb9280d7c5fb374b0790b38bf2d0924d6a638bb8287a4a
                              • Instruction Fuzzy Hash: CAE046B0508B42EEDF415F74D80DF08FBA47B90710F258269F46AD2650DBB4D0A59B50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: a353dae794e864a503866beaffbff03600980c01495e6240937bc419b8e2a188
                              • Instruction ID: 87ca3ccb4dae811515324080e062b392785d2ecefa76ab35b06bc781279e964f
                              • Opcode Fuzzy Hash: a353dae794e864a503866beaffbff03600980c01495e6240937bc419b8e2a188
                              • Instruction Fuzzy Hash: 1141C132E006049FCB24DFB9C885B9DB7F5EF88324F154569E515EB391DA71AE01DB80
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 00CB89A9
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00CB89CC
                                • Part of subcall function 00CB59EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CB239A,?,0000015D,?,?,?,?,00CB2F19,000000FF,00000000,?,?), ref: 00CB5A1E
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00CB89F2
                              • _free.LIBCMT ref: 00CB8A05
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00CB8A14
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 052eca019d468e04604a5278a73ff456010bd553cc8435b8b46cdf7f01bda9f2
                              • Instruction ID: c8ac0d285f1cff112f384fdec365b2868657530715a660474a01194411d1c9c6
                              • Opcode Fuzzy Hash: 052eca019d468e04604a5278a73ff456010bd553cc8435b8b46cdf7f01bda9f2
                              • Instruction Fuzzy Hash: 6F01F7B2A02655BF272156B7AC4DEFF696DDEC6FB0724012AF804D3100EE608D05E1B0
                              APIs
                              • GetLastError.KERNEL32(?,?,?,00CB5E33,00CB5ACF,?,00CB633C,00000001,00000364,?,00CB2203,?,?,00CCCBE8), ref: 00CB6397
                              • _free.LIBCMT ref: 00CB63CC
                              • _free.LIBCMT ref: 00CB63F3
                              • SetLastError.KERNEL32(00000000,?,00CCCBE8), ref: 00CB6400
                              • SetLastError.KERNEL32(00000000,?,00CCCBE8), ref: 00CB6409
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: 735ae2e69d92f6544808ddd488aa2a7f2ec0094834169ab89ad69800ae9220f5
                              • Instruction ID: 759807d9de70bd883ae6f438f0361a7b32e547968c0793b9f579b5d530f7715c
                              • Opcode Fuzzy Hash: 735ae2e69d92f6544808ddd488aa2a7f2ec0094834169ab89ad69800ae9220f5
                              • Instruction Fuzzy Hash: C9017D72541A106BC7017375EC85FEF226DCBD0375F310124F824921A2EF79CC036120
                              APIs
                              • _free.LIBCMT ref: 00CB9273
                                • Part of subcall function 00CB59B2: RtlFreeHeap.NTDLL(00000000,00000000,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?), ref: 00CB59C8
                                • Part of subcall function 00CB59B2: GetLastError.KERNEL32(?,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?,?), ref: 00CB59DA
                              • _free.LIBCMT ref: 00CB9285
                              • _free.LIBCMT ref: 00CB9297
                              • _free.LIBCMT ref: 00CB92A9
                              • _free.LIBCMT ref: 00CB92BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 4ee3a526465b19d1d2014a11adc446a07b06620ae1f3d9cf6b9c503daa7aa443
                              • Instruction ID: dbb9142ca8540697c6882501854e074f5f945aa293bc29076355409daca705b2
                              • Opcode Fuzzy Hash: 4ee3a526465b19d1d2014a11adc446a07b06620ae1f3d9cf6b9c503daa7aa443
                              • Instruction Fuzzy Hash: ADF01232D16604FBDA20EBA8F886E9A77F9EA00720B644805F518D7641C734FD829665
                              APIs
                              • _free.LIBCMT ref: 00CB5531
                                • Part of subcall function 00CB59B2: RtlFreeHeap.NTDLL(00000000,00000000,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?), ref: 00CB59C8
                                • Part of subcall function 00CB59B2: GetLastError.KERNEL32(?,?,00CB92F2,?,00000000,?,00000000,?,00CB9319,?,00000007,?,?,00CB9716,?,?), ref: 00CB59DA
                              • _free.LIBCMT ref: 00CB5543
                              • _free.LIBCMT ref: 00CB5556
                              • _free.LIBCMT ref: 00CB5567
                              • _free.LIBCMT ref: 00CB5578
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 117c5b59d83ff43a50cd0991dfe0aecf5450aa91e81c5cfecc28ec6d3eb4d45a
                              • Instruction ID: f2902dedb8c59e78059044b99c8fe8296acb95fec63421c1a15a04e56470443f
                              • Opcode Fuzzy Hash: 117c5b59d83ff43a50cd0991dfe0aecf5450aa91e81c5cfecc28ec6d3eb4d45a
                              • Instruction Fuzzy Hash: C9F030B1C226548F9F116F98FC82B5E3B70F704721741010AF4145A2B1DB385D83AB82
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C97468
                                • Part of subcall function 00C93A90: __EH_prolog.LIBCMT ref: 00C93A95
                              • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000), ref: 00C9752E
                                • Part of subcall function 00C97A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00C97AAC
                                • Part of subcall function 00C97A9D: GetLastError.KERNEL32 ref: 00C97AF2
                                • Part of subcall function 00C97A9D: CloseHandle.KERNEL32(?), ref: 00C97B01
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                              • String ID: SeRestorePrivilege$SeSecurityPrivilege
                              • API String ID: 3813983858-639343689
                              • Opcode ID: bf16fa2bba2174f662e8cc560b7e2786c3281bb9c964df8b04a9f16b487a4aed
                              • Instruction ID: a885e5d370b535dbb356b078b03e43eca3272998766900048ee5a432ee83654b
                              • Opcode Fuzzy Hash: bf16fa2bba2174f662e8cc560b7e2786c3281bb9c964df8b04a9f16b487a4aed
                              • Instruction Fuzzy Hash: A531EE71A05208AFDF60EFA4DC4AFEE7B68AF04314F004169F859A7282DB709F44DB61
                              APIs
                              • CharUpperW.USER32(?,?,?,?,00001000), ref: 00CAA92B
                              • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00CAA952
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CharUpper
                              • String ID: -
                              • API String ID: 9403516-2547889144
                              • Opcode ID: 95d7ddb86cbed95d289924c48d79db32dd6f087c29c9ce1bf55a33ea5218b099
                              • Instruction ID: 64e1684aacd2339e60038739f4c46b8df8a01a69dcf51460bf10fdf733efd812
                              • Opcode Fuzzy Hash: 95d7ddb86cbed95d289924c48d79db32dd6f087c29c9ce1bf55a33ea5218b099
                              • Instruction Fuzzy Hash: 52210572004307A5C724EA79980DB7FA7A89B9B35DF02041BF5A5C2541E775CA88E363
                              APIs
                                • Part of subcall function 00C912E7: GetDlgItem.USER32(00000000,00003021), ref: 00C9132B
                                • Part of subcall function 00C912E7: SetWindowTextW.USER32(00000000,00CC02E4), ref: 00C91341
                              • EndDialog.USER32(?,00000001), ref: 00CA91AA
                              • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 00CA91BF
                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 00CA91D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ItemText$DialogWindow
                              • String ID: ASKNEXTVOL
                              • API String ID: 445417207-3402441367
                              • Opcode ID: 6c9dd90e560eae22ba0f9298c22b9936b44b61b44cbc824a014915daf31bd0cd
                              • Instruction ID: 98797efee3118c341fc5de1b86f8bcce3634ace8f4adc417cbbefbd15338d161
                              • Opcode Fuzzy Hash: 6c9dd90e560eae22ba0f9298c22b9936b44b61b44cbc824a014915daf31bd0cd
                              • Instruction Fuzzy Hash: 6B11B632241257BFDA159BA5ED4FF5E3BA9EB4B708F004010F701AB5B1C376AD01AB66
                              APIs
                                • Part of subcall function 00C912E7: GetDlgItem.USER32(00000000,00003021), ref: 00C9132B
                                • Part of subcall function 00C912E7: SetWindowTextW.USER32(00000000,00CC02E4), ref: 00C91341
                              • EndDialog.USER32(?,00000001), ref: 00CA9693
                              • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 00CA96AB
                              • SetDlgItemTextW.USER32(?,00000066,?), ref: 00CA96D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ItemText$DialogWindow
                              • String ID: GETPASSWORD1
                              • API String ID: 445417207-3292211884
                              • Opcode ID: 8b79f12ec89ed12db629b0a7bc8f2d6f8ba5c44d3a43a7fbe17ba3ddc97fa27d
                              • Instruction ID: 476f3281d5f66533cf058f4e06e2d3cf6d3efb18e6948ebd89bd467b5f923611
                              • Opcode Fuzzy Hash: 8b79f12ec89ed12db629b0a7bc8f2d6f8ba5c44d3a43a7fbe17ba3ddc97fa27d
                              • Instruction Fuzzy Hash: 8E11043290012A77DB219EB59D4FFFB377CEF1A708F000021FA04E3090C2B5AE10AAA5
                              APIs
                              • _swprintf.LIBCMT ref: 00C9B177
                                • Part of subcall function 00C93F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C93F3E
                              • _wcschr.LIBVCRUNTIME ref: 00C9B195
                              • _wcschr.LIBVCRUNTIME ref: 00C9B1A5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _wcschr$__vswprintf_c_l_swprintf
                              • String ID: %c:\
                              • API String ID: 525462905-3142399695
                              • Opcode ID: f41bb54e658e7a97658adeccc0d85fb5e72a869fb82ede6bf7f40e47762903eb
                              • Instruction ID: 4c2a20659278f5ecf9a35e65b6c844d88e4f44637f08db38559125fcf18daba1
                              • Opcode Fuzzy Hash: f41bb54e658e7a97658adeccc0d85fb5e72a869fb82ede6bf7f40e47762903eb
                              • Instruction Fuzzy Hash: 9A01F563500321BADE306B65AE4ADAFA7ACEF96360B10441BFD54D2082FB20DD50D3B1
                              APIs
                              • InitializeCriticalSection.KERNEL32(000001A0,00000000,00CD1E74,?,?,00C9FB9D,00000020,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?), ref: 00C9F9BB
                              • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?,?,?,00CA3AFE), ref: 00C9F9C5
                              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?,?,?,00CA3AFE), ref: 00C9F9D5
                              Strings
                              • Thread pool initialization failed., xrefs: 00C9F9ED
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Create$CriticalEventInitializeSectionSemaphore
                              • String ID: Thread pool initialization failed.
                              • API String ID: 3340455307-2182114853
                              • Opcode ID: 8f43362896e588eecf570a03a19d0adece8e0b791bc89dbfdad22cde0536e2fe
                              • Instruction ID: cbfcaa821fb4bbf675dd28e84c3b9769eef049f0355c44200b703be63bf234e7
                              • Opcode Fuzzy Hash: 8f43362896e588eecf570a03a19d0adece8e0b791bc89dbfdad22cde0536e2fe
                              • Instruction Fuzzy Hash: 46112EB1641704AFD7205F65D889BABFBECFB95355F21482EE2EAC2240DA716881DB10
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID: RENAMEDLG$REPLACEFILEDLG
                              • API String ID: 0-56093855
                              • Opcode ID: 87f4ddfa5d56b9d0438f082d389165f130d023e56d9b504546ad8f22427cc18c
                              • Instruction ID: 70aca34fad235eadb5f32372cf2b82f334315909149edf19ceb9ec1fc6522ebd
                              • Opcode Fuzzy Hash: 87f4ddfa5d56b9d0438f082d389165f130d023e56d9b504546ad8f22427cc18c
                              • Instruction Fuzzy Hash: 4101B17560A246BFC7118B99FD44F2ABBD8EB5A388F08452AF95492132D3329C41EF61
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00C9CEA7
                              • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00C9CEB6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: FindHandleModuleResource
                              • String ID: LTR$RTL
                              • API String ID: 3537982541-719208805
                              • Opcode ID: a4888f18a966d4ad5245ca2960be00723daa3ab2cbc4dc85ac83a6d892ef7d1c
                              • Instruction ID: 1c11a346acd469e67f4f2277f0b0bdd93e7106620770d46f32c3d7a697f4c51f
                              • Opcode Fuzzy Hash: a4888f18a966d4ad5245ca2960be00723daa3ab2cbc4dc85ac83a6d892ef7d1c
                              • Instruction Fuzzy Hash: 14F05071644354A7EB346B75AC0EFA73BACE781B00F10065DF646971C0DFA0950887F4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID:
                              • API String ID: 1036877536-0
                              • Opcode ID: be6c9d0d7c1be526505d416ba69bbcf9729ec644743c8de63497f1cd699fda8f
                              • Instruction ID: 575144aa275cb9118eb5dc7a3ba8ae91b5c20a2d5104e7eca6ddbf93fa2431f5
                              • Opcode Fuzzy Hash: be6c9d0d7c1be526505d416ba69bbcf9729ec644743c8de63497f1cd699fda8f
                              • Instruction Fuzzy Hash: F9A17A729007869FDB21CF28C891BEEBFE5EF55314F1841ADE595AB281CA3D8E41CB50
                              APIs
                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,00C97F55,?,?,?), ref: 00C9A020
                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,00C97F55,?,?), ref: 00C9A064
                              • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,00C97F55,?,?,?,?,?,?,?,?), ref: 00C9A0E5
                              • CloseHandle.KERNEL32(?,?,00000000,?,00C97F55,?,?,?,?,?,?,?,?,?,?,?), ref: 00C9A0EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: File$Create$CloseHandleTime
                              • String ID:
                              • API String ID: 2287278272-0
                              • Opcode ID: 824a0a62d8dab8148a5f224a3d498bf6d085a022ab721aa5f62fcbdcc20d3604
                              • Instruction ID: 8ebe1e0424cd64777cb7239696ba07fb70922bbaefe77f5c4f790a876de8993d
                              • Opcode Fuzzy Hash: 824a0a62d8dab8148a5f224a3d498bf6d085a022ab721aa5f62fcbdcc20d3604
                              • Instruction Fuzzy Hash: 9141CF312483819AEB31DF68DC49FAEBBE8AB85700F04091DF5E5D3181D6749A48DB93
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,F5E85006,00CB2784,00000000,00000000,00CB2FB2,?,00CB2FB2,?,00000001,00CB2784,F5E85006,00000001,00CB2FB2,00CB2FB2), ref: 00CB9431
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00CB94BA
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00CB94CC
                              • __freea.LIBCMT ref: 00CB94D5
                                • Part of subcall function 00CB59EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CB239A,?,0000015D,?,?,?,?,00CB2F19,000000FF,00000000,?,?), ref: 00CB5A1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                              • String ID:
                              • API String ID: 2652629310-0
                              • Opcode ID: 3318141fffd420cc9252d33e403c58f49496454400f4ed0c3adc3b0f917b9526
                              • Instruction ID: f7ba5058812516e74d073a1da80e5cdaf866dbeae13b485ce2cefad4cf23b610
                              • Opcode Fuzzy Hash: 3318141fffd420cc9252d33e403c58f49496454400f4ed0c3adc3b0f917b9526
                              • Instruction Fuzzy Hash: 8D31BC72A0021AABDF258F64CC85EEE7BA5EF40310F154168FD25D7291E735CD51DB90
                              APIs
                              • LoadBitmapW.USER32(00000065), ref: 00CA9A85
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00CA9AA6
                              • DeleteObject.GDI32(00000000), ref: 00CA9ACE
                              • DeleteObject.GDI32(00000000), ref: 00CA9AED
                                • Part of subcall function 00CA8BCF: FindResourceW.KERNEL32(00000066,PNG,?,?,00CA9AC7,00000066), ref: 00CA8BE0
                                • Part of subcall function 00CA8BCF: SizeofResource.KERNEL32(00000000,75FD5780,?,?,00CA9AC7,00000066), ref: 00CA8BF8
                                • Part of subcall function 00CA8BCF: LoadResource.KERNEL32(00000000,?,?,00CA9AC7,00000066), ref: 00CA8C0B
                                • Part of subcall function 00CA8BCF: LockResource.KERNEL32(00000000,?,?,00CA9AC7,00000066), ref: 00CA8C16
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                              • String ID:
                              • API String ID: 142272564-0
                              • Opcode ID: 4138fdde94d03d03c69d7dda6f9cb218154da7cb87ed4522f65f144d20be32b2
                              • Instruction ID: 95fed0c8722e51fbee22b2843ddcb6923f28a15b1e7c48eb061918a04b75b5ed
                              • Opcode Fuzzy Hash: 4138fdde94d03d03c69d7dda6f9cb218154da7cb87ed4522f65f144d20be32b2
                              • Instruction Fuzzy Hash: 7B01F23254021627C61177749D4BFBE766EEF8AB69F080012FD04E76A1EE618C19B6B1
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00CB0FED
                                • Part of subcall function 00CB1625: ___AdjustPointer.LIBCMT ref: 00CB166F
                              • _UnwindNestedFrames.LIBCMT ref: 00CB1004
                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00CB1016
                              • CallCatchBlock.LIBVCRUNTIME ref: 00CB103A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID:
                              • API String ID: 2633735394-0
                              • Opcode ID: b9fa4c2ca776b65944230fb083eb0fa8b0de912ee33a1d220a96a688825d65b2
                              • Instruction ID: 88cfe6b3b227bdbb6148850cee86158f09ec252dec10744cf9d01e4b4b1864d3
                              • Opcode Fuzzy Hash: b9fa4c2ca776b65944230fb083eb0fa8b0de912ee33a1d220a96a688825d65b2
                              • Instruction Fuzzy Hash: E2012532000149BBCF226F95DC05EDA3BBAFF59758F194414FE1862121C776E9A1EBA0
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C9FB59
                              • EnterCriticalSection.KERNEL32(00CD1E74,?,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?,?,?,00CA3AFE,?,00008000), ref: 00C9FB66
                              • new.LIBCMT ref: 00C9FB82
                                • Part of subcall function 00C9F982: InitializeCriticalSection.KERNEL32(000001A0,00000000,00CD1E74,?,?,00C9FB9D,00000020,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?), ref: 00C9F9BB
                                • Part of subcall function 00C9F982: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?,?,?,00CA3AFE), ref: 00C9F9C5
                                • Part of subcall function 00C9F982: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?,?,?,00CA3AFE), ref: 00C9F9D5
                              • LeaveCriticalSection.KERNEL32(00CD1E74,?,00C9A812,?,00C9C79B,?,00000000,?,00000001,?,?,?,00CA3AFE,?,00008000,?), ref: 00C9FBA3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CriticalSection$Create$EnterEventH_prologInitializeLeaveSemaphore
                              • String ID:
                              • API String ID: 3780591329-0
                              • Opcode ID: ba23696cb173fd309a43a1d6d5db9c170a29ca335dcf32804a3335da26c11cdf
                              • Instruction ID: 1590c7e362fccbaca5de23c59d9ca22a9ed60f165f6d3349f5b800bc66a7a5cf
                              • Opcode Fuzzy Hash: ba23696cb173fd309a43a1d6d5db9c170a29ca335dcf32804a3335da26c11cdf
                              • Instruction Fuzzy Hash: CDF09A74E02616ABDB08AF68EC19BADB7A8EB49304F00413FFC09D3750DB7089008B51
                              APIs
                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00CB0B06
                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00CB0B0B
                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00CB0B10
                                • Part of subcall function 00CB1BDE: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00CB1BEF
                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00CB0B25
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 1761009282-0
                              • Opcode ID: 531e6f4e0a03c94a47563f5691ee99a7aac98bf87a5ed1e2fb88b7d1485fc598
                              • Instruction ID: c4491eff64290a564f6311639254bcc0943c05236523ff251192a55dd63e4c3b
                              • Opcode Fuzzy Hash: 531e6f4e0a03c94a47563f5691ee99a7aac98bf87a5ed1e2fb88b7d1485fc598
                              • Instruction Fuzzy Hash: 28C04864AA02A59A1C243AF222622EF2B401CA27CCFF815C1BC641B107AE464A1BB033
                              APIs
                                • Part of subcall function 00CA8BA4: GetDC.USER32(00000000), ref: 00CA8BA8
                                • Part of subcall function 00CA8BA4: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00CA8BB3
                                • Part of subcall function 00CA8BA4: ReleaseDC.USER32(00000000,00000000), ref: 00CA8BBE
                              • GetObjectW.GDI32(?,00000018,?), ref: 00CA8D23
                                • Part of subcall function 00CA8EE9: GetDC.USER32(00000000), ref: 00CA8EF2
                                • Part of subcall function 00CA8EE9: GetObjectW.GDI32(?,00000018,?), ref: 00CA8F21
                                • Part of subcall function 00CA8EE9: ReleaseDC.USER32(00000000,?), ref: 00CA8FB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ObjectRelease$CapsDevice
                              • String ID: (
                              • API String ID: 1061551593-3887548279
                              • Opcode ID: 3bad5cc8aaac4202a9aef36eb628183a73749a45e0c56e654e9a290df83b5437
                              • Instruction ID: af457c1ea45f7e06eb763edc3c6c2110bf0adcfa58e521b965c320ec1953611b
                              • Opcode Fuzzy Hash: 3bad5cc8aaac4202a9aef36eb628183a73749a45e0c56e654e9a290df83b5437
                              • Instruction Fuzzy Hash: C7611671608206AFD310DF64C888E6BBBE9FF8A708F10495DF599C7261CB31D909CB62
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: _swprintf
                              • String ID: %ls$%s: %s
                              • API String ID: 589789837-2259941744
                              • Opcode ID: 19628108cf6a53c6291a338649bac71fbe7e670d096e3d28584ff181f8cb4eb0
                              • Instruction ID: 1f2092c100b0f43b83a84451096ae8a93a897869bb4026a48c7cd8b7868a3bff
                              • Opcode Fuzzy Hash: 19628108cf6a53c6291a338649bac71fbe7e670d096e3d28584ff181f8cb4eb0
                              • Instruction Fuzzy Hash: 1A51D971188703F6EA3116958C4FF357655AB07BCCF30870AF79B644E1C5A2A950B717
                              APIs
                              • _free.LIBCMT ref: 00CB7D45
                                • Part of subcall function 00CB5D1D: IsProcessorFeaturePresent.KERNEL32(00000017,00CB5D0C,0000002C,00CC80C8,00CB8D62,00000000,00000000,00CB6391,?,?,00CB5D19,00000000,00000000,00000000,00000000,00000000), ref: 00CB5D1F
                                • Part of subcall function 00CB5D1D: GetCurrentProcess.KERNEL32(C0000417,00CC80C8,0000002C,00CB5A4A,00000016,00CB6391), ref: 00CB5D41
                                • Part of subcall function 00CB5D1D: TerminateProcess.KERNEL32(00000000), ref: 00CB5D48
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                              • String ID: *?$.
                              • API String ID: 2667617558-3972193922
                              • Opcode ID: 7b97f05bead931982e7a23c9cf534e270e960d3348eeadaf4e8a2cba3451af48
                              • Instruction ID: 8ab05096d1a019c61c1cbca98c802fa8ad88ebe688ef652bd794f91b49db173f
                              • Opcode Fuzzy Hash: 7b97f05bead931982e7a23c9cf534e270e960d3348eeadaf4e8a2cba3451af48
                              • Instruction Fuzzy Hash: D4518D75E0421AAFDF14DFA8C881AEDBBB5EF88310F24426EE854E7341E6719E019B50
                              APIs
                              • __EH_prolog.LIBCMT ref: 00C9761E
                              • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00C97799
                                • Part of subcall function 00C9A113: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00C99F49,?,?,?,00C99DE2,?,00000001,00000000,?,?), ref: 00C9A127
                                • Part of subcall function 00C9A113: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00C99F49,?,?,?,00C99DE2,?,00000001,00000000,?,?), ref: 00C9A158
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: File$Attributes$H_prologTime
                              • String ID: :
                              • API String ID: 1861295151-336475711
                              • Opcode ID: e94e9059ba028f7c5d74986681e47dd06579f3e9a8813d689b0c620e94af415c
                              • Instruction ID: 569352ad990af4656c8da192ce9391f80b4090367e33c5204b7a7c9d29d40360
                              • Opcode Fuzzy Hash: e94e9059ba028f7c5d74986681e47dd06579f3e9a8813d689b0c620e94af415c
                              • Instruction Fuzzy Hash: F641D271805618AADF25EBA4CC4DEEF777CEF44340F0001E9B605A2082DB709F85EBA0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID: UNC$\\?\
                              • API String ID: 0-253988292
                              • Opcode ID: d14dcceacae747a0e8f95bb9b3d3dd282b656024fe77861a2cea227da59c5f64
                              • Instruction ID: 28dd26ccf9f81319f60130fd306a7569482ac8b733a885f82f1ade804a14e316
                              • Opcode Fuzzy Hash: d14dcceacae747a0e8f95bb9b3d3dd282b656024fe77861a2cea227da59c5f64
                              • Instruction Fuzzy Hash: 5541C431400219FACF21AF21ED4DEEF77AAAF01350F50442AF86493052E7B0DE91FAA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID:
                              • String ID: Shell.Explorer$about:blank
                              • API String ID: 0-874089819
                              • Opcode ID: 2613f06992db16f6497492fa1fcb316b324325ae61260533d478b79b77657e11
                              • Instruction ID: 2807d10f139318c0c0c6224c90d486d8e267c6124b8e198954c488625ca597b9
                              • Opcode Fuzzy Hash: 2613f06992db16f6497492fa1fcb316b324325ae61260533d478b79b77657e11
                              • Instruction Fuzzy Hash: 9621AE75700607AFD7049F61C890E2AB768BF96718B18862DF5158B682CF75ED48CBA0
                              APIs
                                • Part of subcall function 00C9DF05: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00C9DF24
                                • Part of subcall function 00C9DF05: GetProcAddress.KERNEL32(00CD1E58,CryptUnprotectMemory), ref: 00C9DF34
                              • GetCurrentProcessId.KERNEL32(?,?,?,00C9DF7E), ref: 00C9E007
                              Strings
                              • CryptUnprotectMemory failed, xrefs: 00C9DFFF
                              • CryptProtectMemory failed, xrefs: 00C9DFC7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: AddressProc$CurrentProcess
                              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                              • API String ID: 2190909847-396321323
                              • Opcode ID: ff769b39e945794d3bbef85c2b0dc3e7b63a37a6e555def353fba7764d80d0c0
                              • Instruction ID: beac11b11187862889c805b2848a08c4f0de8edef4f119f17b88307149719743
                              • Opcode Fuzzy Hash: ff769b39e945794d3bbef85c2b0dc3e7b63a37a6e555def353fba7764d80d0c0
                              • Instruction Fuzzy Hash: 62113D31705251ABDF25DF79DC5DF6E3399EF94750B08402AFC12DB291DBA0EE00A290
                              APIs
                                • Part of subcall function 00C9CF27: GetWindowRect.USER32(?,?), ref: 00C9CF5E
                                • Part of subcall function 00C9CF27: GetClientRect.USER32(?,?), ref: 00C9CF6A
                                • Part of subcall function 00C9CF27: GetWindowLongW.USER32(?,000000F0), ref: 00C9D00B
                                • Part of subcall function 00C9CF27: GetWindowRect.USER32(?,?), ref: 00C9D038
                                • Part of subcall function 00C9CF27: GetWindowTextW.USER32(?,?,00000400), ref: 00C9D057
                              • GetDlgItem.USER32(00000000,00003021), ref: 00C9132B
                              • SetWindowTextW.USER32(00000000,00CC02E4), ref: 00C91341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: Window$Rect$Text$ClientItemLong
                              • String ID: 0
                              • API String ID: 660763476-4108050209
                              • Opcode ID: da1c46cb562b5945d15e225eea184efbf41317fc6831b257765733a4656419e8
                              • Instruction ID: 8cd5b92961c953db7d192ba6e75e068f09ae94e9403ed6789ba61632f0f30903
                              • Opcode Fuzzy Hash: da1c46cb562b5945d15e225eea184efbf41317fc6831b257765733a4656419e8
                              • Instruction Fuzzy Hash: 3CF03CB154024DABDF251EA1C81EFB93B6AAB04749F4C8058FD58948A1CB74CA91AB14
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,00C9FCF9,?,?,00C9FD6E,?,?,?,?,?,00C9FD58), ref: 00C9FB1F
                              • GetLastError.KERNEL32(?,?,00C9FD6E,?,?,?,?,?,00C9FD58), ref: 00C9FB2B
                                • Part of subcall function 00C96D8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C96DAD
                              Strings
                              • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00C9FB34
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                              • String ID: WaitForMultipleObjects error %d, GetLastError %d
                              • API String ID: 1091760877-2248577382
                              • Opcode ID: 7b4a85aa499ffa8d1e7115480cd474bb1c706cf16daceea7f34c4f53e1ee2940
                              • Instruction ID: ee63295e335712fbea30dbb406e8f24beee79dbf52ac8486e3d57b8495f7d975
                              • Opcode Fuzzy Hash: 7b4a85aa499ffa8d1e7115480cd474bb1c706cf16daceea7f34c4f53e1ee2940
                              • Instruction Fuzzy Hash: 6CD05E72608430A7DE012768DC1EFAE3904AB52775F35076DF139A52E1CA204D8256A1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2034515073.0000000000C91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C90000, based on PE: true
                              • Associated: 00000000.00000002.2034490465.0000000000C90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034551748.0000000000CC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034645673.0000000000CEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2034720791.0000000000CEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_c90000_vkXe5gkY34.jbxd
                              Similarity
                              • API ID: CommandLine
                              • String ID: %n
                              • API String ID: 3253501508-2798127140
                              • Opcode ID: ef245288248d0039b4dd4f60eb5b372277616b5ca7c457084c401e58cfa9f1fa
                              • Instruction ID: 57c374167a471236965fa9adf293d9d69997767f9f24df7b183076a21513e402
                              • Opcode Fuzzy Hash: ef245288248d0039b4dd4f60eb5b372277616b5ca7c457084c401e58cfa9f1fa
                              • Instruction Fuzzy Hash: 73B04878800240CB87008F61F88D71D7BE0B2087023A01055D4018A770DB388408AF01

                              Execution Graph

                              Execution Coverage:11.4%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1510
                              Total number of Limit Nodes:25
                              execution_graph 23868 631067 75 API calls pre_c_initialization 23919 648962 GdipDisposeImage GdipFree __except_handler4 23941 650e6a 48 API calls 21994 654e74 22005 658549 21994->22005 22000 654e9c 22022 6559b2 22000->22022 22001 6559b2 _free 20 API calls 22002 654ec6 22001->22002 22004 654e91 22004->22001 22006 654e86 22005->22006 22007 658552 22005->22007 22009 6589a0 GetEnvironmentStringsW 22006->22009 22028 658448 22007->22028 22010 6589b7 22009->22010 22020 658a0a 22009->22020 22013 6589bd WideCharToMultiByte 22010->22013 22011 658a13 FreeEnvironmentStringsW 22012 654e8b 22011->22012 22012->22004 22021 654ecc 26 API calls 3 library calls 22012->22021 22014 6589d9 22013->22014 22013->22020 22015 6559ec __vswprintf_c_l 21 API calls 22014->22015 22016 6589df 22015->22016 22017 6589e6 WideCharToMultiByte 22016->22017 22018 6589fc 22016->22018 22017->22018 22019 6559b2 _free 20 API calls 22018->22019 22019->22020 22020->22011 22020->22012 22021->22000 22023 6559bd RtlFreeHeap 22022->22023 22024 6559e6 __dosmaperr 22022->22024 22023->22024 22025 6559d2 22023->22025 22024->22004 22215 655e2e 20 API calls _abort 22025->22215 22027 6559d8 GetLastError 22027->22024 22048 65630e GetLastError 22028->22048 22030 658455 22069 658567 22030->22069 22032 65845d 22078 6581dc 22032->22078 22035 658474 22035->22006 22039 6559b2 _free 20 API calls 22039->22035 22041 6584b2 22102 655e2e 20 API calls _abort 22041->22102 22043 6584b7 22043->22039 22044 6584cf 22045 6559b2 _free 20 API calls 22044->22045 22047 6584fb 22044->22047 22045->22047 22047->22043 22103 6580b2 26 API calls 22047->22103 22049 656324 22048->22049 22050 656330 22048->22050 22104 6578e9 11 API calls 2 library calls 22049->22104 22105 655a7d 20 API calls 3 library calls 22050->22105 22053 65633c 22056 656344 22053->22056 22106 65793f 11 API calls 2 library calls 22053->22106 22054 65632a 22054->22050 22055 656379 SetLastError 22054->22055 22055->22030 22058 6559b2 _free 20 API calls 22056->22058 22060 65634a 22058->22060 22059 656359 22059->22056 22061 656360 22059->22061 22062 656385 SetLastError 22060->22062 22107 656180 20 API calls _abort 22061->22107 22108 655a3a 38 API calls _abort 22062->22108 22065 65636b 22067 6559b2 _free 20 API calls 22065->22067 22068 656372 22067->22068 22068->22055 22068->22062 22070 658573 ___FrameUnwindToState 22069->22070 22071 65630e _abort 38 API calls 22070->22071 22073 65857d 22071->22073 22076 658601 ___FrameUnwindToState 22073->22076 22077 6559b2 _free 20 API calls 22073->22077 22109 655a3a 38 API calls _abort 22073->22109 22110 6576c7 EnterCriticalSection 22073->22110 22111 6585f8 LeaveCriticalSection _abort 22073->22111 22076->22032 22077->22073 22112 652626 22078->22112 22081 6581fd GetOEMCP 22083 658226 22081->22083 22082 65820f 22082->22083 22084 658214 GetACP 22082->22084 22083->22035 22085 6559ec 22083->22085 22084->22083 22086 655a2a 22085->22086 22090 6559fa _abort 22085->22090 22123 655e2e 20 API calls _abort 22086->22123 22087 655a15 RtlAllocateHeap 22089 655a28 22087->22089 22087->22090 22089->22043 22092 658609 22089->22092 22090->22086 22090->22087 22122 654689 7 API calls 2 library calls 22090->22122 22093 6581dc 40 API calls 22092->22093 22094 658628 22093->22094 22095 65869e ___scrt_fastfail 22094->22095 22098 658679 IsValidCodePage 22094->22098 22100 65862f 22094->22100 22124 6582b4 GetCPInfo 22095->22124 22097 6584aa 22097->22041 22097->22044 22099 65868b GetCPInfo 22098->22099 22098->22100 22099->22095 22099->22100 22134 64d763 22100->22134 22102->22043 22103->22043 22104->22054 22105->22053 22106->22059 22107->22065 22110->22073 22111->22073 22113 652643 22112->22113 22114 652639 22112->22114 22113->22114 22115 65630e _abort 38 API calls 22113->22115 22114->22081 22114->22082 22116 652664 22115->22116 22120 65645d 38 API calls __fassign 22116->22120 22118 65267d 22121 65648a 38 API calls __fassign 22118->22121 22120->22118 22121->22114 22122->22090 22123->22089 22125 658398 22124->22125 22131 6582ee 22124->22131 22128 64d763 CatchGuardHandler 5 API calls 22125->22128 22130 658444 22128->22130 22130->22100 22141 6593e4 22131->22141 22133 6575bc __vswprintf_c_l 43 API calls 22133->22125 22135 64d76c 22134->22135 22136 64d76e IsProcessorFeaturePresent 22134->22136 22135->22097 22138 64dd57 22136->22138 22214 64dd1b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22138->22214 22140 64de3a 22140->22097 22142 652626 __fassign 38 API calls 22141->22142 22143 659404 MultiByteToWideChar 22142->22143 22145 659442 22143->22145 22146 6594da 22143->22146 22149 6559ec __vswprintf_c_l 21 API calls 22145->22149 22151 659463 __vswprintf_c_l ___scrt_fastfail 22145->22151 22147 64d763 CatchGuardHandler 5 API calls 22146->22147 22150 65834f 22147->22150 22148 6594d4 22160 657607 20 API calls _free 22148->22160 22149->22151 22155 6575bc 22150->22155 22151->22148 22153 6594a8 MultiByteToWideChar 22151->22153 22153->22148 22154 6594c4 GetStringTypeW 22153->22154 22154->22148 22156 652626 __fassign 38 API calls 22155->22156 22157 6575cf 22156->22157 22161 65739f 22157->22161 22160->22146 22162 6573ba __vswprintf_c_l 22161->22162 22163 6573e0 MultiByteToWideChar 22162->22163 22164 657594 22163->22164 22165 65740a 22163->22165 22166 64d763 CatchGuardHandler 5 API calls 22164->22166 22169 6559ec __vswprintf_c_l 21 API calls 22165->22169 22171 65742b __vswprintf_c_l 22165->22171 22167 6575a7 22166->22167 22167->22133 22168 657474 MultiByteToWideChar 22170 65748d 22168->22170 22187 6574e0 22168->22187 22169->22171 22188 6579fa 22170->22188 22171->22168 22171->22187 22175 6574b7 22179 6579fa __vswprintf_c_l 11 API calls 22175->22179 22175->22187 22176 6574ef 22177 657510 __vswprintf_c_l 22176->22177 22178 6559ec __vswprintf_c_l 21 API calls 22176->22178 22180 657585 22177->22180 22182 6579fa __vswprintf_c_l 11 API calls 22177->22182 22178->22177 22179->22187 22196 657607 20 API calls _free 22180->22196 22183 657564 22182->22183 22183->22180 22184 657573 WideCharToMultiByte 22183->22184 22184->22180 22185 6575b3 22184->22185 22198 657607 20 API calls _free 22185->22198 22197 657607 20 API calls _free 22187->22197 22199 657726 22188->22199 22192 657a6a LCMapStringW 22193 657a2a 22192->22193 22194 64d763 CatchGuardHandler 5 API calls 22193->22194 22195 6574a4 22194->22195 22195->22175 22195->22176 22195->22187 22196->22187 22197->22164 22198->22187 22200 657756 22199->22200 22204 657752 22199->22204 22200->22193 22206 657a82 10 API calls 3 library calls 22200->22206 22201 657776 22201->22200 22203 657782 GetProcAddress 22201->22203 22205 657792 __crt_fast_encode_pointer 22203->22205 22204->22200 22204->22201 22207 6577c2 22204->22207 22205->22200 22206->22192 22208 6577e3 LoadLibraryExW 22207->22208 22209 6577d8 22207->22209 22210 657800 GetLastError 22208->22210 22211 657818 22208->22211 22209->22204 22210->22211 22212 65780b LoadLibraryExW 22210->22212 22211->22209 22213 65782f FreeLibrary 22211->22213 22212->22211 22213->22209 22214->22140 22215->22027 23969 65d774 IsProcessorFeaturePresent 22217 64b076 22219 64b07b 22217->22219 22231 64aa98 _wcsrchr 22217->22231 22219->22231 22243 64b9a9 22219->22243 22221 64b641 22223 64ad85 SetWindowTextW 22223->22231 22228 64ab76 SetFileAttributesW 22230 64ab69 ___scrt_fastfail 22228->22230 22232 64ac31 GetFileAttributesW 22228->22232 22230->22228 22230->22231 22230->22232 22236 64af4f GetDlgItem SetWindowTextW SendMessageW 22230->22236 22238 64af91 SendMessageW 22230->22238 22272 63b150 52 API calls 2 library calls 22230->22272 22273 633f2b 22230->22273 22276 63a1f9 7 API calls 22230->22276 22231->22221 22231->22223 22231->22230 22242 640b00 CompareStringW 22231->22242 22266 6496eb 22231->22266 22270 648b8d GetCurrentDirectoryW 22231->22270 22271 63a1f9 7 API calls 22231->22271 22277 63a182 FindClose 22231->22277 22278 649843 69 API calls new 22231->22278 22279 6520ce 22231->22279 22232->22230 22234 64ac3f DeleteFileW 22232->22234 22234->22230 22236->22230 22238->22231 22240 64ac85 MoveFileW 22240->22230 22241 64ac9d MoveFileExW 22240->22241 22241->22230 22242->22231 22245 64b9b3 ___scrt_fastfail 22243->22245 22244 64bc0b 22244->22231 22245->22244 22246 64ba9e 22245->22246 22295 640b00 CompareStringW 22245->22295 22292 639e4f 22246->22292 22250 64bad2 ShellExecuteExW 22250->22244 22257 64bae5 22250->22257 22252 64baca 22252->22250 22253 64bb20 22297 64be68 WaitForSingleObject PeekMessageW WaitForSingleObject 22253->22297 22254 64bb76 CloseHandle 22255 64bb84 22254->22255 22256 64bb8f 22254->22256 22298 640b00 CompareStringW 22255->22298 22256->22244 22262 64bc06 ShowWindow 22256->22262 22257->22253 22257->22254 22259 64bb1a ShowWindow 22257->22259 22259->22253 22261 64bb38 22261->22254 22263 64bb4b GetExitCodeProcess 22261->22263 22262->22244 22263->22254 22264 64bb5e 22263->22264 22264->22254 22267 6496f5 22266->22267 22268 6497a8 ExpandEnvironmentStringsW 22267->22268 22269 6497cb 22267->22269 22268->22269 22269->22231 22270->22231 22271->22231 22272->22230 22322 633efe 22273->22322 22276->22230 22277->22231 22278->22231 22280 655ada 22279->22280 22281 655ae7 22280->22281 22282 655af2 22280->22282 22283 6559ec __vswprintf_c_l 21 API calls 22281->22283 22284 655afa 22282->22284 22290 655b03 _abort 22282->22290 22288 655aef 22283->22288 22285 6559b2 _free 20 API calls 22284->22285 22285->22288 22286 655b2d HeapReAlloc 22286->22288 22286->22290 22287 655b08 22351 655e2e 20 API calls _abort 22287->22351 22288->22231 22290->22286 22290->22287 22352 654689 7 API calls 2 library calls 22290->22352 22299 639e63 22292->22299 22295->22246 22296 63ae70 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 22296->22252 22297->22261 22298->22256 22307 64cec0 22299->22307 22302 639e81 22309 63b2c5 22302->22309 22303 639e58 22303->22250 22303->22296 22305 639e95 22305->22303 22306 639e99 GetFileAttributesW 22305->22306 22306->22303 22308 639e70 GetFileAttributesW 22307->22308 22308->22302 22308->22303 22310 63b2d2 22309->22310 22318 63b2dc 22310->22318 22319 63b45f CharUpperW 22310->22319 22312 63b2eb 22320 63b48b CharUpperW 22312->22320 22314 63b2fa 22315 63b375 GetCurrentDirectoryW 22314->22315 22316 63b2fe 22314->22316 22315->22318 22321 63b45f CharUpperW 22316->22321 22318->22305 22319->22312 22320->22314 22321->22318 22323 633f15 ___scrt_initialize_default_local_stdio_options 22322->22323 22326 6534cd 22323->22326 22329 6521ab 22326->22329 22330 6521d3 22329->22330 22331 6521eb 22329->22331 22346 655e2e 20 API calls _abort 22330->22346 22331->22330 22333 6521f3 22331->22333 22335 652626 __fassign 38 API calls 22333->22335 22334 6521d8 22347 655d0d 26 API calls _abort 22334->22347 22337 652203 22335->22337 22348 6525f1 20 API calls 2 library calls 22337->22348 22338 6521e3 22339 64d763 CatchGuardHandler 5 API calls 22338->22339 22341 633f1f GetFileAttributesW 22339->22341 22341->22230 22341->22240 22342 65227b 22349 65282c 51 API calls 3 library calls 22342->22349 22345 652286 22350 6526a9 20 API calls _free 22345->22350 22346->22334 22347->22338 22348->22342 22349->22345 22350->22338 22351->22288 22352->22290 23971 654b7a 52 API calls 3 library calls 23943 649645 92 API calls 23875 63604b 73 API calls 22956 649b4e 22957 649b58 __EH_prolog 22956->22957 23116 6312e7 22957->23116 22960 64a22f 23189 64b8bb 22960->23189 22961 649b9a 22964 649ba7 22961->22964 22965 649c10 22961->22965 23022 649b86 22961->23022 22969 649bac 22964->22969 23099 649be3 22964->23099 22968 649caf GetDlgItemTextW 22965->22968 22973 649c2a 22965->22973 22966 64a24d SendMessageW 22967 64a25b 22966->22967 22971 64a264 SendDlgItemMessageW 22967->22971 22972 64a275 GetDlgItem SendMessageW 22967->22972 22970 649ce6 22968->22970 22968->23099 22978 63d192 54 API calls 22969->22978 22969->23022 22976 649cfe GetDlgItem 22970->22976 23113 649cef 22970->23113 22971->22972 23207 648b8d GetCurrentDirectoryW 22972->23207 22977 63d192 54 API calls 22973->22977 22974 649c04 KiUserCallbackDispatcher 22974->23022 22980 649d12 SendMessageW SendMessageW 22976->22980 22981 649d38 SetFocus 22976->22981 22982 649c4c SetDlgItemTextW 22977->22982 22983 649bc6 22978->22983 22979 64a2a7 GetDlgItem 22984 64a2c6 SetWindowTextW 22979->22984 22985 64a2c0 22979->22985 22980->22981 22987 649d48 22981->22987 22998 649d54 22981->22998 22986 649c5a 22982->22986 23227 631227 SHGetMalloc 22983->23227 23208 648fc7 GetClassNameW 22984->23208 22985->22984 22995 649c67 GetMessageW 22986->22995 23006 649c8d TranslateMessage DispatchMessageW 22986->23006 22986->23022 22992 63d192 54 API calls 22987->22992 22989 649bcd 22993 649bd1 SetDlgItemTextW 22989->22993 22989->23022 22990 64a1cf 22994 63d192 54 API calls 22990->22994 22997 649d52 22992->22997 22993->23022 22999 64a1df SetDlgItemTextW 22994->22999 22995->22986 22995->23022 23126 64b70d GetDlgItem 22997->23126 23004 63d192 54 API calls 22998->23004 23001 64a1f3 22999->23001 23009 63d192 54 API calls 23001->23009 23008 649d86 23004->23008 23005 649da9 23134 639d1e 23005->23134 23006->22986 23007 64a311 23011 64a341 23007->23011 23015 63d192 54 API calls 23007->23015 23012 633f2b _swprintf 51 API calls 23008->23012 23013 64a21c 23009->23013 23010 64aa44 91 API calls 23010->23007 23021 64aa44 91 API calls 23011->23021 23051 64a3f9 23011->23051 23012->22997 23016 63d192 54 API calls 23013->23016 23020 64a324 SetDlgItemTextW 23015->23020 23016->23022 23018 649dde GetLastError 23019 649de5 23018->23019 23140 649022 SetCurrentDirectoryW 23019->23140 23027 63d192 54 API calls 23020->23027 23028 64a35c 23021->23028 23023 64a4a9 23024 64a4b2 EnableWindow 23023->23024 23025 64a4bb 23023->23025 23024->23025 23029 64a4d8 23025->23029 23238 6312a4 GetDlgItem EnableWindow 23025->23238 23031 64a338 SetDlgItemTextW 23027->23031 23037 64a36e 23028->23037 23052 64a393 23028->23052 23036 64a4ff 23029->23036 23044 64a4f7 SendMessageW 23029->23044 23030 649dfb 23034 649e04 GetLastError 23030->23034 23035 649e0e 23030->23035 23031->23011 23033 64a3ec 23039 64aa44 91 API calls 23033->23039 23034->23035 23043 649e89 23035->23043 23048 649e99 23035->23048 23049 649e26 GetTickCount 23035->23049 23036->23022 23045 63d192 54 API calls 23036->23045 23236 64859b 6 API calls 23037->23236 23038 64a4ce 23239 6312a4 GetDlgItem EnableWindow 23038->23239 23039->23051 23041 64a387 23041->23052 23047 64a0d2 23043->23047 23043->23048 23044->23036 23046 64a518 SetDlgItemTextW 23045->23046 23046->23022 23149 6312c2 GetDlgItem ShowWindow 23047->23149 23054 649eb1 GetModuleFileNameW 23048->23054 23055 64a06d 23048->23055 23056 633f2b _swprintf 51 API calls 23049->23056 23050 64a487 23237 64859b 6 API calls 23050->23237 23051->23023 23051->23050 23058 63d192 54 API calls 23051->23058 23052->23033 23059 64aa44 91 API calls 23052->23059 23228 63decc 23054->23228 23067 63d192 54 API calls 23055->23067 23055->23099 23062 649e43 23056->23062 23058->23051 23064 64a3c1 23059->23064 23060 64a0e2 23150 6312c2 GetDlgItem ShowWindow 23060->23150 23141 639541 23062->23141 23063 64a4a6 23063->23023 23064->23033 23068 64a3ca DialogBoxParamW 23064->23068 23071 64a081 23067->23071 23068->23033 23068->23099 23069 64a0ec 23074 63d192 54 API calls 23069->23074 23070 633f2b _swprintf 51 API calls 23075 649efd CreateFileMappingW 23070->23075 23072 633f2b _swprintf 51 API calls 23071->23072 23076 64a09f 23072->23076 23078 64a0f6 SetDlgItemTextW 23074->23078 23079 649fdc __vswprintf_c_l 23075->23079 23080 649f5f GetCommandLineW 23075->23080 23092 63d192 54 API calls 23076->23092 23077 649e69 23082 649e70 GetLastError 23077->23082 23083 649e77 23077->23083 23151 6312c2 GetDlgItem ShowWindow 23078->23151 23084 649fe7 ShellExecuteExW 23079->23084 23081 649f70 23080->23081 23232 6497e3 SHGetMalloc 23081->23232 23082->23083 23088 639487 72 API calls 23083->23088 23103 64a004 23084->23103 23086 64a10a SetDlgItemTextW GetDlgItem 23089 64a123 GetWindowLongW SetWindowLongW 23086->23089 23090 64a13b 23086->23090 23088->23043 23089->23090 23152 64aa44 23090->23152 23091 649f8c 23233 6497e3 SHGetMalloc 23091->23233 23092->23099 23096 649f98 23234 6497e3 SHGetMalloc 23096->23234 23097 64aa44 91 API calls 23100 64a157 23097->23100 23099->22974 23099->23022 23177 64bc77 23100->23177 23101 649fa4 23105 63e030 73 API calls 23101->23105 23102 64a047 23102->23055 23106 64a05d UnmapViewOfFile CloseHandle 23102->23106 23103->23102 23109 64a033 Sleep 23103->23109 23108 649fbb MapViewOfFile 23105->23108 23106->23055 23108->23079 23109->23102 23109->23103 23113->22990 23113->23099 23117 6312f0 23116->23117 23118 631349 23116->23118 23120 631356 23117->23120 23240 63cf27 23117->23240 23258 63cf00 GetWindowLongW SetWindowLongW 23118->23258 23120->22960 23120->22961 23120->23022 23123 631325 GetDlgItem 23123->23120 23124 631335 23123->23124 23124->23120 23125 63133b SetWindowTextW 23124->23125 23125->23120 23127 64b769 SendMessageW SendMessageW 23126->23127 23128 64b739 23126->23128 23129 64b7c0 SendMessageW SendMessageW SendMessageW 23127->23129 23130 64b7a1 23127->23130 23133 64b744 ShowWindow SendMessageW SendMessageW 23128->23133 23131 64b80a SendMessageW 23129->23131 23132 64b7eb SendMessageW 23129->23132 23130->23129 23131->23005 23132->23131 23133->23127 23135 639d28 23134->23135 23136 639de2 23135->23136 23137 639db9 23135->23137 23262 639ed6 23135->23262 23136->23018 23136->23019 23137->23136 23138 639ed6 9 API calls 23137->23138 23138->23136 23140->23030 23142 63954b 23141->23142 23143 6395b5 CreateFileW 23142->23143 23144 6395a9 23142->23144 23143->23144 23145 639607 23144->23145 23146 63b2c5 2 API calls 23144->23146 23145->23077 23147 6395ee 23146->23147 23147->23145 23148 6395f2 CreateFileW 23147->23148 23148->23145 23149->23060 23150->23069 23151->23086 23153 64aa4e __EH_prolog 23152->23153 23154 64a149 23153->23154 23155 6496eb ExpandEnvironmentStringsW 23153->23155 23154->23097 23166 64aa85 _wcsrchr 23155->23166 23157 6496eb ExpandEnvironmentStringsW 23157->23166 23158 64ad85 SetWindowTextW 23158->23166 23161 6520ce 22 API calls 23161->23166 23163 64ab76 SetFileAttributesW 23165 64ab69 ___scrt_fastfail 23163->23165 23167 64ac31 GetFileAttributesW 23163->23167 23165->23163 23165->23166 23165->23167 23171 64af4f GetDlgItem SetWindowTextW SendMessageW 23165->23171 23172 633f2b _swprintf 51 API calls 23165->23172 23173 64af91 SendMessageW 23165->23173 23286 63b150 52 API calls 2 library calls 23165->23286 23287 63a1f9 7 API calls 23165->23287 23166->23154 23166->23157 23166->23158 23166->23161 23166->23165 23283 640b00 CompareStringW 23166->23283 23284 648b8d GetCurrentDirectoryW 23166->23284 23285 63a1f9 7 API calls 23166->23285 23288 63a182 FindClose 23166->23288 23289 649843 69 API calls new 23166->23289 23167->23165 23169 64ac3f DeleteFileW 23167->23169 23169->23165 23171->23165 23174 64ac74 GetFileAttributesW 23172->23174 23173->23166 23174->23165 23175 64ac85 MoveFileW 23174->23175 23175->23165 23176 64ac9d MoveFileExW 23175->23176 23176->23165 23178 64bc81 __EH_prolog 23177->23178 23290 63f1b7 69 API calls 23178->23290 23180 64bcb2 23291 635b87 69 API calls 23180->23291 23182 64bcd0 23292 637b10 73 API calls 2 library calls 23182->23292 23184 64bd14 23293 637c84 23184->23293 23186 64bd23 23302 637ba0 23186->23302 23190 64b8c8 23189->23190 23191 648abf 6 API calls 23190->23191 23192 64b8cd 23191->23192 23193 64b8d5 GetWindow 23192->23193 23194 64a235 23192->23194 23193->23194 23197 64b8f1 23193->23197 23194->22966 23194->22967 23195 64b8fe GetClassNameW 23807 640b00 CompareStringW 23195->23807 23197->23194 23197->23195 23198 64b926 GetWindowLongW 23197->23198 23199 64b987 GetWindow 23197->23199 23198->23199 23200 64b936 SendMessageW 23198->23200 23199->23194 23199->23197 23200->23199 23201 64b94c GetObjectW 23200->23201 23808 648b21 GetDC GetDeviceCaps ReleaseDC 23201->23808 23203 64b961 23809 648ade GetDC GetDeviceCaps ReleaseDC 23203->23809 23810 648cf2 8 API calls ___scrt_fastfail 23203->23810 23206 64b971 SendMessageW DeleteObject 23206->23199 23207->22979 23209 64900d 23208->23209 23210 648fe8 23208->23210 23214 649484 23209->23214 23811 640b00 CompareStringW 23210->23811 23212 648ffb 23212->23209 23213 648fff FindWindowExW 23212->23213 23213->23209 23215 64948e __EH_prolog 23214->23215 23216 6313af 75 API calls 23215->23216 23217 6494b0 23216->23217 23812 631f0e 23217->23812 23220 6494d9 23223 631927 126 API calls 23220->23223 23221 6494ca 23222 63165f 79 API calls 23221->23222 23224 6494d5 23222->23224 23225 6494fb __vswprintf_c_l new 23223->23225 23224->23007 23224->23010 23226 63165f 79 API calls 23225->23226 23226->23224 23227->22989 23229 63ded5 23228->23229 23230 63deee 23228->23230 23231 63df43 73 API calls 23229->23231 23230->23070 23231->23230 23232->23091 23233->23096 23234->23101 23236->23041 23237->23063 23238->23038 23239->23029 23259 63c8de 23240->23259 23242 63cf4d GetWindowRect GetClientRect 23243 63d042 23242->23243 23247 63cfa7 23242->23247 23244 63d084 GetSystemMetrics GetWindow 23243->23244 23245 63d04c GetWindowTextW 23243->23245 23257 63d0a4 23244->23257 23246 63c96f 52 API calls 23245->23246 23250 63d078 SetWindowTextW 23246->23250 23247->23244 23248 63d008 GetWindowLongW 23247->23248 23252 63d032 GetWindowRect 23248->23252 23249 631312 23249->23120 23249->23123 23250->23244 23251 63d0b0 GetWindowTextW 23251->23257 23252->23243 23253 63d0f6 GetWindowRect 23254 63d16b GetWindow 23253->23254 23254->23249 23254->23257 23255 63c96f 52 API calls 23256 63d0e3 SetWindowTextW 23255->23256 23256->23257 23257->23249 23257->23251 23257->23253 23257->23254 23257->23255 23258->23120 23260 63c96f 52 API calls 23259->23260 23261 63c906 _wcschr 23260->23261 23261->23242 23263 639ee3 23262->23263 23264 639f07 23263->23264 23265 639efa CreateDirectoryW 23263->23265 23266 639e4f 4 API calls 23264->23266 23265->23264 23267 639f3a 23265->23267 23268 639f0d 23266->23268 23272 639f49 23267->23272 23275 63a113 23267->23275 23269 639f4d GetLastError 23268->23269 23270 63b2c5 2 API calls 23268->23270 23269->23272 23273 639f23 23270->23273 23272->23135 23273->23269 23274 639f27 CreateDirectoryW 23273->23274 23274->23267 23274->23269 23276 64cec0 23275->23276 23277 63a120 SetFileAttributesW 23276->23277 23278 63a163 23277->23278 23279 63a136 23277->23279 23278->23272 23280 63b2c5 2 API calls 23279->23280 23281 63a14a 23280->23281 23281->23278 23282 63a14e SetFileAttributesW 23281->23282 23282->23278 23283->23166 23284->23166 23285->23166 23286->23165 23287->23165 23288->23166 23289->23166 23290->23180 23291->23182 23292->23184 23294 637c8e 23293->23294 23296 637cf8 23294->23296 23328 63a195 23294->23328 23297 637d62 23296->23297 23299 63a195 8 API calls 23296->23299 23306 6381ed 23296->23306 23300 637da4 23297->23300 23334 63135c 67 API calls 23297->23334 23299->23296 23300->23186 23303 637bb5 23302->23303 23304 637bae 23302->23304 23305 640e0f 79 API calls 23304->23305 23305->23303 23307 6381f7 __EH_prolog 23306->23307 23335 6313af 23307->23335 23309 638212 23343 639bf2 23309->23343 23315 638241 23463 63165f 23315->23463 23316 6382dc 23362 638385 23316->23362 23320 63833c 23366 631ebf 23320->23366 23323 63823d 23323->23315 23323->23316 23326 63a195 8 API calls 23323->23326 23467 63b71b CompareStringW 23323->23467 23324 638347 23324->23315 23370 633a0d 23324->23370 23380 6383eb 23324->23380 23326->23323 23329 63a1aa 23328->23329 23330 63a1ae 23329->23330 23795 63a2c3 23329->23795 23330->23294 23332 63a1be 23332->23330 23333 63a1c3 FindClose 23332->23333 23333->23330 23334->23300 23336 6313b4 __EH_prolog 23335->23336 23469 63c463 23336->23469 23338 6313eb 23342 631444 ___scrt_fastfail 23338->23342 23475 64cdac 23338->23475 23341 63acb6 75 API calls 23341->23342 23342->23309 23344 639bfd 23343->23344 23345 638228 23344->23345 23484 636e22 67 API calls 23344->23484 23345->23315 23347 6319e2 23345->23347 23348 6319ec __EH_prolog 23347->23348 23355 631a2e 23348->23355 23360 631a15 23348->23360 23485 63138d 23348->23485 23350 631b47 23488 63135c 67 API calls 23350->23488 23352 633a0d 90 API calls 23357 631b9e 23352->23357 23353 631b57 23353->23352 23353->23360 23354 631be8 23354->23360 23361 631c1b 23354->23361 23489 63135c 67 API calls 23354->23489 23355->23350 23355->23353 23355->23360 23357->23354 23358 633a0d 90 API calls 23357->23358 23358->23357 23359 633a0d 90 API calls 23359->23361 23360->23323 23361->23359 23361->23360 23364 638392 23362->23364 23507 63ffa6 GetSystemTime SystemTimeToFileTime 23364->23507 23365 6382f6 23365->23320 23468 6406b6 65 API calls 23365->23468 23368 631ec4 __EH_prolog 23366->23368 23367 631ef8 23367->23324 23368->23367 23509 631927 23368->23509 23371 633a19 23370->23371 23372 633a1d 23370->23372 23371->23324 23373 633a4a 23372->23373 23374 633a3c 23372->23374 23736 632759 90 API calls 3 library calls 23373->23736 23375 633a7c 23374->23375 23735 6331f0 78 API calls 3 library calls 23374->23735 23375->23324 23378 633a48 23378->23375 23737 631fbf 67 API calls 23378->23737 23381 6383f5 __EH_prolog 23380->23381 23382 63842e 23381->23382 23412 638432 23381->23412 23761 6477e6 93 API calls 23381->23761 23383 638457 23382->23383 23389 6384e0 23382->23389 23382->23412 23384 638479 23383->23384 23383->23412 23762 637a2f 150 API calls 23383->23762 23384->23412 23763 6477e6 93 API calls 23384->23763 23389->23412 23738 635d68 23389->23738 23390 63856b 23390->23412 23746 6380da 23390->23746 23393 6386cf 23394 63a195 8 API calls 23393->23394 23395 638734 23393->23395 23394->23395 23750 637c11 23395->23750 23397 63c5cd 73 API calls 23401 63878f _memcmp 23397->23401 23398 6388b9 23399 63898c 23398->23399 23406 638908 23398->23406 23404 6389e7 23399->23404 23416 638997 23399->23416 23400 6388b2 23766 63135c 67 API calls 23400->23766 23401->23397 23401->23398 23401->23400 23401->23412 23764 6380a6 75 API calls 23401->23764 23765 63135c 67 API calls 23401->23765 23415 638979 23404->23415 23769 637f88 89 API calls 23404->23769 23405 6389e5 23409 639487 72 API calls 23405->23409 23410 639e4f 4 API calls 23406->23410 23406->23415 23407 639005 23408 639487 72 API calls 23407->23408 23408->23412 23409->23412 23413 638940 23410->23413 23412->23324 23413->23415 23767 6391b1 89 API calls 23413->23767 23414 638a52 23414->23407 23418 63976a GetFileType 23414->23418 23427 638abd 23414->23427 23415->23405 23415->23414 23416->23405 23768 637dc4 93 API calls __except_handler4 23416->23768 23417 63a6f9 8 API calls 23420 638b0c 23417->23420 23422 638a95 23418->23422 23423 63a6f9 8 API calls 23420->23423 23422->23427 23770 636f5f 67 API calls 23422->23770 23432 638b22 23423->23432 23425 638aab 23771 636f23 68 API calls 23425->23771 23427->23417 23428 638be5 23429 638c40 23428->23429 23430 638d46 23428->23430 23431 638cb2 23429->23431 23434 638c50 23429->23434 23435 638d58 23430->23435 23436 638d6c 23430->23436 23451 638c70 23430->23451 23433 6380da CharUpperW 23431->23433 23432->23428 23772 6398b9 SetFilePointer GetLastError SetEndOfFile 23432->23772 23438 638ccd 23433->23438 23439 638c96 23434->23439 23445 638c5e 23434->23445 23440 639120 119 API calls 23435->23440 23437 641fa8 68 API calls 23436->23437 23441 638d85 23437->23441 23446 638cf6 23438->23446 23447 638cfd 23438->23447 23438->23451 23439->23451 23774 6377d4 101 API calls 23439->23774 23440->23451 23443 641c3f 119 API calls 23441->23443 23443->23451 23773 636f5f 67 API calls 23445->23773 23775 637586 77 API calls __except_handler4 23446->23775 23776 63905e 85 API calls __EH_prolog 23447->23776 23454 638e94 23451->23454 23777 636f5f 67 API calls 23451->23777 23453 638f2b 23756 639a62 23453->23756 23454->23407 23454->23453 23778 639bba SetEndOfFile 23454->23778 23457 638f85 23458 6394f3 68 API calls 23457->23458 23459 638f90 23458->23459 23459->23407 23460 63a113 4 API calls 23459->23460 23461 638fef 23460->23461 23461->23407 23779 636f5f 67 API calls 23461->23779 23464 631671 23463->23464 23794 63c506 79 API calls 23464->23794 23467->23323 23468->23320 23470 63c46d __EH_prolog 23469->23470 23471 64cdac new 8 API calls 23470->23471 23472 63c4b0 23471->23472 23473 64cdac new 8 API calls 23472->23473 23474 63c4d4 23473->23474 23474->23338 23476 64cdb1 new 23475->23476 23477 631431 23476->23477 23481 654689 7 API calls 2 library calls 23476->23481 23482 64d7dc RaiseException __CxxThrowException@8 new 23476->23482 23483 64d7bf RaiseException Concurrency::cancel_current_task __CxxThrowException@8 23476->23483 23477->23341 23477->23342 23481->23476 23484->23345 23490 631736 23485->23490 23487 6313a9 23487->23355 23488->23360 23489->23361 23491 63174c 23490->23491 23502 6317a4 __vswprintf_c_l 23490->23502 23492 631775 23491->23492 23503 636d8f 67 API calls __vswprintf_c_l 23491->23503 23493 6317cb 23492->23493 23499 631791 new 23492->23499 23496 6520ce 22 API calls 23493->23496 23495 63176b 23504 636dc7 68 API calls 23495->23504 23498 6317d2 23496->23498 23498->23502 23506 636dc7 68 API calls 23498->23506 23499->23502 23505 636dc7 68 API calls 23499->23505 23502->23487 23503->23495 23504->23492 23505->23502 23506->23502 23508 63ffd6 __vswprintf_c_l 23507->23508 23508->23365 23511 63192c __EH_prolog 23509->23511 23510 631940 23510->23367 23511->23510 23512 631965 23511->23512 23514 631995 23511->23514 23513 633a0d 90 API calls 23512->23513 23513->23510 23518 633e39 23514->23518 23519 633e42 23518->23519 23520 633a0d 90 API calls 23519->23520 23522 6319b1 23519->23522 23535 63f944 23519->23535 23520->23519 23522->23510 23523 631dd2 23522->23523 23524 631ddc __EH_prolog 23523->23524 23543 633a90 23524->23543 23526 631e05 23527 631e8c 23526->23527 23528 631736 69 API calls 23526->23528 23527->23510 23529 631e1c 23528->23529 23573 6318ad 69 API calls 23529->23573 23531 631e34 23533 631e40 23531->23533 23574 6406d7 MultiByteToWideChar 23531->23574 23575 6318ad 69 API calls 23533->23575 23536 63f94b 23535->23536 23537 63f966 23536->23537 23541 636d8a RaiseException __CxxThrowException@8 23536->23541 23539 63f977 SetThreadExecutionState 23537->23539 23542 636d8a RaiseException __CxxThrowException@8 23537->23542 23539->23519 23541->23537 23542->23539 23544 633a9a __EH_prolog 23543->23544 23545 633ab0 23544->23545 23546 633acc 23544->23546 23612 63135c 67 API calls 23545->23612 23548 633d0c 23546->23548 23551 633af8 23546->23551 23631 63135c 67 API calls 23548->23631 23550 633abb 23550->23526 23551->23550 23576 640bce 23551->23576 23553 633b30 23580 641fa8 23553->23580 23555 633b79 23557 633c04 23555->23557 23572 633b70 23555->23572 23615 63c5cd 23555->23615 23556 633b75 23556->23555 23614 631fa5 69 API calls 23556->23614 23593 63a6f9 23557->23593 23559 633b65 23613 63135c 67 API calls 23559->23613 23560 633b47 23560->23555 23560->23556 23560->23559 23562 633c17 23566 633c92 23562->23566 23567 633c88 23562->23567 23621 641c3f 23566->23621 23597 639120 23567->23597 23570 633c90 23570->23572 23630 636f5f 67 API calls 23570->23630 23608 640e0f 23572->23608 23573->23531 23574->23533 23575->23527 23577 640bd8 __EH_prolog 23576->23577 23632 63fb54 23577->23632 23579 640cd8 23579->23553 23581 641fb7 23580->23581 23583 641fc1 23580->23583 23643 636dc7 68 API calls 23581->23643 23584 642001 23583->23584 23586 642006 new 23583->23586 23592 64205f ___scrt_fastfail 23583->23592 23645 65006c RaiseException 23584->23645 23585 642116 23646 65006c RaiseException 23585->23646 23586->23585 23589 64203b 23586->23589 23586->23592 23644 641ec9 68 API calls 3 library calls 23589->23644 23590 642139 23592->23560 23594 63a706 23593->23594 23596 63a710 23593->23596 23595 64cdac new 8 API calls 23594->23595 23595->23596 23596->23562 23598 63912a __EH_prolog 23597->23598 23647 637c6b 23598->23647 23601 63138d 69 API calls 23602 63913c 23601->23602 23650 63c6a8 23602->23650 23604 639196 23604->23570 23606 63c6a8 114 API calls 23607 63914e 23606->23607 23607->23604 23607->23606 23659 63c860 90 API calls __vswprintf_c_l 23607->23659 23610 640e31 23608->23610 23666 63fc3c 23610->23666 23611 640e4a 23611->23550 23612->23550 23613->23572 23614->23555 23616 63c600 23615->23616 23617 63c5ee 23615->23617 23619 636182 73 API calls 23616->23619 23680 636182 23617->23680 23620 63c5f8 23619->23620 23620->23557 23622 641c71 23621->23622 23623 641c48 23621->23623 23629 641c65 23622->23629 23715 64421c 119 API calls 2 library calls 23622->23715 23624 641c67 23623->23624 23626 641c5d 23623->23626 23623->23629 23714 644f34 114 API calls 23624->23714 23701 645983 23626->23701 23629->23570 23630->23572 23631->23550 23641 64cdf0 23632->23641 23634 63fb5e EnterCriticalSection 23635 63fba2 LeaveCriticalSection 23634->23635 23636 63fb7d 23634->23636 23635->23579 23637 64cdac new 8 API calls 23636->23637 23638 63fb87 23637->23638 23639 63fb9d 23638->23639 23642 63f982 71 API calls 23638->23642 23639->23635 23641->23634 23642->23639 23643->23583 23644->23592 23645->23585 23646->23590 23648 63a930 GetVersionExW 23647->23648 23649 637c70 23648->23649 23649->23601 23655 63c6bd __vswprintf_c_l 23650->23655 23651 63c807 23652 63c82f 23651->23652 23660 63c647 23651->23660 23654 63f944 2 API calls 23652->23654 23657 63c7fe 23654->23657 23655->23651 23655->23657 23664 63a7e1 84 API calls 23655->23664 23665 6477e6 93 API calls 23655->23665 23657->23607 23659->23607 23661 63c650 23660->23661 23663 63c6a1 23660->23663 23662 64066e PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 23661->23662 23661->23663 23662->23663 23663->23652 23664->23655 23665->23655 23667 63fc43 EnterCriticalSection 23666->23667 23668 63fc91 23666->23668 23669 63fc88 LeaveCriticalSection 23667->23669 23670 63fc5d 23667->23670 23668->23611 23669->23668 23670->23669 23673 63fa23 23670->23673 23672 63fc7b 23672->23669 23674 63fdb7 72 API calls 23673->23674 23675 63fa45 ReleaseSemaphore 23674->23675 23676 63fa83 DeleteCriticalSection FindCloseChangeNotification CloseHandle 23675->23676 23677 63fa65 23675->23677 23676->23672 23678 63fb19 70 API calls 23677->23678 23679 63fa6f FindCloseChangeNotification 23678->23679 23679->23676 23679->23677 23681 6361a1 23680->23681 23690 63621d 23680->23690 23682 63decc 73 API calls 23681->23682 23681->23690 23683 6361c9 23682->23683 23691 6408f3 WideCharToMultiByte 23683->23691 23685 6361dc 23686 6361e1 23685->23686 23687 63621f 23685->23687 23686->23690 23692 636551 23686->23692 23700 63626a 73 API calls 2 library calls 23687->23700 23690->23620 23691->23685 23694 63656e _memcmp 23692->23694 23699 6366bd __vswprintf_c_l ___scrt_fastfail 23692->23699 23693 63de4b 73 API calls 23693->23694 23694->23693 23695 636757 __vswprintf_c_l 23694->23695 23697 6365c1 __vswprintf_c_l _strlen 23694->23697 23696 63df86 73 API calls 23695->23696 23696->23699 23698 63df86 73 API calls 23697->23698 23698->23699 23699->23690 23700->23690 23716 6421e5 23701->23716 23703 645994 ___BuildCatchObject __vswprintf_c_l 23704 63c6a8 114 API calls 23703->23704 23705 645d66 23703->23705 23720 63fab9 23703->23720 23726 642b39 114 API calls 23703->23726 23727 645db8 114 API calls 23703->23727 23728 63fdb7 23703->23728 23732 642592 91 API calls __vswprintf_c_l 23703->23732 23733 6463f1 119 API calls __vswprintf_c_l 23703->23733 23704->23703 23734 643ef0 91 API calls __vswprintf_c_l 23705->23734 23707 645d76 __vswprintf_c_l 23707->23629 23714->23629 23715->23629 23718 6421ef __EH_prolog ___scrt_fastfail new 23716->23718 23717 6422da 23717->23703 23718->23717 23719 636dc7 68 API calls 23718->23719 23719->23718 23721 63fac5 23720->23721 23722 63faca 23720->23722 23723 63fbbd 77 API calls 23721->23723 23724 63fae3 23722->23724 23725 63fdb7 72 API calls 23722->23725 23723->23722 23724->23703 23725->23724 23726->23703 23727->23703 23729 63fdd1 ResetEvent ReleaseSemaphore 23728->23729 23730 63fdfc 23728->23730 23731 63fb19 70 API calls 23729->23731 23730->23703 23731->23730 23732->23703 23733->23703 23734->23707 23735->23378 23736->23378 23737->23375 23739 635d76 23738->23739 23780 635c95 23739->23780 23741 635da9 23743 635dea 23741->23743 23744 635de1 23741->23744 23785 63a9a0 CharUpperW CompareStringW CompareStringW 23741->23785 23743->23744 23786 63f133 CompareStringW 23743->23786 23744->23390 23747 6380f8 23746->23747 23748 638199 CharUpperW 23747->23748 23749 6381ac 23748->23749 23749->23393 23751 637c20 23750->23751 23752 637c60 23751->23752 23792 636f05 67 API calls 23751->23792 23752->23401 23754 637c58 23793 63135c 67 API calls 23754->23793 23757 639a73 23756->23757 23760 639a82 23756->23760 23758 639a79 FlushFileBuffers 23757->23758 23757->23760 23758->23760 23759 639afb SetFileTime 23759->23457 23760->23759 23761->23382 23762->23384 23763->23412 23764->23401 23765->23401 23766->23398 23767->23415 23768->23405 23769->23415 23770->23425 23771->23427 23772->23428 23773->23451 23774->23451 23775->23451 23776->23451 23777->23454 23778->23453 23779->23407 23787 635b92 23780->23787 23782 635cb6 23782->23741 23784 635b92 3 API calls 23784->23782 23785->23741 23786->23744 23789 635b9c 23787->23789 23788 635c84 23788->23782 23788->23784 23789->23788 23791 63a9a0 CharUpperW CompareStringW CompareStringW 23789->23791 23791->23789 23792->23754 23793->23752 23796 63a2cd 23795->23796 23797 63a2eb FindFirstFileW 23796->23797 23798 63a35d FindNextFileW 23796->23798 23801 63a304 23797->23801 23806 63a341 23797->23806 23799 63a368 GetLastError 23798->23799 23800 63a37c 23798->23800 23799->23800 23800->23806 23802 63b2c5 2 API calls 23801->23802 23803 63a31d 23802->23803 23804 63a321 FindFirstFileW 23803->23804 23805 63a336 GetLastError 23803->23805 23804->23805 23804->23806 23805->23806 23806->23332 23807->23197 23808->23203 23809->23203 23810->23206 23811->23212 23813 639bf2 67 API calls 23812->23813 23814 631f1a 23813->23814 23815 631f1e 23814->23815 23816 6319e2 90 API calls 23814->23816 23815->23220 23815->23221 23817 631f2b 23816->23817 23817->23815 23819 63135c 67 API calls 23817->23819 23819->23815 23973 64e750 51 API calls 2 library calls 23974 651f50 RtlUnwind 23923 64995e 104 API calls 23924 64955e 71 API calls 23975 64d759 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 23864 64cd5b 23865 64cd65 23864->23865 23866 64cabb ___delayLoadHelper2@8 19 API calls 23865->23866 23867 64cd72 23866->23867 21958 64c725 19 API calls ___delayLoadHelper2@8 23881 65f820 DeleteCriticalSection 23925 649122 73 API calls 21960 63de2a 21961 63de32 FreeLibrary 21960->21961 21962 63de3a 21960->21962 21961->21962 23926 640d28 26 API calls std::bad_exception::bad_exception 23976 64d72a 28 API calls 2 library calls 21993 63192c 126 API calls __EH_prolog 23927 64a536 93 API calls _swprintf 23928 64d533 46 API calls 6 library calls 23951 657207 21 API calls 23977 65c301 21 API calls __vswprintf_c_l 23888 64d002 38 API calls 2 library calls 23929 65550a 8 API calls ___vcrt_uninitialize 23832 656417 23840 65783d 23832->23840 23835 65642b 23837 656433 23838 656440 23837->23838 23848 656443 11 API calls 23837->23848 23841 657726 _abort 5 API calls 23840->23841 23842 657864 23841->23842 23843 65787c TlsAlloc 23842->23843 23845 65786d 23842->23845 23843->23845 23844 64d763 CatchGuardHandler 5 API calls 23846 656421 23844->23846 23845->23844 23846->23835 23847 656392 20 API calls 2 library calls 23846->23847 23847->23837 23848->23835 23978 64d716 20 API calls 23953 65ee16 CloseHandle 23979 651b10 5 API calls 2 library calls 23980 631714 79 API calls 23892 631019 29 API calls pre_c_initialization 23850 639c18 23851 639c24 23850->23851 23852 639c2b 23850->23852 23853 639c31 GetStdHandle 23852->23853 23855 639c3c 23852->23855 23853->23855 23854 639c91 WriteFile 23854->23855 23855->23851 23855->23854 23856 639c61 WriteFile 23855->23856 23857 639c5c 23855->23857 23859 639d04 23855->23859 23861 636d16 56 API calls 23855->23861 23856->23855 23856->23857 23857->23855 23857->23856 23862 636f23 68 API calls 23859->23862 23861->23855 23862->23851 23893 64b81f 72 API calls 23895 65c0e4 51 API calls 23897 6588ec GetCommandLineA GetCommandLineW 23981 64c3e9 19 API calls ___delayLoadHelper2@8 23899 6534f1 QueryPerformanceFrequency QueryPerformanceCounter 22355 64d5f1 22356 64d5fd ___FrameUnwindToState 22355->22356 22381 64d109 22356->22381 22358 64d604 22360 64d62d 22358->22360 22458 64da15 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 22358->22458 22366 64d66c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 22360->22366 22392 65571c 22360->22392 22364 64d64c ___FrameUnwindToState 22365 64d6cc 22400 64db30 22365->22400 22366->22365 22459 65471f 38 API calls 3 library calls 22366->22459 22376 64d6f8 22378 64d701 22376->22378 22460 654b07 28 API calls _abort 22376->22460 22461 64d280 13 API calls 2 library calls 22378->22461 22382 64d112 22381->22382 22462 64d86b IsProcessorFeaturePresent 22382->22462 22384 64d11e 22463 650b06 22384->22463 22386 64d123 22387 64d127 22386->22387 22472 65558a 22386->22472 22387->22358 22390 64d13e 22390->22358 22393 655733 22392->22393 22394 64d763 CatchGuardHandler 5 API calls 22393->22394 22395 64d646 22394->22395 22395->22364 22396 6556c0 22395->22396 22397 6556ef 22396->22397 22398 64d763 CatchGuardHandler 5 API calls 22397->22398 22399 655718 22398->22399 22399->22366 22522 64de40 22400->22522 22403 64d6d2 22404 65566d 22403->22404 22405 658549 51 API calls 22404->22405 22408 655676 22405->22408 22406 64d6db 22409 64c130 22406->22409 22408->22406 22524 6588d4 38 API calls 22408->22524 22525 63f3a5 22409->22525 22413 64c14f 22574 649035 22413->22574 22415 64c158 22578 640710 GetCPInfo 22415->22578 22417 64c162 ___scrt_fastfail 22418 64c175 GetCommandLineW 22417->22418 22419 64c184 22418->22419 22420 64c202 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 22418->22420 22581 64a8d3 22419->22581 22422 633f2b _swprintf 51 API calls 22420->22422 22423 64c26b SetEnvironmentVariableW GetModuleHandleW LoadIconW 22422->22423 22594 649a75 LoadBitmapW 22423->22594 22426 64c192 OpenFileMappingW 22429 64c1f2 CloseHandle 22426->22429 22430 64c1ab MapViewOfFile 22426->22430 22427 64c1fc 22588 64be09 22427->22588 22429->22420 22433 64c1bc __vswprintf_c_l 22430->22433 22434 64c1e9 UnmapViewOfFile 22430->22434 22435 64be09 2 API calls 22433->22435 22434->22429 22437 64c1d8 22435->22437 22436 64c2b2 22438 64c2c4 DialogBoxParamW 22436->22438 22437->22434 22439 64c2fe 22438->22439 22440 64c317 22439->22440 22441 64c310 Sleep 22439->22441 22444 64c325 22440->22444 22619 649236 CompareStringW SetCurrentDirectoryW ___scrt_fastfail 22440->22619 22441->22440 22443 64c344 DeleteObject 22445 64c35b DeleteObject 22443->22445 22448 64c35e 22443->22448 22444->22443 22445->22448 22446 64c38f 22620 64be68 WaitForSingleObject PeekMessageW WaitForSingleObject 22446->22620 22447 64c3a1 22617 64909d 22447->22617 22448->22446 22448->22447 22450 64c395 CloseHandle 22450->22447 22452 64c3db 22453 654a3b GetModuleHandleW 22452->22453 22454 64d6ee 22453->22454 22454->22376 22455 654b64 22454->22455 22814 6548e1 22455->22814 22458->22358 22459->22365 22460->22378 22461->22364 22462->22384 22464 650b0b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 22463->22464 22476 651bde 22464->22476 22467 650b19 22467->22386 22469 650b21 22470 650b2c 22469->22470 22490 651c1a DeleteCriticalSection 22469->22490 22470->22386 22518 658ab6 22472->22518 22475 650b2f 8 API calls 3 library calls 22475->22387 22479 651be7 22476->22479 22478 651c10 22496 651c1a DeleteCriticalSection 22478->22496 22479->22478 22480 650b15 22479->22480 22491 651e72 22479->22491 22480->22467 22482 650c46 22480->22482 22511 651d87 22482->22511 22484 650c50 22485 650c5b 22484->22485 22516 651e35 6 API calls try_get_function 22484->22516 22485->22469 22487 650c69 22488 650c76 22487->22488 22517 650c79 6 API calls ___vcrt_FlsFree 22487->22517 22488->22469 22490->22467 22497 651c66 22491->22497 22494 651ea9 InitializeCriticalSectionAndSpinCount 22495 651e95 22494->22495 22495->22479 22496->22480 22498 651c9a 22497->22498 22500 651c96 22497->22500 22498->22494 22498->22495 22500->22498 22502 651cba 22500->22502 22504 651d06 22500->22504 22501 651cc6 GetProcAddress 22503 651cd6 __crt_fast_encode_pointer 22501->22503 22502->22498 22502->22501 22503->22498 22505 651d23 22504->22505 22506 651d2e LoadLibraryExW 22504->22506 22505->22500 22507 651d62 22506->22507 22508 651d4a GetLastError 22506->22508 22507->22505 22509 651d79 FreeLibrary 22507->22509 22508->22507 22510 651d55 LoadLibraryExW 22508->22510 22509->22505 22510->22507 22512 651c66 try_get_function 5 API calls 22511->22512 22513 651da1 22512->22513 22514 651db9 TlsAlloc 22513->22514 22515 651daa 22513->22515 22515->22484 22516->22487 22517->22485 22521 658acf 22518->22521 22519 64d763 CatchGuardHandler 5 API calls 22520 64d130 22519->22520 22520->22390 22520->22475 22521->22519 22523 64db43 GetStartupInfoW 22522->22523 22523->22403 22524->22408 22526 64cec0 22525->22526 22527 63f3af GetModuleHandleW 22526->22527 22528 63f41a 22527->22528 22529 63f3c9 GetProcAddress 22527->22529 22530 63f74f GetModuleFileNameW 22528->22530 22630 65461a 42 API calls __vswprintf_c_l 22528->22630 22531 63f3f2 GetProcAddress 22529->22531 22532 63f3e2 22529->22532 22544 63f76a 22530->22544 22531->22528 22534 63f3fe 22531->22534 22532->22531 22534->22528 22535 63f68d 22535->22530 22536 63f698 GetModuleFileNameW CreateFileW 22535->22536 22537 63f743 CloseHandle 22536->22537 22538 63f6c7 SetFilePointer 22536->22538 22537->22530 22538->22537 22539 63f6d7 ReadFile 22538->22539 22539->22537 22542 63f6f6 22539->22542 22542->22537 22545 63f35b 2 API calls 22542->22545 22543 63f79f CompareStringW 22543->22544 22544->22543 22546 63f7d5 GetFileAttributesW 22544->22546 22547 63f7e9 22544->22547 22621 63a930 22544->22621 22624 63f35b 22544->22624 22545->22542 22546->22544 22546->22547 22548 63f7f6 22547->22548 22550 63f828 22547->22550 22551 63f80e GetFileAttributesW 22548->22551 22553 63f822 22548->22553 22549 63f937 22573 648b8d GetCurrentDirectoryW 22549->22573 22550->22549 22552 63a930 GetVersionExW 22550->22552 22551->22548 22551->22553 22554 63f842 22552->22554 22553->22550 22555 63f849 22554->22555 22556 63f8af 22554->22556 22558 63f35b 2 API calls 22555->22558 22557 633f2b _swprintf 51 API calls 22556->22557 22559 63f8d7 AllocConsole 22557->22559 22560 63f853 22558->22560 22561 63f8e4 GetCurrentProcessId AttachConsole 22559->22561 22562 63f92f ExitProcess 22559->22562 22563 63f35b 2 API calls 22560->22563 22638 6520a3 22561->22638 22565 63f85d 22563->22565 22631 63d192 22565->22631 22566 63f905 GetStdHandle WriteConsoleW Sleep FreeConsole 22566->22562 22569 633f2b _swprintf 51 API calls 22570 63f88b 22569->22570 22571 63d192 54 API calls 22570->22571 22572 63f89a 22571->22572 22572->22562 22573->22413 22575 63f35b 2 API calls 22574->22575 22576 649049 OleInitialize 22575->22576 22577 64906c GdiplusStartup SHGetMalloc 22576->22577 22577->22415 22579 640734 IsDBCSLeadByte 22578->22579 22579->22579 22580 64074c 22579->22580 22580->22417 22587 64a8dd 22581->22587 22582 64a9f3 22582->22426 22582->22427 22583 64a925 CharUpperW 22583->22587 22584 64a9a8 CharUpperW 22584->22587 22585 64a94c CharUpperW 22585->22587 22587->22582 22587->22583 22587->22584 22587->22585 22650 63e030 22587->22650 22589 64cec0 22588->22589 22590 64be16 SetEnvironmentVariableW 22589->22590 22592 64be39 22590->22592 22591 64be61 22591->22420 22592->22591 22593 64be55 SetEnvironmentVariableW 22592->22593 22593->22591 22595 649a96 22594->22595 22596 649a9f GetObjectW 22594->22596 22681 648bcf FindResourceW 22595->22681 22676 648abf 22596->22676 22601 649af2 22612 63caf7 22601->22612 22602 649ad2 22695 648b21 GetDC GetDeviceCaps ReleaseDC 22602->22695 22603 648bcf 12 API calls 22605 649ac7 22603->22605 22605->22602 22607 649acd DeleteObject 22605->22607 22606 649ada 22696 648ade GetDC GetDeviceCaps ReleaseDC 22606->22696 22607->22602 22609 649ae3 22697 648cf2 8 API calls ___scrt_fastfail 22609->22697 22611 649aea DeleteObject 22611->22601 22708 63cb1c 22612->22708 22616 63cb0a 22616->22436 22618 6490c3 GdiplusShutdown OleUninitialize 22617->22618 22618->22452 22619->22444 22620->22450 22622 63a944 GetVersionExW 22621->22622 22623 63a980 22621->22623 22622->22623 22623->22544 22625 64cec0 22624->22625 22626 63f368 GetSystemDirectoryW 22625->22626 22627 63f380 22626->22627 22628 63f39e 22626->22628 22629 63f391 LoadLibraryW 22627->22629 22628->22544 22629->22628 22630->22535 22632 63d1c2 22631->22632 22633 63d1e1 LoadStringW 22632->22633 22634 63d1cb LoadStringW 22632->22634 22635 63d1f3 22633->22635 22634->22633 22634->22635 22640 63c96f 22635->22640 22637 63d201 22637->22569 22639 6520ab 22638->22639 22639->22566 22639->22639 22641 63c979 22640->22641 22642 63c9ed _strlen 22641->22642 22647 63ca4b _wcschr _wcsrchr 22641->22647 22648 6408f3 WideCharToMultiByte 22641->22648 22649 6408f3 WideCharToMultiByte 22642->22649 22645 63ca18 _strlen 22646 633f2b _swprintf 51 API calls 22645->22646 22646->22647 22647->22637 22648->22642 22649->22645 22651 63e056 22650->22651 22652 63e03f ___scrt_fastfail 22650->22652 22654 63df43 22651->22654 22652->22587 22655 63df54 __vswprintf_c_l 22654->22655 22658 63df86 22655->22658 22659 63df92 22658->22659 22660 63df9c 22658->22660 22668 63df05 22659->22668 22662 63e006 GetCurrentProcessId 22660->22662 22663 63dfbc 22660->22663 22664 63df7e 22662->22664 22663->22664 22674 636d8f 67 API calls __vswprintf_c_l 22663->22674 22664->22652 22666 63dfd7 __except_handler4 22675 636d8a RaiseException __CxxThrowException@8 22666->22675 22669 63df3d 22668->22669 22670 63df0e 22668->22670 22669->22660 22671 63f35b 2 API calls 22670->22671 22672 63df18 22671->22672 22672->22669 22673 63df1e GetProcAddress GetProcAddress 22672->22673 22673->22669 22674->22666 22675->22664 22698 648ade GetDC GetDeviceCaps ReleaseDC 22676->22698 22678 648ac6 22679 648ad2 22678->22679 22699 648b21 GetDC GetDeviceCaps ReleaseDC 22678->22699 22679->22601 22679->22602 22679->22603 22682 648c22 22681->22682 22683 648bf0 SizeofResource 22681->22683 22682->22596 22683->22682 22684 648c04 LoadResource 22683->22684 22684->22682 22685 648c15 LockResource 22684->22685 22685->22682 22686 648c29 GlobalAlloc 22685->22686 22686->22682 22687 648c40 GlobalLock 22686->22687 22688 648cb7 GlobalFree 22687->22688 22689 648c4b __vswprintf_c_l 22687->22689 22688->22682 22690 648cb0 GlobalUnlock 22689->22690 22700 648b64 GdipAlloc 22689->22700 22690->22688 22693 648c8f GdipCreateHBITMAPFromBitmap 22694 648ca5 22693->22694 22694->22690 22695->22606 22696->22609 22697->22611 22698->22678 22699->22679 22701 648b83 22700->22701 22702 648b76 22700->22702 22701->22690 22701->22693 22701->22694 22704 648923 22702->22704 22705 648944 GdipCreateBitmapFromStreamICM 22704->22705 22706 64894b GdipCreateBitmapFromStream 22704->22706 22707 648950 22705->22707 22706->22707 22707->22701 22709 63cb26 _wcschr __EH_prolog 22708->22709 22710 63cb52 GetModuleFileNameW 22709->22710 22711 63cb83 22709->22711 22712 63cb6c 22710->22712 22731 63978d 22711->22731 22712->22711 22714 63cbb3 22723 63ccef 22714->22723 22726 63cd39 22714->22726 22740 639b3b 22714->22740 22755 63995d 22714->22755 22763 639a30 22714->22763 22717 639a30 70 API calls 22719 63cd09 new 22717->22719 22721 63995d 73 API calls 22719->22721 22719->22726 22724 63cd2f new 22721->22724 22723->22717 22723->22726 22724->22726 22768 6406d7 MultiByteToWideChar 22724->22768 22748 639487 22726->22748 22727 63ce98 GetModuleHandleW FindResourceW 22728 63cec6 22727->22728 22730 63cec0 22727->22730 22729 63c96f 52 API calls 22728->22729 22729->22730 22730->22616 22732 639797 22731->22732 22733 6397ed CreateFileW 22732->22733 22734 63981a GetLastError 22733->22734 22735 63986b 22733->22735 22736 63b2c5 2 API calls 22734->22736 22735->22714 22737 63983a 22736->22737 22737->22735 22738 63983e CreateFileW GetLastError 22737->22738 22739 639862 22738->22739 22739->22735 22741 639b5f SetFilePointer 22740->22741 22742 639b4e 22740->22742 22743 639b98 22741->22743 22744 639b7d GetLastError 22741->22744 22742->22743 22769 636e6a 68 API calls 22742->22769 22743->22714 22744->22743 22746 639b87 22744->22746 22746->22743 22770 636e6a 68 API calls 22746->22770 22749 6394ab 22748->22749 22754 6394bc 22748->22754 22750 6394b7 22749->22750 22751 6394be 22749->22751 22749->22754 22771 63963a 22750->22771 22776 6394f3 22751->22776 22754->22727 22758 639974 22755->22758 22757 6399d5 22757->22714 22758->22757 22759 6399c7 22758->22759 22761 6399d7 22758->22761 22791 639663 22758->22791 22803 636e30 68 API calls 22759->22803 22761->22757 22762 639663 5 API calls 22761->22762 22762->22761 22808 6398e7 22763->22808 22766 639a5b 22766->22714 22768->22726 22769->22741 22770->22743 22772 639643 22771->22772 22773 639647 22771->22773 22772->22754 22773->22772 22782 639dfc 22773->22782 22777 6394ff 22776->22777 22780 63951d 22776->22780 22779 63950b FindCloseChangeNotification 22777->22779 22777->22780 22778 63953c 22778->22754 22779->22780 22780->22778 22790 636d3c 67 API calls 22780->22790 22783 64cec0 22782->22783 22784 639e09 DeleteFileW 22783->22784 22785 639661 22784->22785 22786 639e1c 22784->22786 22785->22754 22787 63b2c5 2 API calls 22786->22787 22788 639e30 22787->22788 22788->22785 22789 639e34 DeleteFileW 22788->22789 22789->22785 22790->22778 22792 639671 GetStdHandle 22791->22792 22793 63967c ReadFile 22791->22793 22792->22793 22794 639695 22793->22794 22795 6396b5 22793->22795 22804 63976a 22794->22804 22795->22758 22797 63969c 22798 6396bd GetLastError 22797->22798 22799 6396cc 22797->22799 22800 6396aa 22797->22800 22798->22795 22798->22799 22799->22795 22801 6396dc GetLastError 22799->22801 22802 639663 GetFileType 22800->22802 22801->22795 22801->22800 22802->22795 22803->22757 22805 639773 GetFileType 22804->22805 22806 639770 22804->22806 22807 639781 22805->22807 22806->22797 22807->22797 22811 639952 22808->22811 22812 6398f3 22808->22812 22809 63992a SetFilePointer 22810 639948 GetLastError 22809->22810 22809->22811 22810->22811 22811->22766 22813 636e6a 68 API calls 22811->22813 22812->22809 22813->22766 22815 6548ed _abort 22814->22815 22816 654905 22815->22816 22818 654a3b _abort GetModuleHandleW 22815->22818 22836 6576c7 EnterCriticalSection 22816->22836 22819 6548f9 22818->22819 22819->22816 22851 654a7f GetModuleHandleExW 22819->22851 22820 6549ab 22840 6549eb 22820->22840 22824 654982 22826 65499a 22824->22826 22831 6556c0 _abort 5 API calls 22824->22831 22825 65490d 22825->22820 22825->22824 22837 655418 22825->22837 22832 6556c0 _abort 5 API calls 22826->22832 22827 6549f4 22859 65f149 5 API calls CatchGuardHandler 22827->22859 22828 6549c8 22843 6549fa 22828->22843 22831->22826 22832->22820 22836->22825 22860 655151 22837->22860 22879 65770f LeaveCriticalSection 22840->22879 22842 6549c4 22842->22827 22842->22828 22880 657b04 22843->22880 22846 654a28 22849 654a7f _abort 8 API calls 22846->22849 22847 654a08 GetPEB 22847->22846 22848 654a18 GetCurrentProcess TerminateProcess 22847->22848 22848->22846 22850 654a30 ExitProcess 22849->22850 22852 654acc 22851->22852 22853 654aa9 GetProcAddress 22851->22853 22855 654ad2 FreeLibrary 22852->22855 22856 654adb 22852->22856 22854 654abe 22853->22854 22854->22852 22855->22856 22857 64d763 CatchGuardHandler 5 API calls 22856->22857 22858 654ae5 22857->22858 22858->22816 22863 655100 22860->22863 22862 655175 22862->22824 22864 65510c ___FrameUnwindToState 22863->22864 22871 6576c7 EnterCriticalSection 22864->22871 22866 65511a 22872 6551a1 22866->22872 22870 655138 ___FrameUnwindToState 22870->22862 22871->22866 22873 6551c1 22872->22873 22874 6551c9 22872->22874 22875 64d763 CatchGuardHandler 5 API calls 22873->22875 22874->22873 22877 6559b2 _free 20 API calls 22874->22877 22876 655127 22875->22876 22878 655145 LeaveCriticalSection _abort 22876->22878 22877->22873 22878->22870 22879->22842 22881 657b29 22880->22881 22885 657b1f 22880->22885 22882 657726 _abort 5 API calls 22881->22882 22882->22885 22883 64d763 CatchGuardHandler 5 API calls 22884 654a04 22883->22884 22884->22846 22884->22847 22885->22883 23956 656ef2 21 API calls 2 library calls 23984 6463c2 114 API calls 23957 64aa98 101 API calls 4 library calls 23820 64c0cf 23821 64c0dc 23820->23821 23822 63d192 54 API calls 23821->23822 23823 64c0f0 23822->23823 23824 633f2b _swprintf 51 API calls 23823->23824 23825 64c102 SetDlgItemTextW 23824->23825 23828 64991d PeekMessageW 23825->23828 23829 649938 GetMessageW TranslateMessage DispatchMessageW 23828->23829 23830 649959 23828->23830 23829->23830 23958 6486ca 21 API calls 23902 6394d1 72 API calls 23904 647cdc GetClientRect 23933 64d5df 27 API calls pre_c_initialization 23905 64aa98 96 API calls 4 library calls 23986 657bd9 27 API calls 3 library calls 23934 6509a0 6 API calls 3 library calls 21964 6310a9 21969 635b05 21964->21969 21970 635b0f __EH_prolog 21969->21970 21976 63acb6 21970->21976 21972 635b1b 21982 635cfa GetCurrentProcess GetProcessAffinityMask 21972->21982 21977 63acc0 __EH_prolog 21976->21977 21983 63de12 73 API calls 21977->21983 21979 63acd2 21984 63adce 21979->21984 21983->21979 21985 63ade0 ___scrt_fastfail 21984->21985 21988 63fcd4 21985->21988 21991 63fc94 GetCurrentProcess GetProcessAffinityMask 21988->21991 21992 63ad48 21991->21992 21992->21972 23990 64aa98 91 API calls 3 library calls 23991 644fb4 119 API calls __vswprintf_c_l 23935 6571b1 31 API calls 2 library calls 22886 6313b4 75 API calls 3 library calls 23992 656fbc 71 API calls _free 22887 64c7bf 22888 64c790 22887->22888 22890 64cabb 22888->22890 22918 64c7c9 22890->22918 22892 64cad5 22893 64cb32 22892->22893 22896 64cb56 22892->22896 22929 64ca39 11 API calls 3 library calls 22893->22929 22895 64cb3d RaiseException 22913 64cd2b 22895->22913 22897 64cbce LoadLibraryExA 22896->22897 22899 64ccfd 22896->22899 22901 64cc2f 22896->22901 22904 64cc41 22896->22904 22900 64cbe1 GetLastError 22897->22900 22897->22901 22898 64d763 CatchGuardHandler 5 API calls 22902 64cd3a 22898->22902 22932 64ca39 11 API calls 3 library calls 22899->22932 22906 64cc0a 22900->22906 22909 64cbf4 22900->22909 22901->22904 22905 64cc3a FreeLibrary 22901->22905 22902->22888 22903 64cc9f GetProcAddress 22903->22899 22908 64ccaf GetLastError 22903->22908 22904->22899 22904->22903 22905->22904 22930 64ca39 11 API calls 3 library calls 22906->22930 22911 64ccc2 22908->22911 22909->22901 22909->22906 22910 64cc15 RaiseException 22910->22913 22911->22899 22931 64ca39 11 API calls 3 library calls 22911->22931 22913->22898 22915 64cce3 RaiseException 22916 64c7c9 ___delayLoadHelper2@8 11 API calls 22915->22916 22917 64ccfa 22916->22917 22917->22899 22919 64c7d5 22918->22919 22920 64c7fb 22918->22920 22933 64c877 8 API calls 2 library calls 22919->22933 22920->22892 22922 64c7da 22923 64c7f6 22922->22923 22934 64c9c9 VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 22922->22934 22935 64c7fc GetModuleHandleW GetProcAddress GetProcAddress 22923->22935 22926 64ca86 22927 64d763 CatchGuardHandler 5 API calls 22926->22927 22928 64cab7 22927->22928 22928->22892 22929->22895 22930->22910 22931->22915 22932->22913 22933->22922 22934->22923 22935->22926 22937 657686 22938 657691 22937->22938 22940 6576ba 22938->22940 22942 6576b6 22938->22942 22943 657998 22938->22943 22950 6576de DeleteCriticalSection 22940->22950 22944 657726 _abort 5 API calls 22943->22944 22945 6579bf 22944->22945 22946 6579dd InitializeCriticalSectionAndSpinCount 22945->22946 22947 6579c8 22945->22947 22946->22947 22948 64d763 CatchGuardHandler 5 API calls 22947->22948 22949 6579f4 22948->22949 22949->22938 22950->22942 22952 64c781 22954 64c72f 22952->22954 22953 64cabb ___delayLoadHelper2@8 19 API calls 22953->22954 22954->22953 23937 649583 GetDlgItem EnableWindow ShowWindow SendMessageW 23994 657b8b FreeLibrary 23965 637a9b GetCurrentProcess GetLastError CloseHandle 23938 648999 GdipCloneImage GdipAlloc 23967 658a9b GetProcessHeap

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0063F3A5: GetModuleHandleW.KERNEL32 ref: 0063F3BD
                                • Part of subcall function 0063F3A5: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0063F3D5
                                • Part of subcall function 0063F3A5: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0063F3F8
                                • Part of subcall function 00648B8D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00648B95
                                • Part of subcall function 00649035: OleInitialize.OLE32(00000000), ref: 0064904E
                                • Part of subcall function 00649035: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00649085
                                • Part of subcall function 00649035: SHGetMalloc.SHELL32(006720E8), ref: 0064908F
                                • Part of subcall function 00640710: GetCPInfo.KERNEL32(00000000,?), ref: 00640721
                                • Part of subcall function 00640710: IsDBCSLeadByte.KERNEL32(00000000), ref: 00640735
                              • GetCommandLineW.KERNEL32 ref: 0064C178
                              • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0064C19F
                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0064C1B0
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0064C1EA
                                • Part of subcall function 0064BE09: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0064BE1F
                                • Part of subcall function 0064BE09: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0064BE5B
                              • CloseHandle.KERNEL32(00000000), ref: 0064C1F3
                              • GetModuleFileNameW.KERNEL32(00000000,00687938,00000800), ref: 0064C20E
                              • SetEnvironmentVariableW.KERNEL32(sfxname,00687938), ref: 0064C220
                              • GetLocalTime.KERNEL32(?), ref: 0064C227
                              • _swprintf.LIBCMT ref: 0064C266
                              • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0064C278
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0064C27B
                              • LoadIconW.USER32(00000000,00000064), ref: 0064C292
                              • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00019B4E,00000000), ref: 0064C2E3
                              • Sleep.KERNEL32(?), ref: 0064C311
                              • DeleteObject.GDI32 ref: 0064C350
                              • DeleteObject.GDI32(?), ref: 0064C35C
                                • Part of subcall function 0064A8D3: CharUpperW.USER32(?,?,?,?,00001000), ref: 0064A92B
                                • Part of subcall function 0064A8D3: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 0064A952
                              • CloseHandle.KERNEL32 ref: 0064C39B
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$*ag$*xh$8yh$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                              • API String ID: 985665271-930965650
                              • Opcode ID: f15ad309cd9f0c55357385f5091f30b5232110d37e3a214fc2fc85072df97976
                              • Instruction ID: 42bb4f22fea6321a459184ae5dbdab65b7f51bfefde367b859357cd02565c96c
                              • Opcode Fuzzy Hash: f15ad309cd9f0c55357385f5091f30b5232110d37e3a214fc2fc85072df97976
                              • Instruction Fuzzy Hash: 3361F771905300AFE7A1AFA4DC49E7B3BEBEB49714F445429F644932A1DBB48C44CBA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 877 63a2c3-63a2e9 call 64cec0 880 63a2eb-63a2fe FindFirstFileW 877->880 881 63a35d-63a366 FindNextFileW 877->881 884 63a384-63a42d call 63f160 call 63b952 call 6401af * 3 880->884 885 63a304-63a31f call 63b2c5 880->885 882 63a368-63a376 GetLastError 881->882 883 63a37c-63a37e 881->883 882->883 883->884 886 63a432-63a445 883->886 884->886 892 63a321-63a334 FindFirstFileW 885->892 893 63a336-63a33f GetLastError 885->893 892->884 892->893 895 63a341-63a344 893->895 896 63a350 893->896 895->896 899 63a346-63a349 895->899 897 63a352-63a358 896->897 897->886 899->896 901 63a34b-63a34e 899->901 901->897
                              APIs
                              • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0063A1BE,000000FF,?,?), ref: 0063A2F8
                              • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,?,?,?,0063A1BE,000000FF,?,?), ref: 0063A32E
                              • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0063A1BE,000000FF,?,?), ref: 0063A336
                              • FindNextFileW.KERNEL32(?,?,?,?,?,?,0063A1BE,000000FF,?,?), ref: 0063A35E
                              • GetLastError.KERNEL32(?,?,?,?,0063A1BE,000000FF,?,?), ref: 0063A36A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: FileFind$ErrorFirstLast$Next
                              • String ID:
                              • API String ID: 869497890-0
                              • Opcode ID: 70093335965f02b5f9a72f8bac51af22db305b88f84cb8d1021385a937247629
                              • Instruction ID: de641369d5ccfdd7b11c646bd869d3e3472dbd6a985ba882e4cd3000c835b3c4
                              • Opcode Fuzzy Hash: 70093335965f02b5f9a72f8bac51af22db305b88f84cb8d1021385a937247629
                              • Instruction Fuzzy Hash: 0E419372608241AFD324DFB8C880ADBF7E9BF49340F040A2EF5D9D3240D774A9589B92
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,006549D0,?,00667F60,0000000C,00654B27,?,00000002,00000000), ref: 00654A1B
                              • TerminateProcess.KERNEL32(00000000,?,006549D0,?,00667F60,0000000C,00654B27,?,00000002,00000000), ref: 00654A22
                              • ExitProcess.KERNEL32 ref: 00654A34
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: fd40527d463d8655906f329f5a360f1d5d0c28a908769a5c74c95ea103bbf6d7
                              • Instruction ID: 3a04ded7df011d7b53b7927b5be8b8a1967a33523b109ad3cd79bc4a47504890
                              • Opcode Fuzzy Hash: fd40527d463d8655906f329f5a360f1d5d0c28a908769a5c74c95ea103bbf6d7
                              • Instruction Fuzzy Hash: 15E04631048108AFCF91AF60DD08A893B6BEB01347F001068FC098A236CFB5DD86DB84
                              APIs
                              • __EH_prolog.LIBCMT ref: 006383F0
                              • _memcmp.LIBVCRUNTIME ref: 00638858
                                • Part of subcall function 006380DA: CharUpperW.USER32(?,?,00000000,?,?,?,?,?,?,?,00000800,?,006386CF,?,-00000930,?), ref: 0063819D
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CharH_prologUpper_memcmp
                              • String ID:
                              • API String ID: 4047935103-0
                              • Opcode ID: 8ff911fd46c44698c2772bc3c3dc4ecdaf586d9b9a6c439a2e91c2c00cd381ed
                              • Instruction ID: 733dd246030fea15b52b6cb6488aac6307257319ad376a726a1c4ad791a3190e
                              • Opcode Fuzzy Hash: 8ff911fd46c44698c2772bc3c3dc4ecdaf586d9b9a6c439a2e91c2c00cd381ed
                              • Instruction Fuzzy Hash: 53720971904285AEDF25DF64C885BF9B7BBAF15300F0840BAF9499B243DB715A85CBE0
                              APIs
                              • __EH_prolog.LIBCMT ref: 00649B53
                                • Part of subcall function 006312E7: GetDlgItem.USER32(00000000,00003021), ref: 0063132B
                                • Part of subcall function 006312E7: SetWindowTextW.USER32(00000000,006602E4), ref: 00631341
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prologItemTextWindow
                              • String ID: !g$"%s"%s$*Ag$*ag$*xh$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                              • API String ID: 810644672-270440012
                              • Opcode ID: b97034aee5d99b2ae2c43ddfc02bf72857af6c09842095330b9a25008671ee48
                              • Instruction ID: eec1884df55e5083ab5112a20040056e5fabe77f762bad1cc84903e4cd5c86f8
                              • Opcode Fuzzy Hash: b97034aee5d99b2ae2c43ddfc02bf72857af6c09842095330b9a25008671ee48
                              • Instruction Fuzzy Hash: EA42E371980345BFEB25AFA09D4AFFF3BABAB06704F401059F605A61D1CBB44D84CB66

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 257 63f3a5-63f3c7 call 64cec0 GetModuleHandleW 260 63f41a-63f681 257->260 261 63f3c9-63f3e0 GetProcAddress 257->261 262 63f687-63f692 call 65461a 260->262 263 63f74f-63f780 GetModuleFileNameW call 63b8dc call 63f160 260->263 264 63f3f2-63f3fc GetProcAddress 261->264 265 63f3e2-63f3ef 261->265 262->263 273 63f698-63f6c5 GetModuleFileNameW CreateFileW 262->273 277 63f782-63f78c call 63a930 263->277 264->260 268 63f3fe-63f415 264->268 265->264 268->260 275 63f743-63f74a CloseHandle 273->275 276 63f6c7-63f6d5 SetFilePointer 273->276 275->263 276->275 278 63f6d7-63f6f4 ReadFile 276->278 283 63f799 277->283 284 63f78e-63f792 call 63f35b 277->284 278->275 280 63f6f6-63f71b 278->280 282 63f738-63f741 call 63ef59 280->282 282->275 289 63f71d-63f737 call 63f35b 282->289 287 63f79b-63f79d 283->287 290 63f797 284->290 291 63f7bf-63f7e1 call 63b952 GetFileAttributesW 287->291 292 63f79f-63f7bd CompareStringW 287->292 289->282 290->287 295 63f7e3-63f7e7 291->295 299 63f7eb 291->299 292->291 292->295 295->277 297 63f7e9 295->297 300 63f7ef-63f7f4 297->300 299->300 301 63f7f6 300->301 302 63f828-63f82a 300->302 303 63f7f8-63f81a call 63b952 GetFileAttributesW 301->303 304 63f830-63f847 call 63b926 call 63a930 302->304 305 63f937-63f941 302->305 311 63f824 303->311 312 63f81c-63f820 303->312 315 63f849-63f8aa call 63f35b * 2 call 63d192 call 633f2b call 63d192 call 648cca 304->315 316 63f8af-63f8e2 call 633f2b AllocConsole 304->316 311->302 312->303 314 63f822 312->314 314->302 322 63f92f-63f931 ExitProcess 315->322 321 63f8e4-63f929 GetCurrentProcessId AttachConsole call 6520a3 GetStdHandle WriteConsoleW Sleep FreeConsole 316->321 316->322 321->322
                              APIs
                              • GetModuleHandleW.KERNEL32 ref: 0063F3BD
                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0063F3D5
                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0063F3F8
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0063F6A3
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0063F6BB
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0063F6CD
                              • ReadFile.KERNEL32(00000000,?,00007FFE,00660858,00000000), ref: 0063F6EC
                              • CloseHandle.KERNEL32(00000000), ref: 0063F744
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0063F75A
                              • CompareStringW.KERNEL32(00000400,00001001,006608A4,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 0063F7B4
                              • GetFileAttributesW.KERNELBASE(?,?,00660870,00000800,?,00000000,?,00000800), ref: 0063F7DD
                              • GetFileAttributesW.KERNEL32(?,?,0f,00000800), ref: 0063F816
                                • Part of subcall function 0063F35B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0063F376
                                • Part of subcall function 0063F35B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0063DF18,Crypt32.dll,?,0063DF9C,?,0063DF7E,?,?,?,?), ref: 0063F398
                              • _swprintf.LIBCMT ref: 0063F886
                              • _swprintf.LIBCMT ref: 0063F8D2
                                • Part of subcall function 00633F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00633F3E
                              • AllocConsole.KERNEL32 ref: 0063F8DA
                              • GetCurrentProcessId.KERNEL32 ref: 0063F8E4
                              • AttachConsole.KERNEL32(00000000), ref: 0063F8EB
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0063F911
                              • WriteConsoleW.KERNEL32(00000000), ref: 0063F918
                              • Sleep.KERNEL32(00002710), ref: 0063F923
                              • FreeConsole.KERNEL32 ref: 0063F929
                              • ExitProcess.KERNEL32 ref: 0063F931
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                              • String ID: f$$f$,f$0f$@f$Df$Df$DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$\f$\f$`f$dwmapi.dll$kernel32$tf$uxtheme.dll$xf$xf$f$f
                              • API String ID: 1201351596-3061208827
                              • Opcode ID: b77e61490b25dd351471d85a0a50cdd05d245de194ceef59d23572409539e542
                              • Instruction ID: c75694aa96ef2193abdd49a01ba1603015a559d35074d3203daf494afbc1a3d5
                              • Opcode Fuzzy Hash: b77e61490b25dd351471d85a0a50cdd05d245de194ceef59d23572409539e542
                              • Instruction Fuzzy Hash: A5D16EB1408384ABF770DF60D849BDFBBEAAF84304F505D3DE58996281C7B09549CBA6

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 404 64aa44-64aa5c call 64cdf0 call 64cec0 409 64b644-64b651 404->409 410 64aa62-64aa8c call 6496eb 404->410 410->409 413 64aa92-64aa97 410->413 414 64aa98-64aaa6 413->414 415 64aaa7-64aab7 call 6493b9 414->415 418 64aab9 415->418 419 64aabb-64aad0 call 640b00 418->419 422 64aad2-64aad6 419->422 423 64aadd-64aae0 419->423 422->419 424 64aad8 422->424 425 64aae6 423->425 426 64b610-64b63b call 6496eb 423->426 424->426 428 64acdc-64acde 425->428 429 64aaed-64aaf0 425->429 430 64ad7d-64ad7f 425->430 431 64ad9a-64ad9c 425->431 426->414 437 64b641-64b643 426->437 428->426 436 64ace4-64acf0 428->436 429->426 434 64aaf6-64ab63 call 648b8d call 63b5be call 63a16c call 63a2a6 call 636fa3 call 63a1f9 429->434 430->426 433 64ad85-64ad95 SetWindowTextW 430->433 431->426 435 64ada2-64ada9 431->435 433->426 503 64acc8-64acd7 call 63a182 434->503 504 64ab69-64ab6f 434->504 435->426 439 64adaf-64adc8 435->439 440 64ad04-64ad09 436->440 441 64acf2-64ad03 call 654644 436->441 437->409 445 64add0-64adde call 6520a3 439->445 446 64adca 439->446 442 64ad13-64ad1e call 649843 440->442 443 64ad0b-64ad11 440->443 441->440 449 64ad23-64ad25 442->449 443->449 445->426 458 64ade4-64aded 445->458 446->445 455 64ad27-64ad2e call 6520a3 449->455 456 64ad30-64ad50 call 6520a3 call 6520ce 449->456 455->456 481 64ad52-64ad59 456->481 482 64ad69-64ad6b 456->482 463 64ae16-64ae19 458->463 464 64adef-64adf3 458->464 469 64aefe-64af0c call 63f160 463->469 470 64ae1f-64ae22 463->470 464->463 468 64adf5-64adfd 464->468 468->426 474 64ae03-64ae11 call 63f160 468->474 486 64af0e-64af22 call 6502bb 469->486 475 64ae24-64ae29 470->475 476 64ae2f-64ae4a 470->476 474->486 475->469 475->476 494 64ae94-64ae9b 476->494 495 64ae4c-64ae86 476->495 483 64ad60-64ad68 call 654644 481->483 484 64ad5b-64ad5d 481->484 482->426 487 64ad71-64ad78 call 6520be 482->487 483->482 484->483 505 64af24-64af28 486->505 506 64af2f-64af8b call 63f160 call 649591 GetDlgItem SetWindowTextW SendMessageW call 6520d9 486->506 487->426 497 64ae9d-64aeb5 call 6520a3 494->497 498 64aec9-64aeec call 6520a3 * 2 494->498 522 64ae88 495->522 523 64ae8a-64ae8c 495->523 497->498 516 64aeb7-64aec4 call 63f138 497->516 498->486 534 64aeee-64aefc call 63f138 498->534 503->426 510 64ab76-64ab8b SetFileAttributesW 504->510 505->506 511 64af2a-64af2c 505->511 506->426 545 64af91-64afa3 SendMessageW 506->545 517 64ac31-64ac3d GetFileAttributesW 510->517 518 64ab91-64abc4 call 63b150 call 63ae45 call 6520a3 510->518 511->506 516->498 527 64acad-64acc2 call 63a1f9 517->527 528 64ac3f-64ac4e DeleteFileW 517->528 551 64abc6-64abd5 call 6520a3 518->551 552 64abd7-64abe5 call 63b57e 518->552 522->523 523->494 527->503 543 64ab71 527->543 528->527 533 64ac50-64ac53 528->533 535 64ac57-64ac83 call 633f2b GetFileAttributesW 533->535 534->486 549 64ac55-64ac56 535->549 550 64ac85-64ac9b MoveFileW 535->550 543->510 545->426 549->535 550->527 553 64ac9d-64aca7 MoveFileExW 550->553 551->552 558 64abeb-64ac2a call 6520a3 call 64de40 551->558 552->503 552->558 553->527 558->517
                              APIs
                              • __EH_prolog.LIBCMT ref: 0064AA49
                                • Part of subcall function 006496EB: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 006497B3
                              • SetFileAttributesW.KERNEL32(?,00000005,?,?,?,00000800,?,?,00000000,00000001,0064A35C,?,00000000), ref: 0064AB7E
                              • GetFileAttributesW.KERNEL32(?), ref: 0064AC38
                              • DeleteFileW.KERNEL32(?), ref: 0064AC46
                              • SetWindowTextW.USER32(?,?), ref: 0064AD8F
                              • _wcsrchr.LIBVCRUNTIME ref: 0064AF19
                              • GetDlgItem.USER32(?,00000066), ref: 0064AF54
                              • SetWindowTextW.USER32(00000000,?), ref: 0064AF64
                              • SendMessageW.USER32(00000000,00000143,00000000,0067412A), ref: 0064AF78
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0064AFA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                              • String ID: %s.%d.tmp$*Ag$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                              • API String ID: 3676479488-2267958582
                              • Opcode ID: 480750853353160863caa67fede2307816693cb85ee919cf968a83b769ca14a4
                              • Instruction ID: ef441068e8eb9983974671fbe59f93f2b402644a7fd5f987694a59f2d7f37df0
                              • Opcode Fuzzy Hash: 480750853353160863caa67fede2307816693cb85ee919cf968a83b769ca14a4
                              • Instruction Fuzzy Hash: 74E17072940129AAEF64EBA0DD85EEE777EEF05350F0044AAF905E3141EF709B84CB65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 563 63cf27-63cfa1 call 63c8de GetWindowRect GetClientRect 566 63d042-63d04a 563->566 567 63cfa7-63cfaf 563->567 569 63d084-63d09f GetSystemMetrics GetWindow 566->569 570 63d04c-63d07e GetWindowTextW call 63c96f SetWindowTextW 566->570 568 63cfb5-63cffe 567->568 567->569 571 63d002-63d004 568->571 572 63d000 568->572 574 63d17d-63d17f 569->574 570->569 575 63d006 571->575 576 63d008-63d03e GetWindowLongW GetWindowRect 571->576 572->571 577 63d185-63d18f 574->577 578 63d0a4-63d0aa 574->578 575->576 576->566 578->577 580 63d0b0-63d0c8 GetWindowTextW 578->580 582 63d0ca-63d0e9 call 63c96f SetWindowTextW 580->582 583 63d0ef-63d0f4 580->583 582->583 584 63d0f6-63d164 GetWindowRect 583->584 585 63d16b-63d17a GetWindow 583->585 584->585 585->577 588 63d17c 585->588 588->574
                              APIs
                                • Part of subcall function 0063C8DE: _wcschr.LIBVCRUNTIME ref: 0063C90D
                              • GetWindowRect.USER32(?,?), ref: 0063CF5E
                              • GetClientRect.USER32(?,?), ref: 0063CF6A
                              • GetWindowLongW.USER32(?,000000F0), ref: 0063D00B
                              • GetWindowRect.USER32(?,?), ref: 0063D038
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0063D057
                              • SetWindowTextW.USER32(?,?), ref: 0063D07E
                              • GetSystemMetrics.USER32(00000008), ref: 0063D086
                              • GetWindow.USER32(?,00000005), ref: 0063D091
                              • GetWindowTextW.USER32(00000000,?,00000400), ref: 0063D0BC
                              • SetWindowTextW.USER32(00000000,00000000), ref: 0063D0E9
                              • GetWindowRect.USER32(00000000,?), ref: 0063D0FC
                              • GetWindow.USER32(00000000,00000002), ref: 0063D16E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                              • String ID: d
                              • API String ID: 4134264131-2564639436
                              • Opcode ID: 23a16a259ae1762535810e7cf7bfcdc4f7fc7410a905476f23985a813bbd5934
                              • Instruction ID: 39dc952f3c1762d34a1355fa6b1c558b4a9a8df474233635807d16c0f55bcb08
                              • Opcode Fuzzy Hash: 23a16a259ae1762535810e7cf7bfcdc4f7fc7410a905476f23985a813bbd5934
                              • Instruction Fuzzy Hash: E1617F71208300AFD314DFA8DD88E6BBBEAFBC9714F04551DF684A2290C774E9058B92

                              Control-flow Graph

                              APIs
                              • GetDlgItem.USER32(00000068,00688958), ref: 0064B71C
                              • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,00649324), ref: 0064B747
                              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0064B756
                              • SendMessageW.USER32(00000000,000000C2,00000000,006602E4), ref: 0064B760
                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0064B776
                              • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0064B78C
                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0064B7CC
                              • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0064B7D6
                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0064B7E5
                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0064B808
                              • SendMessageW.USER32(00000000,000000C2,00000000,00661368), ref: 0064B813
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: MessageSend$ItemShowWindow
                              • String ID: \
                              • API String ID: 1207805008-2967466578
                              • Opcode ID: 006a5465d690388688532a0ed9c64a982959166d174419575db4b367ea38d5f8
                              • Instruction ID: f90b02a07c1ad58334a00f39242168b61bf41a42718868ed0e42ed86bce94f10
                              • Opcode Fuzzy Hash: 006a5465d690388688532a0ed9c64a982959166d174419575db4b367ea38d5f8
                              • Instruction Fuzzy Hash: 582146712857457BE310EB24DC41FAB7ADEEF82714F000518FA90A61D0C7A59A088ABB

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 598 648bcf-648bea FindResourceW 599 648cc5-648cc7 598->599 600 648bf0-648c02 SizeofResource 598->600 601 648c04-648c13 LoadResource 600->601 602 648c22-648c24 600->602 601->602 603 648c15-648c20 LockResource 601->603 604 648cc4 602->604 603->602 605 648c29-648c3e GlobalAlloc 603->605 604->599 606 648c40-648c49 GlobalLock 605->606 607 648cbe-648cc3 605->607 608 648cb7-648cb8 GlobalFree 606->608 609 648c4b-648c69 call 64dfa0 606->609 607->604 608->607 613 648cb0-648cb1 GlobalUnlock 609->613 614 648c6b-648c83 call 648b64 609->614 613->608 614->613 618 648c85-648c8d 614->618 619 648c8f-648ca3 GdipCreateHBITMAPFromBitmap 618->619 620 648ca8-648cac 618->620 619->620 621 648ca5 619->621 620->613 621->620
                              APIs
                              • FindResourceW.KERNEL32(00000066,PNG,?,?,00649AC7,00000066), ref: 00648BE0
                              • SizeofResource.KERNEL32(00000000,75FD5780,?,?,00649AC7,00000066), ref: 00648BF8
                              • LoadResource.KERNEL32(00000000,?,?,00649AC7,00000066), ref: 00648C0B
                              • LockResource.KERNEL32(00000000,?,?,00649AC7,00000066), ref: 00648C16
                              • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,00649AC7,00000066), ref: 00648C34
                              • GlobalLock.KERNEL32(00000000,?,?,?,00649AC7,00000066), ref: 00648C41
                              • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00648C9C
                              • GlobalUnlock.KERNEL32(00000000), ref: 00648CB1
                              • GlobalFree.KERNEL32(00000000), ref: 00648CB8
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                              • String ID: PNG
                              • API String ID: 4097654274-364855578
                              • Opcode ID: db997a3809e0dd6460e0a1b742a1f42070e58764a79b05c3b080283a2c3c54a2
                              • Instruction ID: 40e50fca2eddaca5ed0eddc0c82cd00932dba3b25946290d216e989e789cb722
                              • Opcode Fuzzy Hash: db997a3809e0dd6460e0a1b742a1f42070e58764a79b05c3b080283a2c3c54a2
                              • Instruction Fuzzy Hash: 6E217171602701AFD7219F61ED8996FBBAAEF86751B00552CF846D7360DF71DC00CAA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 622 64b9a9-64b9c1 call 64cec0 625 64b9c7-64b9d3 call 6520a3 622->625 626 64bc0d-64bc15 622->626 625->626 629 64b9d9-64ba01 call 64de40 625->629 632 64ba03 629->632 633 64ba0b-64ba18 629->633 632->633 634 64ba1c-64ba25 633->634 635 64ba1a 633->635 636 64ba27-64ba29 634->636 637 64ba5d 634->637 635->634 638 64ba31-64ba34 636->638 639 64ba61-64ba63 637->639 642 64bbc1-64bbc6 638->642 643 64ba3a-64ba42 638->643 640 64ba65-64ba68 639->640 641 64ba6a-64ba6c 639->641 640->641 644 64ba7f-64ba91 call 63b0ec 640->644 641->644 645 64ba6e-64ba75 641->645 648 64bbc8 642->648 649 64bbbb-64bbbf 642->649 646 64ba48-64ba4e 643->646 647 64bbda-64bbe2 643->647 657 64ba93-64baa0 call 640b00 644->657 658 64baaa-64bab5 call 639e4f 644->658 645->644 650 64ba77 645->650 646->647 654 64ba54-64ba5b 646->654 651 64bbe4-64bbe6 647->651 652 64bbea-64bbf2 647->652 655 64bbcd-64bbd1 648->655 649->642 649->655 650->644 651->652 652->639 654->637 654->638 655->647 657->658 663 64baa2 657->663 664 64bab7-64bace call 63ae70 658->664 665 64bad2-64badf ShellExecuteExW 658->665 663->658 664->665 666 64bae5-64baf8 665->666 667 64bc0b-64bc0c 665->667 670 64bafa-64bb01 666->670 671 64bb0b-64bb0d 666->671 667->626 670->671 672 64bb03-64bb09 670->672 673 64bb20-64bb3f call 64be68 671->673 674 64bb0f-64bb18 671->674 672->671 675 64bb76-64bb82 CloseHandle 672->675 673->675 692 64bb41-64bb49 673->692 674->673 683 64bb1a-64bb1e ShowWindow 674->683 676 64bb84-64bb91 call 640b00 675->676 677 64bb93-64bba1 675->677 676->677 689 64bbf7 676->689 681 64bba3-64bba5 677->681 682 64bbfe-64bc00 677->682 681->682 687 64bba7-64bbad 681->687 682->667 686 64bc02-64bc04 682->686 683->673 686->667 690 64bc06-64bc09 ShowWindow 686->690 687->682 691 64bbaf-64bbb9 687->691 689->682 690->667 691->682 692->675 693 64bb4b-64bb5c GetExitCodeProcess 692->693 693->675 694 64bb5e-64bb68 693->694 695 64bb6f 694->695 696 64bb6a 694->696 695->675 696->695
                              APIs
                              • ShellExecuteExW.SHELL32(000001C0), ref: 0064BAD7
                              • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 0064BB1C
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 0064BB54
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0064BB7A
                              • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 0064BC09
                                • Part of subcall function 00640B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0063AC99,?,?,?,0063AC48,?,-00000002,?,00000000,?), ref: 00640B16
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                              • String ID: $*Qg$.exe$.inf
                              • API String ID: 3686203788-2751137138
                              • Opcode ID: a1e4e351cf75452ac3281eec287c75fce1c022dcda65d310d69cb32f50a32ebe
                              • Instruction ID: 9aa4c0ec270e0c031cd952e46e6171cb1da3b5e49bb2a6ea394025a6cef503df
                              • Opcode Fuzzy Hash: a1e4e351cf75452ac3281eec287c75fce1c022dcda65d310d69cb32f50a32ebe
                              • Instruction Fuzzy Hash: A751D0705093809ADB31EF64D9806FBBBEBEF85304F04281DE5C197264EBB1C989CB56

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 697 63cb1c-63cb50 call 64cdf0 call 64cec0 call 6500da 704 63cb83-63cb8c call 63f160 697->704 705 63cb52-63cb81 GetModuleFileNameW call 63b8dc call 63f138 697->705 709 63cb91-63cbb5 call 639451 call 63978d 704->709 705->709 716 63cbbb-63cbc4 709->716 717 63ce08-63ce23 call 639487 709->717 718 63cbc7-63cbca 716->718 720 63cbd0-63cbd6 call 639b3b 718->720 721 63ccf8-63cd18 call 639a30 call 6520c3 718->721 726 63cbdb-63cc02 call 63995d 720->726 721->717 731 63cd1e-63cd37 call 63995d 721->731 732 63ccc1-63ccc4 726->732 733 63cc08-63cc10 726->733 747 63cd40-63cd52 call 6520c3 731->747 748 63cd39-63cd3e 731->748 737 63ccc7-63cce9 call 639a30 732->737 735 63cc12-63cc1a 733->735 736 63cc3b-63cc46 733->736 735->736 739 63cc1c-63cc36 call 653650 735->739 740 63cc71-63cc79 736->740 741 63cc48-63cc54 736->741 737->718 751 63ccef-63ccf2 737->751 762 63ccb7-63ccbf 739->762 763 63cc38 739->763 745 63cca5-63cca9 740->745 746 63cc7b-63cc83 740->746 741->740 743 63cc56-63cc5b 741->743 743->740 750 63cc5d-63cc6f call 653579 743->750 745->732 753 63ccab-63ccae 745->753 746->745 752 63cc85-63cc9f call 653650 746->752 747->717 768 63cd58-63cd75 call 6406d7 call 6520be 747->768 754 63cd77-63cd7f 748->754 750->740 769 63ccb3 750->769 751->717 751->721 752->717 752->745 753->733 758 63cd81 754->758 759 63cd84-63cd91 754->759 758->759 765 63cd93-63cd95 759->765 766 63cdfd-63ce05 759->766 762->737 763->736 770 63cd96-63cda0 765->770 766->717 768->754 769->762 770->766 773 63cda2-63cda6 770->773 775 63cde0-63cde3 773->775 776 63cda8-63cdaf 773->776 778 63cde5-63cdeb 775->778 779 63cded-63cdef 775->779 780 63cdb1-63cdb4 776->780 781 63cdd6 776->781 778->779 783 63cdf0 778->783 779->783 784 63cdd2-63cdd4 780->784 785 63cdb6-63cdb9 780->785 782 63cdd8-63cdde 781->782 786 63cdf4-63cdfb 782->786 783->786 784->782 787 63cdbb-63cdbe 785->787 788 63cdce-63cdd0 785->788 786->766 786->770 789 63cdc0-63cdc4 787->789 790 63cdca-63cdcc 787->790 788->782 789->783 791 63cdc6-63cdc8 789->791 790->782 791->782
                              APIs
                              • __EH_prolog.LIBCMT ref: 0063CB21
                              • _wcschr.LIBVCRUNTIME ref: 0063CB3F
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,0063CB03,?), ref: 0063CB5A
                                • Part of subcall function 006406D7: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0063B2AB,00000000,?,?,?,?), ref: 006406F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                              • String ID: *messages***$*messages***$R$a
                              • API String ID: 803915177-2900423073
                              • Opcode ID: 603913000041f2732e97306a50c79a905c1222fbdc07f9f18bb0fc3a9715df80
                              • Instruction ID: 3fa620beaab030c2d39df2efd1015734fb9268ebf5d878c098cb1a7582978966
                              • Opcode Fuzzy Hash: 603913000041f2732e97306a50c79a905c1222fbdc07f9f18bb0fc3a9715df80
                              • Instruction Fuzzy Hash: E49113B2A002059ADB30DF68CC55BEEBBA6EF54320F10446EF649F7391DA709985CBD4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 792 65739f-6573b8 793 6573ce-6573d3 792->793 794 6573ba-6573ca call 65b9ae 792->794 796 6573d5-6573dd 793->796 797 6573e0-657404 MultiByteToWideChar 793->797 794->793 801 6573cc 794->801 796->797 799 657597-6575aa call 64d763 797->799 800 65740a-657416 797->800 802 657418-657429 800->802 803 65746a 800->803 801->793 806 657448-657459 call 6559ec 802->806 807 65742b-65743a call 65f160 802->807 805 65746c-65746e 803->805 809 657474-657487 MultiByteToWideChar 805->809 810 65758c 805->810 806->810 820 65745f 806->820 807->810 819 657440-657446 807->819 809->810 813 65748d-65749f call 6579fa 809->813 814 65758e-657595 call 657607 810->814 822 6574a4-6574a8 813->822 814->799 821 657465-657468 819->821 820->821 821->805 822->810 824 6574ae-6574b5 822->824 825 6574b7-6574bc 824->825 826 6574ef-6574fb 824->826 825->814 827 6574c2-6574c4 825->827 828 657547 826->828 829 6574fd-65750e 826->829 827->810 832 6574ca-6574e4 call 6579fa 827->832 833 657549-65754b 828->833 830 657510-65751f call 65f160 829->830 831 657529-65753a call 6559ec 829->831 837 657585-65758b call 657607 830->837 844 657521-657527 830->844 831->837 846 65753c 831->846 832->814 847 6574ea 832->847 833->837 838 65754d-657566 call 6579fa 833->838 837->810 838->837 850 657568-65756f 838->850 849 657542-657545 844->849 846->849 847->810 849->833 851 657571-657572 850->851 852 6575ab-6575b1 850->852 853 657573-657583 WideCharToMultiByte 851->853 852->853 853->837 854 6575b3-6575ba call 657607 853->854 854->814
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00652FB2,00652FB2,?,?,?,006575F0,00000001,00000001,F5E85006), ref: 006573F9
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,006575F0,00000001,00000001,F5E85006,?,?,?), ref: 0065747F
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00657579
                              • __freea.LIBCMT ref: 00657586
                                • Part of subcall function 006559EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,0065239A,?,0000015D,?,?,?,?,00652F19,000000FF,00000000,?,?), ref: 00655A1E
                              • __freea.LIBCMT ref: 0065758F
                              • __freea.LIBCMT ref: 006575B4
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                              • String ID:
                              • API String ID: 1414292761-0
                              • Opcode ID: fb5781d842aa9b1c81d5e160ff868b309afa580dca6e7737dcc6ca92f0e67f08
                              • Instruction ID: d7e03a09172cd327bed09b8962881d7083fc513997f7bd0eb844c4fd27c585cf
                              • Opcode Fuzzy Hash: fb5781d842aa9b1c81d5e160ff868b309afa580dca6e7737dcc6ca92f0e67f08
                              • Instruction Fuzzy Hash: E351E072614216AFEB258F64EC41EAF7BABEB40752F244668FC04D7240EB34DC48C6A4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 857 648fc7-648fe6 GetClassNameW 858 64900e-649010 857->858 859 648fe8-648ffd call 640b00 857->859 861 649012-649014 858->861 862 64901b-64901f 858->862 864 64900d 859->864 865 648fff-64900b FindWindowExW 859->865 861->862 864->858 865->864
                              APIs
                              • GetClassNameW.USER32(?,?,00000050), ref: 00648FDE
                              • SHAutoComplete.SHLWAPI(?,00000010), ref: 00649015
                                • Part of subcall function 00640B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0063AC99,?,?,?,0063AC48,?,-00000002,?,00000000,?), ref: 00640B16
                              • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00649005
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AutoClassCompareCompleteFindNameStringWindow
                              • String ID: @Ut$EDIT
                              • API String ID: 4243998846-2065656831
                              • Opcode ID: 5e29b049fa8c77c201a2b46b9a35d5e17df95f87eb4e769af1f2968ae67a16fa
                              • Instruction ID: 021c9fbf42bf2b5fc37ff9656cc968f658a90637e1c548fd2c31b549f4dc8f22
                              • Opcode Fuzzy Hash: 5e29b049fa8c77c201a2b46b9a35d5e17df95f87eb4e769af1f2968ae67a16fa
                              • Instruction Fuzzy Hash: FCF0893264172867E7305AA55D05FDB766D9B47B11F04015AFA00F6280D7A1A901CAF6

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0063F35B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0063F376
                                • Part of subcall function 0063F35B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0063DF18,Crypt32.dll,?,0063DF9C,?,0063DF7E,?,?,?,?), ref: 0063F398
                              • OleInitialize.OLE32(00000000), ref: 0064904E
                              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00649085
                              • SHGetMalloc.SHELL32(006720E8), ref: 0064908F
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                              • String ID: riched20.dll$3So
                              • API String ID: 3498096277-3464455743
                              • Opcode ID: c12d5d1620e83a0f0f85cc85bb4217a8d45d55f56076c53dc8d3bc9c236448fd
                              • Instruction ID: 1143e2585ab9e84101aefafd60537f2211e7ed121e15da4d585843fa03d27f41
                              • Opcode Fuzzy Hash: c12d5d1620e83a0f0f85cc85bb4217a8d45d55f56076c53dc8d3bc9c236448fd
                              • Instruction Fuzzy Hash: 17F0E7B5D00209ABCB50AF9AD8499AEFBBDEF85711F00416AE815A2210DBB45645CFA2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 870 63df05-63df0c 871 63df41-63df42 870->871 872 63df0e-63df1c call 63f35b 870->872 875 63df1e-63df3a GetProcAddress * 2 872->875 876 63df3d 872->876 875->876 876->871
                              APIs
                                • Part of subcall function 0063F35B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0063F376
                                • Part of subcall function 0063F35B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0063DF18,Crypt32.dll,?,0063DF9C,?,0063DF7E,?,?,?,?), ref: 0063F398
                              • GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 0063DF24
                              • GetProcAddress.KERNEL32(00671E58,CryptUnprotectMemory), ref: 0063DF34
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AddressProc$DirectoryLibraryLoadSystem
                              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                              • API String ID: 2141747552-1753850145
                              • Opcode ID: bc809b5d1638479eb5dbb70ac7a8dcd6abd13a4c1f5c6b385d59ca40bbc2b724
                              • Instruction ID: 827aca66ddd8277592837e25c71a841fa9eb75f13e940b837a443e11fefa2d72
                              • Opcode Fuzzy Hash: bc809b5d1638479eb5dbb70ac7a8dcd6abd13a4c1f5c6b385d59ca40bbc2b724
                              • Instruction Fuzzy Hash: 07E046B0904B42BEEF415B35EC48B46FBA67F90710F058579E01AC2241DBF4D0A48B90

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0063FDB7: ResetEvent.KERNEL32(?,00D5E128,0063FA45,00671E74,00D5E128,?,-00000001,0065F605,000000FF,?,0063FC7B,?,?,0063A5F0,?), ref: 0063FDD7
                                • Part of subcall function 0063FDB7: ReleaseSemaphore.KERNEL32(?,?,00000000,?,-00000001,0065F605,000000FF,?,0063FC7B,?,?,0063A5F0,?), ref: 0063FDEB
                              • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 0063FA57
                              • FindCloseChangeNotification.KERNELBASE(00D5E12C,00D5E12C), ref: 0063FA71
                              • DeleteCriticalSection.KERNEL32(00D5E2C8), ref: 0063FA8A
                              • FindCloseChangeNotification.KERNELBASE(?), ref: 0063FA96
                              • CloseHandle.KERNEL32(?), ref: 0063FAA2
                                • Part of subcall function 0063FB19: WaitForSingleObject.KERNEL32(?,000000FF,0063FCF9,?,?,0063FD6E,?,?,?,?,?,0063FD58), ref: 0063FB1F
                                • Part of subcall function 0063FB19: GetLastError.KERNEL32(?,?,0063FD6E,?,?,?,?,?,0063FD58), ref: 0063FB2B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Close$ChangeFindNotificationReleaseSemaphore$CriticalDeleteErrorEventHandleLastObjectResetSectionSingleWait
                              • String ID:
                              • API String ID: 3803654862-0
                              • Opcode ID: 144308e7ef7e3b4bcc4f5851aa2cf6fe35073cefb5b5dec9ba625bfc09470aa0
                              • Instruction ID: 64740f744851eec5353a620418225ab8d976c61788dcdd5ed5d080dbb4deb893
                              • Opcode Fuzzy Hash: 144308e7ef7e3b4bcc4f5851aa2cf6fe35073cefb5b5dec9ba625bfc09470aa0
                              • Instruction Fuzzy Hash: 33015E32540B44EFD7219B68DD49FC6BBEBFB45714F004979F29E92560CBB16804CB61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 913 64be09-64be34 call 64cec0 SetEnvironmentVariableW call 63ef59 917 64be39-64be3d 913->917 918 64be61-64be65 917->918 919 64be3f-64be43 917->919 920 64be4c-64be53 call 63f050 919->920 923 64be45-64be4b 920->923 924 64be55-64be5b SetEnvironmentVariableW 920->924 923->920 924->918
                              APIs
                              • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0064BE1F
                              • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0064BE5B
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: EnvironmentVariable
                              • String ID: sfxcmd$sfxpar
                              • API String ID: 1431749950-3493335439
                              • Opcode ID: d9a5508d669d7c87a4549d351ce040941f0ee836a943d2ca216140a602e5158d
                              • Instruction ID: 48d7e22baa6ae19baf4556c67c5e24257d5a50af89ebe3b2283596b79a20e4c2
                              • Opcode Fuzzy Hash: d9a5508d669d7c87a4549d351ce040941f0ee836a943d2ca216140a602e5158d
                              • Instruction Fuzzy Hash: 9CF0A772811224ABD7612BD5DC09AEB7B9BDF05B91F041115FE485A251DBA18840C6F1
                              APIs
                              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,00000000,?,?,0063777A,?,00000005,?,00000011), ref: 0063980D
                              • GetLastError.KERNEL32(?,?,0063777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 0063981A
                              • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,0063777A,?,00000005,?), ref: 0063984F
                              • GetLastError.KERNEL32(?,?,0063777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00639857
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CreateErrorFileLast
                              • String ID:
                              • API String ID: 1214770103-0
                              • Opcode ID: 59ddc5ad441d05ff5e5f08f10bb33ef66c94317a7e3ebf7f5d58d7b8697124bb
                              • Instruction ID: 6316674448a6026714ee5ccf684ef4f6149c1736e5a7514c773a0db1fcaf8069
                              • Opcode Fuzzy Hash: 59ddc5ad441d05ff5e5f08f10bb33ef66c94317a7e3ebf7f5d58d7b8697124bb
                              • Instruction Fuzzy Hash: 513134719447556FE3209F249C45BE7BAA6FB89324F104B29F990873D1D3B59888CBE0
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00639673
                              • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 0063968B
                              • GetLastError.KERNEL32 ref: 006396BD
                              • GetLastError.KERNEL32 ref: 006396DC
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorLast$FileHandleRead
                              • String ID:
                              • API String ID: 2244327787-0
                              • Opcode ID: 67b1e18c85151a2933fcd8ae4019779bc0e2b438dfe1cbb9c46926f57269a898
                              • Instruction ID: 514bb22f2375f74c91ff8362f01f1b1edbe4dbfc0c6c52031c6617a07786d38f
                              • Opcode Fuzzy Hash: 67b1e18c85151a2933fcd8ae4019779bc0e2b438dfe1cbb9c46926f57269a898
                              • Instruction Fuzzy Hash: EB115A30906214EBFF206F65CD46AAA77ABEB16325F10852AF92685290D7B58D40CFF1
                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00652203,00000000,00000000,?,00657769,00652203,00000000,00000000,00000000,?,00657966,00000006,FlsSetValue), ref: 006577F4
                              • GetLastError.KERNEL32(?,00657769,00652203,00000000,00000000,00000000,?,00657966,00000006,FlsSetValue,00663768,00663770,00000000,00000364,?,006563E0), ref: 00657800
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00657769,00652203,00000000,00000000,00000000,?,00657966,00000006,FlsSetValue,00663768,00663770,00000000), ref: 0065780E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: 1e324cde3218435028802983ddbf35e4ac02f588a2928c6aaf437ff979dd706a
                              • Instruction ID: d7f200a58b65e9f872aae2d025eabcbb67e107c1ef2aca324dfec155c0c665bc
                              • Opcode Fuzzy Hash: 1e324cde3218435028802983ddbf35e4ac02f588a2928c6aaf437ff979dd706a
                              • Instruction Fuzzy Hash: FA01A732659222ABD7214E69BC48AAB779AEF15BA3F100630FD0AD7240D760D905C6E0
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0064992E
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0064993F
                              • TranslateMessage.USER32(?), ref: 00649949
                              • DispatchMessageW.USER32(?), ref: 00649953
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Message$DispatchPeekTranslate
                              • String ID:
                              • API String ID: 4217535847-0
                              • Opcode ID: 1ca62229c086171de68e9181bcb664dc30c59d2ec31be2eafb2fd998248f0370
                              • Instruction ID: d0e52332703a1df0b85fe3a9762e2b548e2cf331faa8cccfadac4fa62bd56217
                              • Opcode Fuzzy Hash: 1ca62229c086171de68e9181bcb664dc30c59d2ec31be2eafb2fd998248f0370
                              • Instruction Fuzzy Hash: D1E0ED72C0212EA78B20AFE6AD4CDDB7F6DEF062657004016F519E2000D6A89505CBF1
                              APIs
                                • Part of subcall function 0063DF05: GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 0063DF24
                                • Part of subcall function 0063DF05: GetProcAddress.KERNEL32(00671E58,CryptUnprotectMemory), ref: 0063DF34
                              • GetCurrentProcessId.KERNEL32(?,?,?,0063DF7E), ref: 0063E007
                              Strings
                              • CryptUnprotectMemory failed, xrefs: 0063DFFF
                              • CryptProtectMemory failed, xrefs: 0063DFC7
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AddressProc$CurrentProcess
                              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                              • API String ID: 2190909847-396321323
                              • Opcode ID: 70fa791cb36ef5392ae42d53496ca1584da0f88f86d626960bb7dec2f921b004
                              • Instruction ID: 2b7739cf4ea850a66328c5bd830436c051785c1e7f7edfb2881cbf329266e07a
                              • Opcode Fuzzy Hash: 70fa791cb36ef5392ae42d53496ca1584da0f88f86d626960bb7dec2f921b004
                              • Instruction Fuzzy Hash: FC115B303042056BEB299B28DC41AAF379B9F85B50F04402EF801DB2D1EBE1DC5042E0
                              APIs
                              • CreateThread.KERNELBASE(00000000,00010000,Function_0000FD4F,?,00000000,00000000), ref: 0063FBE1
                              • SetThreadPriority.KERNEL32(?,00000000), ref: 0063FC28
                                • Part of subcall function 00636D8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00636DAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Thread$CreatePriority__vswprintf_c_l
                              • String ID: CreateThread failed
                              • API String ID: 2655393344-3849766595
                              • Opcode ID: c72e84ca036e09e76ba9927fec83bf2a4a28a3e9f418fc5ba7322a45734f2605
                              • Instruction ID: 790a976de83b967040162024e5b2df4f3d2aaa4117f73c5c376d09a604dba75e
                              • Opcode Fuzzy Hash: c72e84ca036e09e76ba9927fec83bf2a4a28a3e9f418fc5ba7322a45734f2605
                              • Instruction Fuzzy Hash: 340126713447097BE3206F58DC42FB3735BEB45761F10103FF98296180CAE2684086A0
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,?,?,0063C8A3,00000001,?,?,?,00000000,0064420A,?,?,?,?,?,00643CAF), ref: 00639C33
                              • WriteFile.KERNEL32(?,00000000,?,00643EB7,00000000,?,?,00000000,0064420A,?,?,?,?,?,00643CAF,?), ref: 00639C73
                              • WriteFile.KERNELBASE(?,00000000,?,00643EB7,00000000,?,00000001,?,?,0063C8A3,00000001,?,?,?,00000000,0064420A), ref: 00639CA0
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: FileWrite$Handle
                              • String ID:
                              • API String ID: 4209713984-0
                              • Opcode ID: 8c569e88bda6dd525819b176df3d81267177ee0120871ef9587a3ffb515ba3b7
                              • Instruction ID: 1af1a6cc7fa0e9d88c1a96d007e713fa881a3009d694acc8aeffb0abc9b4101d
                              • Opcode Fuzzy Hash: 8c569e88bda6dd525819b176df3d81267177ee0120871ef9587a3ffb515ba3b7
                              • Instruction Fuzzy Hash: DA310371148A0AAFDB209F24DC49BA7BBAAEF61310F109119F59593280C7F5E849CFF1
                              APIs
                              • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00639DE2,?,00000001,00000000,?,?), ref: 00639EFD
                              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00639DE2,?,00000001,00000000,?,?), ref: 00639F30
                              • GetLastError.KERNEL32(?,?,?,?,00639DE2,?,00000001,00000000,?,?), ref: 00639F4D
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CreateDirectory$ErrorLast
                              • String ID:
                              • API String ID: 2485089472-0
                              • Opcode ID: c0909fccf1d1731cfbcbe2fdcdbbf51bc97bcec0080f704eb057ee69f34032a3
                              • Instruction ID: 64c199797c774e86584beb761c5317e2f3875bfc481ce4104a032513ff9b1c33
                              • Opcode Fuzzy Hash: c0909fccf1d1731cfbcbe2fdcdbbf51bc97bcec0080f704eb057ee69f34032a3
                              • Instruction Fuzzy Hash: CA01B13250825866EB61AB684C46FFE374F9F06741F08049DF945E6280D7E4D981DFF5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID: CMT
                              • API String ID: 3519838083-2756464174
                              • Opcode ID: 4ab3c8d103a0cc2503ebcc233a88e1f01b4e0fdc5bf3fe6480412dfd03063a11
                              • Instruction ID: cdeeaddec4cb80333fdd230a45acaea85ca526ea9d26707fecd1696ce2ff7bfc
                              • Opcode Fuzzy Hash: 4ab3c8d103a0cc2503ebcc233a88e1f01b4e0fdc5bf3fe6480412dfd03063a11
                              • Instruction Fuzzy Hash: 0F61CF71504F54AEDB21DF34CC419E7B7EAAF15301F44896EE5AB87242DB326A48CF90
                              APIs
                              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 006582D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Info
                              • String ID:
                              • API String ID: 1807457897-3916222277
                              • Opcode ID: 771fa93052a36c4b0c374a5ce3b2934b01045e9d427f4094978d75df75164783
                              • Instruction ID: 9075b1c2725483c09b7e07b203310d3c6d1683d84956e24f77aacdb996f7a178
                              • Opcode Fuzzy Hash: 771fa93052a36c4b0c374a5ce3b2934b01045e9d427f4094978d75df75164783
                              • Instruction Fuzzy Hash: 55411A705083489FDF218E64CC84AFABBEADB55705F1404EDE98A97142D635994ACF60
                              APIs
                              • __EH_prolog.LIBCMT ref: 00631DD7
                                • Part of subcall function 00633A90: __EH_prolog.LIBCMT ref: 00633A95
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID: CMT
                              • API String ID: 3519838083-2756464174
                              • Opcode ID: 4e8a5d77f250aa52ea1344488680bdacb8ddab50626f665868d4e5720f59e938
                              • Instruction ID: 32a02bd06fec4f8b1ffdf58169725059afb7c8f94ee4680164c58aaa7b36e7da
                              • Opcode Fuzzy Hash: 4e8a5d77f250aa52ea1344488680bdacb8ddab50626f665868d4e5720f59e938
                              • Instruction Fuzzy Hash: 39215C719001199FCB55DF98C9419EEFBF7BF59300F10006DE945A7252C7325E11CBA4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID: CMT
                              • API String ID: 3519838083-2756464174
                              • Opcode ID: 956d04d6562ffb5d674d69b96deaae9aa27afe9a8a04c6c7ad21c39f984ecdf3
                              • Instruction ID: e229616ccc750a562eb444c9a6bea771585e91a012f129881798466dc93cbdc5
                              • Opcode Fuzzy Hash: 956d04d6562ffb5d674d69b96deaae9aa27afe9a8a04c6c7ad21c39f984ecdf3
                              • Instruction Fuzzy Hash: 9E119371E00205AFCB14DF65C9A1ABEF7ABBF46340F04405EE8459B381DB359951DBD0
                              APIs
                              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F5E85006,00000001,?,000000FF), ref: 00657A6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: String
                              • String ID: LCMapStringEx
                              • API String ID: 2568140703-3893581201
                              • Opcode ID: 4f63131dd272a6e7ee1c74d3c62e1436ce1ee7b805e2fc322ca605401e2c23ff
                              • Instruction ID: 8e37cabac813e4e186d81e34b93b12e4556bebf8175677284d3109bedd3d50c0
                              • Opcode Fuzzy Hash: 4f63131dd272a6e7ee1c74d3c62e1436ce1ee7b805e2fc322ca605401e2c23ff
                              • Instruction Fuzzy Hash: 8F012576544219BBCF029F90EC05DEE7FA7EF08761F014114FE1926260D6728A31EB84
                              APIs
                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0065708B), ref: 006579E3
                              Strings
                              • InitializeCriticalSectionEx, xrefs: 006579B3
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CountCriticalInitializeSectionSpin
                              • String ID: InitializeCriticalSectionEx
                              • API String ID: 2593887523-3084827643
                              • Opcode ID: b0aafa863921cccb99c9807c1876a8a14cf9fb5654f54ea5db54eff5bb92ff7a
                              • Instruction ID: f7347defcbc0d09ce986c5faf708aa332fe4753f59103e1de0e0ad229cbce261
                              • Opcode Fuzzy Hash: b0aafa863921cccb99c9807c1876a8a14cf9fb5654f54ea5db54eff5bb92ff7a
                              • Instruction Fuzzy Hash: 3AF0E975A4521DBBCF015F50EC05C9EBF63EF44721F014129FC155A260DAB14E10EBD4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Alloc
                              • String ID: FlsAlloc
                              • API String ID: 2773662609-671089009
                              • Opcode ID: b276b902efaedfc20db31e879fb4fd44c120eca24c37d5bf7bd40e092535b618
                              • Instruction ID: 3cab1e7029f894caeac6efa7588e4b040aa4dcec85f44c0562fb13a26d5e51cf
                              • Opcode Fuzzy Hash: b276b902efaedfc20db31e879fb4fd44c120eca24c37d5bf7bd40e092535b618
                              • Instruction Fuzzy Hash: B6E0E574B452187B9705BFA0BC0AD6EBF9BCB49B21F010079FD0567340DEA14E0187C9
                              APIs
                              • try_get_function.LIBVCRUNTIME ref: 00651D9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: try_get_function
                              • String ID: FlsAlloc
                              • API String ID: 2742660187-671089009
                              • Opcode ID: 02ec4fb3880a7ceb3892f2cd15d230bd9e365a6f997f8815dc1de65037df68e5
                              • Instruction ID: 18345f87cee868e818dff519d82deb8684653f575a15a114f833b375be18e12a
                              • Opcode Fuzzy Hash: 02ec4fb3880a7ceb3892f2cd15d230bd9e365a6f997f8815dc1de65037df68e5
                              • Instruction Fuzzy Hash: 5DD05B35F8233877D65036D4DC02AEABA47CB02FB2F090165FF086D28195A5455045D5
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064CD6D
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID: 3So
                              • API String ID: 1269201914-1105799393
                              • Opcode ID: 21370450da63c7be11ae9cde304e8fec2ac8ed80824385c06b70389ec51675b6
                              • Instruction ID: 63d14a6df760305f9a26e37f7b255a1520be120c50ae533b461ab89f0ecc1d7b
                              • Opcode Fuzzy Hash: 21370450da63c7be11ae9cde304e8fec2ac8ed80824385c06b70389ec51675b6
                              • Instruction Fuzzy Hash: 0AB012D175A004BD739492E86E0AC37050FC4C0F31330812FF401F0340F8444C878032
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _memcmp_strlen
                              • String ID:
                              • API String ID: 2682527083-0
                              • Opcode ID: 34014315e53433bc50b9aca7c081bf968f22ce7fbf4c8ab8bd2f833f69c526e1
                              • Instruction ID: 9127801aa010d3173a359a30bf74dbaf220925234015d7025194f0cfc34b7058
                              • Opcode Fuzzy Hash: 34014315e53433bc50b9aca7c081bf968f22ce7fbf4c8ab8bd2f833f69c526e1
                              • Instruction Fuzzy Hash: E051D6B2504304ABD770EE60DC89FDBB3EEEB85300F04092DFA49D7146DA35A548C7A6
                              APIs
                                • Part of subcall function 006581DC: GetOEMCP.KERNEL32(00000000,?,?,00658465,?), ref: 00658207
                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,006584AA,?,00000000), ref: 0065867D
                              • GetCPInfo.KERNEL32(00000000,006584AA,?,?,?,006584AA,?,00000000), ref: 00658690
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CodeInfoPageValid
                              • String ID:
                              • API String ID: 546120528-0
                              • Opcode ID: f9f0070a25a45a09d4e885990b70d15dde89d35d15b693eee9b194dc86cfe9a8
                              • Instruction ID: 4054e706f4c75a5738bfcfc112f24bdd517bc31a2135e92e860be6e01e00aacc
                              • Opcode Fuzzy Hash: f9f0070a25a45a09d4e885990b70d15dde89d35d15b693eee9b194dc86cfe9a8
                              • Instruction Fuzzy Hash: EA5125709002059FDB208F71C8806FFBBE7AF45312F24406ED886ABA51EF75994ACB91
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00642111
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00642134
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Exception@8Throw
                              • String ID:
                              • API String ID: 2005118841-0
                              • Opcode ID: eb3b3af32b06b06a7a65145d10f9cd5802aa3a43880dada6c30b3ff9696099ac
                              • Instruction ID: e66761f33794b60f534610911bd05252b56f6a1fb339511e5486ffcd632395ca
                              • Opcode Fuzzy Hash: eb3b3af32b06b06a7a65145d10f9cd5802aa3a43880dada6c30b3ff9696099ac
                              • Instruction Fuzzy Hash: DC416EB0609383AFD328DF34D4907AAFBD6BB55704F50062EF65857242D771D888C7A6
                              APIs
                              • __EH_prolog.LIBCMT ref: 006313B4
                                • Part of subcall function 00635F9E: __EH_prolog.LIBCMT ref: 00635FA3
                                • Part of subcall function 0063C463: __EH_prolog.LIBCMT ref: 0063C468
                                • Part of subcall function 0063C463: new.LIBCMT ref: 0063C4AB
                                • Part of subcall function 0063C463: new.LIBCMT ref: 0063C4CF
                              • new.LIBCMT ref: 0063142C
                                • Part of subcall function 0063ACB6: __EH_prolog.LIBCMT ref: 0063ACBB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 1da45a42d7a1fb251ee5b4adcc1da02a488be901aac84bf6d3d92cb8c5f645bb
                              • Instruction ID: ba43d13e8aea2b348e99c228a75b1971dd65826f5f207e56a3b9b13f44fa4711
                              • Opcode Fuzzy Hash: 1da45a42d7a1fb251ee5b4adcc1da02a488be901aac84bf6d3d92cb8c5f645bb
                              • Instruction Fuzzy Hash: 224144B0905B40DEE720CF7988859E6FBE6FF29310F404A2ED5EE87282CB326154CB55
                              APIs
                              • __EH_prolog.LIBCMT ref: 006313B4
                                • Part of subcall function 00635F9E: __EH_prolog.LIBCMT ref: 00635FA3
                                • Part of subcall function 0063C463: __EH_prolog.LIBCMT ref: 0063C468
                                • Part of subcall function 0063C463: new.LIBCMT ref: 0063C4AB
                                • Part of subcall function 0063C463: new.LIBCMT ref: 0063C4CF
                              • new.LIBCMT ref: 0063142C
                                • Part of subcall function 0063ACB6: __EH_prolog.LIBCMT ref: 0063ACBB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 9cb7c281da0e8e67d71677d55f90913cc8324ccc831af6f309bd531accb0406c
                              • Instruction ID: e984f4aa68805347c238b60f261f17d73e40f1604fef9b113f2165eef690bc36
                              • Opcode Fuzzy Hash: 9cb7c281da0e8e67d71677d55f90913cc8324ccc831af6f309bd531accb0406c
                              • Instruction Fuzzy Hash: AD4134B0805B409EE720CF7984859E7FAE6FF28310F404A2ED5EE87282CB326154CB55
                              APIs
                                • Part of subcall function 0065630E: GetLastError.KERNEL32(?,0066CBE8,00652664,0066CBE8,?,?,00652203,?,?,0066CBE8), ref: 00656312
                                • Part of subcall function 0065630E: _free.LIBCMT ref: 00656345
                                • Part of subcall function 0065630E: SetLastError.KERNEL32(00000000,?,0066CBE8), ref: 00656386
                                • Part of subcall function 0065630E: _abort.LIBCMT ref: 0065638C
                                • Part of subcall function 00658567: _abort.LIBCMT ref: 00658599
                                • Part of subcall function 00658567: _free.LIBCMT ref: 006585CD
                                • Part of subcall function 006581DC: GetOEMCP.KERNEL32(00000000,?,?,00658465,?), ref: 00658207
                              • _free.LIBCMT ref: 006584C0
                              • _free.LIBCMT ref: 006584F6
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$ErrorLast_abort
                              • String ID:
                              • API String ID: 2991157371-0
                              • Opcode ID: a5235e63780ce12f7797238d750fd4fb035052a42219c2e3b8b8eef2670fba96
                              • Instruction ID: f84f473d9932b108a2d681a9a67ff2d51f4f9250d8c372388350e23d413b6168
                              • Opcode Fuzzy Hash: a5235e63780ce12f7797238d750fd4fb035052a42219c2e3b8b8eef2670fba96
                              • Instruction Fuzzy Hash: D731D131904105AFDB10EBA8D441BADB7F6EF40322F25409DED04AB7A1EF359E48CB54
                              APIs
                              • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00639BD7,?,?,00637735), ref: 006395C9
                              • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00639BD7,?,?,00637735), ref: 006395FE
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 060d4e07d2a8e07cf094c9ca2b16080599c9ba65cb81cc40fdd6f34f24852954
                              • Instruction ID: 18bd6f4c4157fbb2d631def8e78e42ca7626fc1c4ed0b0ad756d5784dfd417de
                              • Opcode Fuzzy Hash: 060d4e07d2a8e07cf094c9ca2b16080599c9ba65cb81cc40fdd6f34f24852954
                              • Instruction Fuzzy Hash: 9621E6B1404748AEE7318F24CC45BE777E9EB05764F00492DF5D582291C3B4AC898AB1
                              APIs
                              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,00637436,?,?,?), ref: 00639A7C
                              • SetFileTime.KERNELBASE(?,?,?,?), ref: 00639B2C
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: File$BuffersFlushTime
                              • String ID:
                              • API String ID: 1392018926-0
                              • Opcode ID: c175445f82cb72c83de8eaac2f2f09103a58df87962b160c59ab76aa5a8e8673
                              • Instruction ID: cf36e30656411c2dffd4e42fbe22d4084416121ff5ec8a688d45ae706c18d404
                              • Opcode Fuzzy Hash: c175445f82cb72c83de8eaac2f2f09103a58df87962b160c59ab76aa5a8e8673
                              • Instruction Fuzzy Hash: E021B431158285ABD714DB24C891AEABBE5AF96704F084A1DF8D5C7241D3A9DD08CBE1
                              APIs
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00657786
                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00657793
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AddressProc__crt_fast_encode_pointer
                              • String ID:
                              • API String ID: 2279764990-0
                              • Opcode ID: b56c1aeb29962fdca713cb64ff34f7f57b57777fc5b26b19baff54e761f6cd51
                              • Instruction ID: d5efbf59c96ad1be718294febb15e69b03af9a682a715113ce500c0312d3d5b0
                              • Opcode Fuzzy Hash: b56c1aeb29962fdca713cb64ff34f7f57b57777fc5b26b19baff54e761f6cd51
                              • Instruction Fuzzy Hash: 84110637A041209FAB259E68FC9099A7397AB89722F164230FC15EB354E731EC458BD1
                              APIs
                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00639B71
                              • GetLastError.KERNEL32 ref: 00639B7D
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: 9f1ecf7eab7a798374227d994211e94471ec918e5105bc1db05743325e21f0f3
                              • Instruction ID: 3002ecbf32bb2c6491ebcd413e65b6f41dbff6d563675a379cd5dcd7e9c77df6
                              • Opcode Fuzzy Hash: 9f1ecf7eab7a798374227d994211e94471ec918e5105bc1db05743325e21f0f3
                              • Instruction Fuzzy Hash: 3B0152717052046BEB349E29EC447ABF7DB9B84719F14853EF153C3680DAB5DC0D8A61
                              APIs
                              • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 0063993B
                              • GetLastError.KERNEL32 ref: 00639948
                                • Part of subcall function 006396FA: __EH_prolog.LIBCMT ref: 006396FF
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorFileH_prologLastPointer
                              • String ID:
                              • API String ID: 4236474358-0
                              • Opcode ID: 01371a5c3662f332ab90a7e1bf109e80a6613a24f232c56b80705d5adf17446c
                              • Instruction ID: aa35e444be0153af2e8e9466ddeea2a7588d75a35486c4567ba28ea405a59456
                              • Opcode Fuzzy Hash: 01371a5c3662f332ab90a7e1bf109e80a6613a24f232c56b80705d5adf17446c
                              • Instruction Fuzzy Hash: 020192322051099B9F189E199C447EB776BBF52321B0C422DE92A8B3D1D6B0EC019EF0
                              APIs
                              • _free.LIBCMT ref: 00655AFB
                                • Part of subcall function 006559EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,0065239A,?,0000015D,?,?,?,?,00652F19,000000FF,00000000,?,?), ref: 00655A1E
                              • HeapReAlloc.KERNEL32(00000000,?,00200000,?,?,0066CBE8,006317D2,?,?,?,?,00000000,?,006313A9,?,?), ref: 00655B37
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Heap$AllocAllocate_free
                              • String ID:
                              • API String ID: 2447670028-0
                              • Opcode ID: fdc78dcad5c49eab280187bb5e25a5a931b9a631e149e64551dc858a4a80740e
                              • Instruction ID: 32582671a7e557a0c4f2b0a8f72fb912bdc3f23ec3a1c5597a66cd4c8fcfd3d1
                              • Opcode Fuzzy Hash: fdc78dcad5c49eab280187bb5e25a5a931b9a631e149e64551dc858a4a80740e
                              • Instruction Fuzzy Hash: C8F0C2316119166ADB712A25AC3DEAB375F8F82773F10421AFC17962A0EE30990981A4
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?), ref: 0063FCA1
                              • GetProcessAffinityMask.KERNEL32(00000000), ref: 0063FCA8
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Process$AffinityCurrentMask
                              • String ID:
                              • API String ID: 1231390398-0
                              • Opcode ID: 68bb656d332ea6f73abcea73b574b8fdbd94e144f6bbad4162d76b2d85d409ab
                              • Instruction ID: 3ed98ce657edef9ea73347147e5d3940a166d32c3f1c76b4845a6fac7622f4d8
                              • Opcode Fuzzy Hash: 68bb656d332ea6f73abcea73b574b8fdbd94e144f6bbad4162d76b2d85d409ab
                              • Instruction Fuzzy Hash: 1AE06D32E8010E679B088BA89C059EB729EDB14201F20257AEC07D3315E964DD4247E4
                              APIs
                                • Part of subcall function 006589A0: GetEnvironmentStringsW.KERNEL32 ref: 006589A9
                                • Part of subcall function 006589A0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006589CC
                                • Part of subcall function 006589A0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 006589F2
                                • Part of subcall function 006589A0: _free.LIBCMT ref: 00658A05
                                • Part of subcall function 006589A0: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00658A14
                              • _free.LIBCMT ref: 00654EBA
                              • _free.LIBCMT ref: 00654EC1
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                              • String ID:
                              • API String ID: 400815659-0
                              • Opcode ID: d8c45b17fc3bec50ff7e550511059ded809909be945988d78ec7e731c7b4c941
                              • Instruction ID: 0e60a179de4affbd2531828c79b76f5bc06750250819f4cff2d6c2ba06ae56d7
                              • Opcode Fuzzy Hash: d8c45b17fc3bec50ff7e550511059ded809909be945988d78ec7e731c7b4c941
                              • Instruction Fuzzy Hash: 06E0EC22A0590145A7B171BD6C1B65B16075BC133BF11075EFC10971D2DD54448E119F
                              APIs
                              • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00639F49,?,?,?,00639DE2,?,00000001,00000000,?,?), ref: 0063A127
                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00639F49,?,?,?,00639DE2,?,00000001,00000000,?,?), ref: 0063A158
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: c890c545018fcefbc21d0d3d9674074617fb4a5f4186643cd5bb838141b7b02c
                              • Instruction ID: fe48f9617bdaf663a3d43e33b301b8481acc7ea6e7cc9aae3222b7f31f9761bb
                              • Opcode Fuzzy Hash: c890c545018fcefbc21d0d3d9674074617fb4a5f4186643cd5bb838141b7b02c
                              • Instruction Fuzzy Hash: DEF030352411097BEF515FA0DC41BEB776EAF04385F448065FD88D6260DB72DAA8AB90
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ItemText_swprintf
                              • String ID:
                              • API String ID: 3011073432-0
                              • Opcode ID: dce83a7446c6eede1f22945917e9a14b3a46784f9bb1422e309af799b3d15efb
                              • Instruction ID: 4e4670804e8d520a6750dc963b8078467b39b8dda7153f15520da9b41806ccef
                              • Opcode Fuzzy Hash: dce83a7446c6eede1f22945917e9a14b3a46784f9bb1422e309af799b3d15efb
                              • Instruction Fuzzy Hash: D5F0EC72550348BBE751A7A09C07FDB3B1FA704741F04445AB605921A2D6725A609BB9
                              APIs
                              • DeleteFileW.KERNELBASE(?,?,?,00639661,?,?,006394BC), ref: 00639E0D
                              • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00639661,?,?,006394BC), ref: 00639E3B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: a0d256ab3fcfa4055e08050f60b8ccf26faa37632992e54c128cc56c81ce7849
                              • Instruction ID: 02cbeae6b9b13a105e963e8db91e341007702db381f36281c5e36f4bd0402869
                              • Opcode Fuzzy Hash: a0d256ab3fcfa4055e08050f60b8ccf26faa37632992e54c128cc56c81ce7849
                              • Instruction Fuzzy Hash: 10E09231641209ABEB11AF61DC41BEB779FAF08781F844065F988C2150DBB1DD949EA4
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,?,?,00639E58,?,006375A0,?,?,?,?), ref: 00639E74
                              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00639E58,?,006375A0,?,?,?,?), ref: 00639EA0
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: e420442383343815e347b7385873552614c134c766c0c79c7b628fc8c4f5cbe2
                              • Instruction ID: edc79005825e73eccb103ea849387b55a994709bad3d5472d51e71097562699f
                              • Opcode Fuzzy Hash: e420442383343815e347b7385873552614c134c766c0c79c7b628fc8c4f5cbe2
                              • Instruction Fuzzy Hash: DAE09B365001185BDB51AB68DC05BDA776E9F083F2F000271FD48E3290D7B19D948BD0
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0063F376
                              • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0063DF18,Crypt32.dll,?,0063DF9C,?,0063DF7E,?,?,?,?), ref: 0063F398
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystem
                              • String ID:
                              • API String ID: 1175261203-0
                              • Opcode ID: e5279dd454544292a4d9fdf8cda6bb497ae0c1ae3753642a126ab351550ddfcd
                              • Instruction ID: 7260f2223ce352239903bec2b29f5e63f413de5d2a41bf11b3bfaac5550fb6a3
                              • Opcode Fuzzy Hash: e5279dd454544292a4d9fdf8cda6bb497ae0c1ae3753642a126ab351550ddfcd
                              • Instruction Fuzzy Hash: D3E0127281111C67DB519BA4DC05FD7776DEB08391F0444A5F948D2105DAB499808BF4
                              APIs
                              • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00648944
                              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0064894B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: BitmapCreateFromGdipStream
                              • String ID:
                              • API String ID: 1918208029-0
                              • Opcode ID: 4f1a76fa1b1a23d66458e4279ceec892368b9347a59b4833eea27ce45766de34
                              • Instruction ID: 2f2f63f28aeda9df0574e897c86ff4f86adb86479bfd80e034878bca60220740
                              • Opcode Fuzzy Hash: 4f1a76fa1b1a23d66458e4279ceec892368b9347a59b4833eea27ce45766de34
                              • Instruction Fuzzy Hash: EBE0ED75905218EFCB60EF99C901BEDBBE9EF04761F10806EE85593701D6716E04EB92
                              APIs
                              • GdiplusShutdown.GDIPLUS(?,?,?,0065F605,000000FF), ref: 006490C6
                              • OleUninitialize.OLE32(?,?,?,0065F605,000000FF), ref: 006490CB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: GdiplusShutdownUninitialize
                              • String ID:
                              • API String ID: 3856339756-0
                              • Opcode ID: 14454d320d8f9ceb7e17b1995278ab844232a64a7d6a73b728804615cfcf8c40
                              • Instruction ID: c83719eb97a36cd97235a47def29b7288a4abb84ae70786e8e06534ac2f116c1
                              • Opcode Fuzzy Hash: 14454d320d8f9ceb7e17b1995278ab844232a64a7d6a73b728804615cfcf8c40
                              • Instruction Fuzzy Hash: 66E01A32948644DFC351DF88DD05B45BBEAFB09B20F104769B81A93B60DB796844CA95
                              APIs
                                • Part of subcall function 00651D87: try_get_function.LIBVCRUNTIME ref: 00651D9C
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00650C64
                              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00650C6F
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                              • String ID:
                              • API String ID: 806969131-0
                              • Opcode ID: d3ecc20f1e49b163351f5b2f7e8ac412579597a74fa636573714f5183eb1c8b7
                              • Instruction ID: 44b70c57d94fd9ea58e96e2bee388a381330dac5da279a6523e54e94eb127a52
                              • Opcode Fuzzy Hash: d3ecc20f1e49b163351f5b2f7e8ac412579597a74fa636573714f5183eb1c8b7
                              • Instruction Fuzzy Hash: 3DD0A9BD24830218798436B0A80258A13435E137B7F60134EEC208D6D2EEB2C04F651A
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ItemShowWindow
                              • String ID:
                              • API String ID: 3351165006-0
                              • Opcode ID: 11fa087c8991d459688e9fac6f126d806b4b5eed863fc7d556b1b0b2b8274d61
                              • Instruction ID: 34980896887c762ed77f5e9f205108505fead11f8c7e64dcae26a68a40fff899
                              • Opcode Fuzzy Hash: 11fa087c8991d459688e9fac6f126d806b4b5eed863fc7d556b1b0b2b8274d61
                              • Instruction Fuzzy Hash: 59C01232058200BFCB010BB0DC09C2EBBAAEBA5212F00C908F4A5D00A4C238C020DF12
                              APIs
                              • EnterCriticalSection.KERNEL32(00671E74,?,?,0063A5F0,?,?,?,?,0065F605,000000FF), ref: 0063FC4B
                              • LeaveCriticalSection.KERNEL32(00671E74,?,?,0063A5F0,?,?,?,?,0065F605,000000FF), ref: 0063FC89
                                • Part of subcall function 0063FA23: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 0063FA57
                                • Part of subcall function 0063FA23: FindCloseChangeNotification.KERNELBASE(00D5E12C,00D5E12C), ref: 0063FA71
                                • Part of subcall function 0063FA23: DeleteCriticalSection.KERNEL32(00D5E2C8), ref: 0063FA8A
                                • Part of subcall function 0063FA23: FindCloseChangeNotification.KERNELBASE(?), ref: 0063FA96
                                • Part of subcall function 0063FA23: CloseHandle.KERNEL32(?), ref: 0063FAA2
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CloseCriticalSection$ChangeFindNotification$DeleteEnterHandleLeaveReleaseSemaphore
                              • String ID:
                              • API String ID: 2076764878-0
                              • Opcode ID: 35ccd6be82f0ab6da62aed051a054b33fff9ecf46eb6d3b1ced6862f324cf976
                              • Instruction ID: e2b5d710e427823a98cb6c455d1aa5c1913e83991eadc516587ab4540bb9d556
                              • Opcode Fuzzy Hash: 35ccd6be82f0ab6da62aed051a054b33fff9ecf46eb6d3b1ced6862f324cf976
                              • Instruction Fuzzy Hash: 79F0A032A412109BD3155B18E9056EF766BAB86B65F04A03EFC086B290CBB08C41CBE5
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: bee0fce899c691cb1832f8bc90ae416d03b769969932c1e46fad9db357e796f9
                              • Instruction ID: 77dc1089f00af1f5d0c8d99771e28c618a448d688d7dad7659c7e157975fc63d
                              • Opcode Fuzzy Hash: bee0fce899c691cb1832f8bc90ae416d03b769969932c1e46fad9db357e796f9
                              • Instruction Fuzzy Hash: D4B19E70A04646AFEB29CF78C444AF9FBA7BF07304F14425AE4569B381CB35A964CBD1
                              APIs
                              • __EH_prolog.LIBCMT ref: 006381F2
                                • Part of subcall function 006313AF: __EH_prolog.LIBCMT ref: 006313B4
                                • Part of subcall function 006313AF: new.LIBCMT ref: 0063142C
                                • Part of subcall function 006319E2: __EH_prolog.LIBCMT ref: 006319E7
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 5414fba5ec5207d107594e1757ebbc22166f101893bc2edca3a244808166c411
                              • Instruction ID: 4eef44392f2d5fdb45fc835ef45ff051cf743b60fb91e1cfea100f445b57cb9c
                              • Opcode Fuzzy Hash: 5414fba5ec5207d107594e1757ebbc22166f101893bc2edca3a244808166c411
                              • Instruction Fuzzy Hash: 2041B2719407549EEB20EBA0C851BEAB36AAF50700F0400EEF58A97292DF745FC8DB94
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 8b22ee87311c5cab7bb702efa61b5ed43d6aa2bed2a56ffa1e356ebf4cfc82e2
                              • Instruction ID: 098c98d09e5debe9f84f8b19c6ccb2d9eb04a9641adc040968f75ec728145689
                              • Opcode Fuzzy Hash: 8b22ee87311c5cab7bb702efa61b5ed43d6aa2bed2a56ffa1e356ebf4cfc82e2
                              • Instruction Fuzzy Hash: 5E21E6B1E40216ABDB149FB9CC51AAB766AEF08714F10453EF505EB681D7B49E00C6A8
                              APIs
                              • __EH_prolog.LIBCMT ref: 00649489
                                • Part of subcall function 006313AF: __EH_prolog.LIBCMT ref: 006313B4
                                • Part of subcall function 006313AF: new.LIBCMT ref: 0063142C
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 45992861ac51bb4e2bb47d2fa998b22952ff9492a8527610f547d43858f7eb2b
                              • Instruction ID: 0551dc3ad4f1da68938c87ab1ec227907f2f0b5eea55c6b83e57c4680a23170b
                              • Opcode Fuzzy Hash: 45992861ac51bb4e2bb47d2fa998b22952ff9492a8527610f547d43858f7eb2b
                              • Instruction Fuzzy Hash: 40213B71C052499ECF55DFA4D9529EEBBF6AF1A300F1000AEE809A7242D7356E06DBA4
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: ced9050eff72e375eb627fa1f9571c1a124763e8889dfffbce9a1e6ddb310b74
                              • Instruction ID: d7ca305375f4040bb280c56cc4ecb6bdd1d1495b971924308c1d4dc4835e0b53
                              • Opcode Fuzzy Hash: ced9050eff72e375eb627fa1f9571c1a124763e8889dfffbce9a1e6ddb310b74
                              • Instruction Fuzzy Hash: D3117073E009299BCB12AF68CC919DEBB37AF88750F004529FC05B7211CA708D148BE4
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,0065239A,?,0000015D,?,?,?,?,00652F19,000000FF,00000000,?,?), ref: 00655A1E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 7881ffb6389d183694f81545168c39b1e172c28ce1b6ee3b97e9f6854f1d5a45
                              • Instruction ID: d211ecce3e57b4a7d733d77f05e73f038ac90f73495d46d410daf14bd009135d
                              • Opcode Fuzzy Hash: 7881ffb6389d183694f81545168c39b1e172c28ce1b6ee3b97e9f6854f1d5a45
                              • Instruction Fuzzy Hash: DBE0E531120A216BE72126629C6E7DA364F9F023A3F010328AC0792690EB50CD0885A4
                              APIs
                              • __EH_prolog.LIBCMT ref: 00635B0A
                                • Part of subcall function 0063ACB6: __EH_prolog.LIBCMT ref: 0063ACBB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 3a42631f320c44215b48ef62f5b07eebf016351144ba6ed536578997e3121474
                              • Instruction ID: 387af3437210928b464fbf83901a87a133f0da1bc13af37d56e1d079cf8e81bc
                              • Opcode Fuzzy Hash: 3a42631f320c44215b48ef62f5b07eebf016351144ba6ed536578997e3121474
                              • Instruction Fuzzy Hash: C0018134901A89DAC744EBA8D4157DEFBE69F15300F0081ADA85A63286CFB42B08C7E7
                              APIs
                              • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,006394C3), ref: 0063950E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ChangeCloseFindNotification
                              • String ID:
                              • API String ID: 2591292051-0
                              • Opcode ID: 5c814943b966d8e0d0dbe3bdc68adf8e0c8c8a1b6f39eca1e3c6303c3c80bdb5
                              • Instruction ID: 95b60c1ed5a3c186022a465fc1ced0b768ffa6f69c14378998b75c3dbd4a66dd
                              • Opcode Fuzzy Hash: 5c814943b966d8e0d0dbe3bdc68adf8e0c8c8a1b6f39eca1e3c6303c3c80bdb5
                              • Instruction Fuzzy Hash: C0F0E271582B445FDF318A34D9487D2B7E69B12735F048B1ED0E643AE0C3B1A888CFA0
                              APIs
                              • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0063A1C4
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CloseFind
                              • String ID:
                              • API String ID: 1863332320-0
                              • Opcode ID: 9c468626dd00adfadcb0aac480bdedf295a36305055294b1a492995a1fc1a787
                              • Instruction ID: dc435ca5db95f0873a683f18cc126e63e1147e5f89872ec10a1e3e40376393be
                              • Opcode Fuzzy Hash: 9c468626dd00adfadcb0aac480bdedf295a36305055294b1a492995a1fc1a787
                              • Instruction Fuzzy Hash: 5CF08935408790EECA625BF44405BC7BB975F15331F048E4DF1FD122D1C2B554999BB2
                              APIs
                              • __EH_prolog.LIBCMT ref: 00631EC4
                                • Part of subcall function 00631927: __EH_prolog.LIBCMT ref: 0063192C
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: c9cf32c143d60d73fdc5452f5d7f291d1552d15eb4e03628421aafaa3cbcb4c7
                              • Instruction ID: 2fab902ec9f12205be380aed6120126dfc39722a31fe73854c372016d7f439a2
                              • Opcode Fuzzy Hash: c9cf32c143d60d73fdc5452f5d7f291d1552d15eb4e03628421aafaa3cbcb4c7
                              • Instruction Fuzzy Hash: 08F098B1D012898ECF81DFA8C546AEEBBF5AB1A300F0445BED519E7202E73556148B95
                              APIs
                              • __EH_prolog.LIBCMT ref: 00631EC4
                                • Part of subcall function 00631927: __EH_prolog.LIBCMT ref: 0063192C
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 9174b26c55bc6689883bf4742441a397630375c3705d662e38516824eb19a35e
                              • Instruction ID: 3f75a6623cd30e48345190086597fb737fe8e0993cf33745088f3fb9213721bc
                              • Opcode Fuzzy Hash: 9174b26c55bc6689883bf4742441a397630375c3705d662e38516824eb19a35e
                              • Instruction Fuzzy Hash: BFF092B1C012488ECF81DFA8C946AEEBBF1AB1A200F0445BED409A7202EB3556048B95
                              APIs
                              • SetThreadExecutionState.KERNEL32(00000001), ref: 0063F979
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ExecutionStateThread
                              • String ID:
                              • API String ID: 2211380416-0
                              • Opcode ID: 85ba79bfa77104cf214bf0091eeb93997f7a9f92f31a784ebab1965e3be25132
                              • Instruction ID: 293126b0d198f5ba401bf319395b07db35ae3ffb0549a38d4245c6c3e41bd3a1
                              • Opcode Fuzzy Hash: 85ba79bfa77104cf214bf0091eeb93997f7a9f92f31a784ebab1965e3be25132
                              • Instruction Fuzzy Hash: 27D02B00B0007035EB513728AC0ABFD15070FC2360F0D107DF186672D2CAD5084256E2
                              APIs
                              • GdipAlloc.GDIPLUS(00000010), ref: 00648B6A
                                • Part of subcall function 00648923: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00648944
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Gdip$AllocBitmapCreateFromStream
                              • String ID:
                              • API String ID: 1915507550-0
                              • Opcode ID: b3ecc342144db532c8dedf8b776bc33c6e15ccf428a3dce563ad8a90b77a80c7
                              • Instruction ID: d53c504b2cbb6f2fe2b35401738b9e8365c31f6b430071d711b3574e04822164
                              • Opcode Fuzzy Hash: b3ecc342144db532c8dedf8b776bc33c6e15ccf428a3dce563ad8a90b77a80c7
                              • Instruction Fuzzy Hash: EED0A77060110D7FDF817B658C029BD7B9AEB01360F008139BC0487250FE71CD10B256
                              APIs
                              • GetFileType.KERNELBASE(000000FF,0063969C), ref: 00639776
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID:
                              • API String ID: 3081899298-0
                              • Opcode ID: 82d926efd74f9b6e147a6e92eed26681fa65a640235a469ccaa3526992f354c8
                              • Instruction ID: 020b17384069df29c45b9bba35eb49fff24ac8935850859e4529e909adff7ac7
                              • Opcode Fuzzy Hash: 82d926efd74f9b6e147a6e92eed26681fa65a640235a469ccaa3526992f354c8
                              • Instruction Fuzzy Hash: BAD01230021200558F690E345D0A0A66673DB833A6F28DAE4E025C41F1C7B2CC43F990
                              APIs
                              • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 0064BF9B
                                • Part of subcall function 0064991D: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0064992E
                                • Part of subcall function 0064991D: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0064993F
                                • Part of subcall function 0064991D: TranslateMessage.USER32(?), ref: 00649949
                                • Part of subcall function 0064991D: DispatchMessageW.USER32(?), ref: 00649953
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Message$DispatchItemPeekSendTranslate
                              • String ID:
                              • API String ID: 4142818094-0
                              • Opcode ID: 66cba75d74988e98394fe96edf72922a8ad40b3dee1ebbdec9c5a4c2ea80a37e
                              • Instruction ID: 71c6a8b5c806250adb8ebefcc006ec71d8b27a00d4365d58a8febc0496a4ca1c
                              • Opcode Fuzzy Hash: 66cba75d74988e98394fe96edf72922a8ad40b3dee1ebbdec9c5a4c2ea80a37e
                              • Instruction Fuzzy Hash: 73D09E31144200AADB012B91CD06F0B7AA7FB88B04F404558B344340F1C6629D20EF56
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 93edabf0331fcfb83de69afad2a092a3d98a2cf363146f8394bdb6acabfd7446
                              • Instruction ID: 9dc39f62f6b3c019004fde16718bf19a04459301757dfc195fb100d2a13b4ea5
                              • Opcode Fuzzy Hash: 93edabf0331fcfb83de69afad2a092a3d98a2cf363146f8394bdb6acabfd7446
                              • Instruction Fuzzy Hash: BCD0CA70410221DFE7A08F28E804782BBE5BF28311B22883ED0CAC2224E2B08880CF80
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 368aaa620f6cf794487e3b8ebdc6d7b69ff5e3111021b614394be7f33c1a42b1
                              • Instruction ID: 3b6f1df5588910fe4bf6d90b8252a3947e4bf876c510ded64375274bd668dad7
                              • Opcode Fuzzy Hash: 368aaa620f6cf794487e3b8ebdc6d7b69ff5e3111021b614394be7f33c1a42b1
                              • Instruction Fuzzy Hash: 15B012E526A4056D73C4E1946D16C37010FC1C0F30330821FF401C1341E8409D4A0436
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: d476f61c8b48813582ce165acd18e87fef102ec1136e53ed9b0729e39ca50f0d
                              • Instruction ID: 42f3bed47835ad6008b27a42cc6f67bd90c402f459abfbcb743fe952a12248e1
                              • Opcode Fuzzy Hash: d476f61c8b48813582ce165acd18e87fef102ec1136e53ed9b0729e39ca50f0d
                              • Instruction Fuzzy Hash: 55B012E126A5056D73C4E5992D16C36010FC0C0F30330C11FF800C1341E8405E4A0832
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: c092098d482c8989c5fa351a16cb3bea45d70fa65f0a23ae6f4e0463cce5a2bb
                              • Instruction ID: 62fda44abcfa8714d8cfa7a8dc79428e78741fe7f8983cd35cba198aa8231807
                              • Opcode Fuzzy Hash: c092098d482c8989c5fa351a16cb3bea45d70fa65f0a23ae6f4e0463cce5a2bb
                              • Instruction Fuzzy Hash: C9B012E125A6056E73C4E1993F26C37010FC0C0F30330811FF400C1341E8404E4B0832
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 16619cf1d89c251237ba9c890f502bf2b7ac7aeb77aaf0fcd177ccdab3e716d4
                              • Instruction ID: 59bbf743693883cd3847da1f3022a68c548cbf64ff9ab3f4140c72a93d18a8cd
                              • Opcode Fuzzy Hash: 16619cf1d89c251237ba9c890f502bf2b7ac7aeb77aaf0fcd177ccdab3e716d4
                              • Instruction Fuzzy Hash: F2B012E125A6057D73C4A1952D56C36010FC0C5F30330821FF400D0341E8404E8A4832
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C798
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: a5e518149bd1e72d619e971b17c06f75715ca41a23aca7ed00cfe694cc088abd
                              • Instruction ID: aa3411a8ff4c00cb1dd4e2455e2caa480611d9d68bd4271fae45a5245494cc8d
                              • Opcode Fuzzy Hash: a5e518149bd1e72d619e971b17c06f75715ca41a23aca7ed00cfe694cc088abd
                              • Instruction Fuzzy Hash: 46B012E127A108AD73C4D2A72C1AC36050FC1C4F30330C11FF400C1340E8400D46063E
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C798
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 0b776240573afdc9aee10b53e9dd4196b40f54cd4628e6df2706c175bb4abcfc
                              • Instruction ID: 40659f98444ceaad31e2082037fc1900fb241a2330802fc10e1d342c5dfc4630
                              • Opcode Fuzzy Hash: 0b776240573afdc9aee10b53e9dd4196b40f54cd4628e6df2706c175bb4abcfc
                              • Instruction Fuzzy Hash: 72B092A126A004AD728496A5690A836050FC084F20320811AB400C2240A840094A053A
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C798
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: bdb4c2573a855821964a2582381c515cdaca2e4479ab8fe5dae39b047ef9f95a
                              • Instruction ID: 7adabf89032ee30e61b6a6523dd6700a01c914f858a99582f11494076c3777d5
                              • Opcode Fuzzy Hash: bdb4c2573a855821964a2582381c515cdaca2e4479ab8fe5dae39b047ef9f95a
                              • Instruction Fuzzy Hash: 3CB012F127A104BD73C4D6A16C0AC36050FC0C1F30330C11FF800D1240A8402D4A043E
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 4e595145fe68774a93ea2087c02083a2dfc42df176fdc78aa74689b5a4115ae3
                              • Instruction ID: cd3781115ec9215e74c38418fb43a6b2966d12a5659dd457f51f0c245f946c0e
                              • Opcode Fuzzy Hash: 4e595145fe68774a93ea2087c02083a2dfc42df176fdc78aa74689b5a4115ae3
                              • Instruction Fuzzy Hash: 0BA002D515A5167D72C4A1516D16C76011EC4C5F71331851EF501C5241A940594A1475
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 64654d93fb012b8a1a5355d760d083f2362cbf33f771425ec1e2041f342b700f
                              • Instruction ID: cd3781115ec9215e74c38418fb43a6b2966d12a5659dd457f51f0c245f946c0e
                              • Opcode Fuzzy Hash: 64654d93fb012b8a1a5355d760d083f2362cbf33f771425ec1e2041f342b700f
                              • Instruction Fuzzy Hash: 0BA002D515A5167D72C4A1516D16C76011EC4C5F71331851EF501C5241A940594A1475
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 41533ca9bd8ecb74a77c7b82024f7e788253c9684006758df2e9ac6693f87048
                              • Instruction ID: cd3781115ec9215e74c38418fb43a6b2966d12a5659dd457f51f0c245f946c0e
                              • Opcode Fuzzy Hash: 41533ca9bd8ecb74a77c7b82024f7e788253c9684006758df2e9ac6693f87048
                              • Instruction Fuzzy Hash: 0BA002D515A5167D72C4A1516D16C76011EC4C5F71331851EF501C5241A940594A1475
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C798
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: a0cd1218abb3d69b789cace0d62194d429a05ff7bab5ac0cda166b4c90434e1c
                              • Instruction ID: 2ece0ada5e12ce1735c1ef88acfa6fe0f0287005ee620d53020088d1f9fe5445
                              • Opcode Fuzzy Hash: a0cd1218abb3d69b789cace0d62194d429a05ff7bab5ac0cda166b4c90434e1c
                              • Instruction Fuzzy Hash: 87A002D517A545BD728492616D1AC36051EC4C5F71331851EF501C5241694019461579
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C798
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: 52c1aa64e26798fdfc5d5dffea1a90af328a5e6c9ec4c4b03b5d4039e7afe2a7
                              • Instruction ID: 2ece0ada5e12ce1735c1ef88acfa6fe0f0287005ee620d53020088d1f9fe5445
                              • Opcode Fuzzy Hash: 52c1aa64e26798fdfc5d5dffea1a90af328a5e6c9ec4c4b03b5d4039e7afe2a7
                              • Instruction Fuzzy Hash: 87A002D517A545BD728492616D1AC36051EC4C5F71331851EF501C5241694019461579
                              APIs
                              • ___delayLoadHelper2@8.DELAYIMP ref: 0064C737
                                • Part of subcall function 0064CABB: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0064CB38
                                • Part of subcall function 0064CABB: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0064CB49
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                              • String ID:
                              • API String ID: 1269201914-0
                              • Opcode ID: b2ade6ef58f2c6c371e7352e3732f0787328b428b3b3e93ed870d9c1de1fec01
                              • Instruction ID: cd3781115ec9215e74c38418fb43a6b2966d12a5659dd457f51f0c245f946c0e
                              • Opcode Fuzzy Hash: b2ade6ef58f2c6c371e7352e3732f0787328b428b3b3e93ed870d9c1de1fec01
                              • Instruction Fuzzy Hash: 0BA002D515A5167D72C4A1516D16C76011EC4C5F71331851EF501C5241A940594A1475
                              APIs
                                • Part of subcall function 006312E7: GetDlgItem.USER32(00000000,00003021), ref: 0063132B
                                • Part of subcall function 006312E7: SetWindowTextW.USER32(00000000,006602E4), ref: 00631341
                              • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0064A5C7
                              • EndDialog.USER32(?,00000006), ref: 0064A5DA
                              • GetDlgItem.USER32(?,0000006C), ref: 0064A5F6
                              • SetFocus.USER32(00000000), ref: 0064A5FD
                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 0064A63D
                              • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0064A670
                              • FindFirstFileW.KERNEL32(?,?), ref: 0064A686
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0064A6A4
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0064A6B4
                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0064A6D1
                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0064A6EF
                                • Part of subcall function 0063D192: LoadStringW.USER32(?,?,00000200,?), ref: 0063D1D7
                                • Part of subcall function 0063D192: LoadStringW.USER32(?,?,00000200,?), ref: 0063D1ED
                              • _swprintf.LIBCMT ref: 0064A71F
                                • Part of subcall function 00633F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00633F3E
                              • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0064A732
                              • FindClose.KERNEL32(00000000), ref: 0064A735
                              • _swprintf.LIBCMT ref: 0064A790
                              • SetDlgItemTextW.USER32(?,00000068,?), ref: 0064A7A3
                              • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0064A7B9
                              • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0064A7D9
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0064A7E9
                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0064A803
                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0064A81B
                              • _swprintf.LIBCMT ref: 0064A84C
                              • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0064A85F
                              • _swprintf.LIBCMT ref: 0064A8AF
                              • SetDlgItemTextW.USER32(?,00000069,?), ref: 0064A8C2
                                • Part of subcall function 0064932E: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00649354
                                • Part of subcall function 0064932E: GetNumberFormatW.KERNEL32(00000400,00000000,?,0066A154,?,?), ref: 006493A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                              • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                              • API String ID: 3227067027-1840816070
                              • Opcode ID: 33d53ea576fcd1614af99b8d5618b1ff54ab1f026c6fc23e40f8a0067c3b4bf0
                              • Instruction ID: cebe4fa6578ea5f5d337d73c08409db040edffa282fd73966fe8a5656c052091
                              • Opcode Fuzzy Hash: 33d53ea576fcd1614af99b8d5618b1ff54ab1f026c6fc23e40f8a0067c3b4bf0
                              • Instruction Fuzzy Hash: 7F919372588348BBE3219BE0CD49FFB77AEEB4A700F044919F649D6181D771AA058B63
                              APIs
                              • __EH_prolog.LIBCMT ref: 00637075
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 006371D5
                              • CloseHandle.KERNEL32(00000000), ref: 006371E5
                                • Part of subcall function 00637A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00637AAC
                                • Part of subcall function 00637A9D: GetLastError.KERNEL32 ref: 00637AF2
                                • Part of subcall function 00637A9D: CloseHandle.KERNEL32(?), ref: 00637B01
                              • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 006371F0
                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 006372FE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 0063732A
                              • CloseHandle.KERNEL32(?), ref: 0063733C
                              • GetLastError.KERNEL32(00000015,00000000,?), ref: 0063734C
                              • RemoveDirectoryW.KERNEL32(?), ref: 00637398
                              • DeleteFileW.KERNEL32(?), ref: 006373C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                              • API String ID: 3935142422-3508440684
                              • Opcode ID: 12ce12ccf04cf6058146ce53f1d8a0569884b57277685870babf5228731ea520
                              • Instruction ID: 9dc3dd51d5392a9f23707c3168d2b70e631d0db64a2fb8a742fc623be773c506
                              • Opcode Fuzzy Hash: 12ce12ccf04cf6058146ce53f1d8a0569884b57277685870babf5228731ea520
                              • Instruction Fuzzy Hash: ABB1C2B1904218AFEB20DF64DC45BEF77BAEF09300F1444A9F919E7242D770AA45CBA4
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 006595C2
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 0065917A
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 0065918C
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 0065919E
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 006591B0
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 006591C2
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 006591D4
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 006591E6
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 006591F8
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 0065920A
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 0065921C
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 0065922E
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 00659240
                                • Part of subcall function 0065915D: _free.LIBCMT ref: 00659252
                              • _free.LIBCMT ref: 006595B7
                                • Part of subcall function 006559B2: RtlFreeHeap.NTDLL(00000000,00000000,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?), ref: 006559C8
                                • Part of subcall function 006559B2: GetLastError.KERNEL32(?,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?,?), ref: 006559DA
                              • _free.LIBCMT ref: 006595D9
                              • _free.LIBCMT ref: 006595EE
                              • _free.LIBCMT ref: 006595F9
                              • _free.LIBCMT ref: 0065961B
                              • _free.LIBCMT ref: 0065962E
                              • _free.LIBCMT ref: 0065963C
                              • _free.LIBCMT ref: 00659647
                              • _free.LIBCMT ref: 0065967F
                              • _free.LIBCMT ref: 00659686
                              • _free.LIBCMT ref: 006596A3
                              • _free.LIBCMT ref: 006596BB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 5ef2210afaa3e7164fd3efdb808faa5229ef352993a8c6f88c551be5a9a2e30b
                              • Instruction ID: 08dc9dde4f5bad66799a02e4602b514c37ddc6650fd0c90b3fb93dd7042cadef
                              • Opcode Fuzzy Hash: 5ef2210afaa3e7164fd3efdb808faa5229ef352993a8c6f88c551be5a9a2e30b
                              • Instruction Fuzzy Hash: 30313931605601DFFB71AAB9D859B9AB3EAEF00322F10841DEC49D6251DB35AC9CCB64
                              APIs
                              • GetWindow.USER32(?,00000005), ref: 0064B8DC
                              • GetClassNameW.USER32(00000000,?,00000800), ref: 0064B90B
                                • Part of subcall function 00640B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0063AC99,?,?,?,0063AC48,?,-00000002,?,00000000,?), ref: 00640B16
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0064B929
                              • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0064B940
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 0064B953
                                • Part of subcall function 00648B21: GetDC.USER32(00000000), ref: 00648B2D
                                • Part of subcall function 00648B21: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00648B3C
                                • Part of subcall function 00648B21: ReleaseDC.USER32(00000000,00000000), ref: 00648B4A
                                • Part of subcall function 00648ADE: GetDC.USER32(00000000), ref: 00648AEA
                                • Part of subcall function 00648ADE: GetDeviceCaps.GDI32(00000000,00000058), ref: 00648AF9
                                • Part of subcall function 00648ADE: ReleaseDC.USER32(00000000,00000000), ref: 00648B07
                              • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0064B97A
                              • DeleteObject.GDI32(00000000), ref: 0064B981
                              • GetWindow.USER32(00000000,00000002), ref: 0064B98A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                              • String ID: STATIC
                              • API String ID: 1444658586-1882779555
                              • Opcode ID: 8f8a371af19fccea5471b735634b5b5a43aab24b34519f536a7ff486f68d954f
                              • Instruction ID: edc070b2ca7bd646ce6dd494e02d4cd437068a19156af6f782abda07fb4f1d4d
                              • Opcode Fuzzy Hash: 8f8a371af19fccea5471b735634b5b5a43aab24b34519f536a7ff486f68d954f
                              • Instruction Fuzzy Hash: C521D5725002247FEB216BA4DC4AFEE766FEF05710F005012FB01B6291CBB49D418ABA
                              APIs
                              • _free.LIBCMT ref: 0065622E
                                • Part of subcall function 006559B2: RtlFreeHeap.NTDLL(00000000,00000000,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?), ref: 006559C8
                                • Part of subcall function 006559B2: GetLastError.KERNEL32(?,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?,?), ref: 006559DA
                              • _free.LIBCMT ref: 0065623A
                              • _free.LIBCMT ref: 00656245
                              • _free.LIBCMT ref: 00656250
                              • _free.LIBCMT ref: 0065625B
                              • _free.LIBCMT ref: 00656266
                              • _free.LIBCMT ref: 00656271
                              • _free.LIBCMT ref: 0065627C
                              • _free.LIBCMT ref: 00656287
                              • _free.LIBCMT ref: 00656295
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 0940846d9b2035b032de0c62279d0f21f59c6654b6b401cf03e80bd8afc1bdfd
                              • Instruction ID: d9725ff713c78f65b1a86468a00e2813677652829c6ae41c81159b0bb203c55d
                              • Opcode Fuzzy Hash: 0940846d9b2035b032de0c62279d0f21f59c6654b6b401cf03e80bd8afc1bdfd
                              • Instruction Fuzzy Hash: 9911C376105448EFDF41EF94C856CD97BBAFF04361F4140A8BE8A8B222DA35DA949B84
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: ;%u$x%u$xc%u
                              • API String ID: 0-2277559157
                              • Opcode ID: 6270e7b1b780d87d88ec50ab30303f0dded233ac51fb9d986c784018b44fb1ce
                              • Instruction ID: a3aac4b32be94e90410ca9e0aac98ddb40e0dc4e773eca0c8bdbfc6b65149351
                              • Opcode Fuzzy Hash: 6270e7b1b780d87d88ec50ab30303f0dded233ac51fb9d986c784018b44fb1ce
                              • Instruction Fuzzy Hash: 26F126716043825BEB14EB248CA5BFE77EB6F91310F08446DFD859B383CA249945CBE6
                              APIs
                                • Part of subcall function 006312E7: GetDlgItem.USER32(00000000,00003021), ref: 0063132B
                                • Part of subcall function 006312E7: SetWindowTextW.USER32(00000000,006602E4), ref: 00631341
                              • EndDialog.USER32(?,00000001), ref: 006499AE
                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 006499DB
                              • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 006499F0
                              • SetWindowTextW.USER32(?,?), ref: 00649A01
                              • GetDlgItem.USER32(?,00000065), ref: 00649A0A
                              • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00649A1E
                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00649A30
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: MessageSend$Item$TextWindow$Dialog
                              • String ID: LICENSEDLG
                              • API String ID: 3214253823-2177901306
                              • Opcode ID: 0477f12df3d0becdf217f51be588c76be1c86c2d7f5906c7b83f9c9e3d7d70ef
                              • Instruction ID: bb12ef5572ffa0b5ed01ee52d992407e57489914b6281c2ed65d313a15f40c34
                              • Opcode Fuzzy Hash: 0477f12df3d0becdf217f51be588c76be1c86c2d7f5906c7b83f9c9e3d7d70ef
                              • Instruction Fuzzy Hash: BC2108322402047FE7215FA5DD85E7B3B6FEB4AB85F051008F644B21A0CBA29D41DB77
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID: >,e$>,e$>,e
                              • API String ID: 1036877536-4087248666
                              • Opcode ID: be6c9d0d7c1be526505d416ba69bbcf9729ec644743c8de63497f1cd699fda8f
                              • Instruction ID: 099f3c1efbb3d079434536258da101e3125d1afd82e6f9c5cf8be51591170ed0
                              • Opcode Fuzzy Hash: be6c9d0d7c1be526505d416ba69bbcf9729ec644743c8de63497f1cd699fda8f
                              • Instruction Fuzzy Hash: 20A14772A003869FDB21CF18C8917AEBBE6EF55315F5841ADFC859B381C6388949C751
                              APIs
                              • __EH_prolog.LIBCMT ref: 00639282
                              • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 006392A5
                              • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 006392C4
                                • Part of subcall function 00640B00: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0063AC99,?,?,?,0063AC48,?,-00000002,?,00000000,?), ref: 00640B16
                              • _swprintf.LIBCMT ref: 00639360
                                • Part of subcall function 00633F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00633F3E
                              • MoveFileW.KERNEL32(?,?), ref: 006393D5
                              • MoveFileW.KERNEL32(?,?), ref: 00639411
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                              • String ID: rtmp%d
                              • API String ID: 2111052971-3303766350
                              • Opcode ID: d986e3f4960a94f57023af921fe00fc08f0029883995a6d832e8229cabd8e02d
                              • Instruction ID: e1dc8d0c832e87dd4257a9fafeeeed8f101b628d9e6f32d9c32b7ae35cee6056
                              • Opcode Fuzzy Hash: d986e3f4960a94f57023af921fe00fc08f0029883995a6d832e8229cabd8e02d
                              • Instruction Fuzzy Hash: FA418071911158A6DF50AB708D84EDB77BEAF45341F4040AAB905E3142EB749B46CFB8
                              APIs
                              • GetTickCount.KERNEL32 ref: 00647DAE
                              • GetTickCount.KERNEL32 ref: 00647DCC
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00647DE2
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00647DF6
                              • TranslateMessage.USER32(?), ref: 00647E01
                              • DispatchMessageW.USER32(?), ref: 00647E0C
                              • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00647EBC
                              • SetWindowTextW.USER32(?,00000000), ref: 00647EC6
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                              • String ID:
                              • API String ID: 4150546248-0
                              • Opcode ID: 33c35a9c741344daa81de2bd32b09b7793aab653d6b48356b0709a54cb8f46a2
                              • Instruction ID: 232e4a3604adc6aab874b0a0cc41c30d55cd47edf7a8a55672567a744047c284
                              • Opcode Fuzzy Hash: 33c35a9c741344daa81de2bd32b09b7793aab653d6b48356b0709a54cb8f46a2
                              • Instruction Fuzzy Hash: 62416A71208306AFD710DFA5D98896BBBEAEF89704B00096DF646C7251DB71EC49CB62
                              APIs
                              • __aulldiv.LIBCMT ref: 0063FE21
                                • Part of subcall function 0063A930: GetVersionExW.KERNEL32(?), ref: 0063A955
                              • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 0063FE4A
                              • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 0063FE5C
                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 0063FE69
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0063FE7F
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0063FE8B
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0063FEC1
                              • __aullrem.LIBCMT ref: 0063FF4B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                              • String ID:
                              • API String ID: 1247370737-0
                              • Opcode ID: db67ccfbd3a84d35f755d1becbbe0d1a12d0dc58356afb88ac1a9b1ba4cfe859
                              • Instruction ID: a2699022e60fc964c82c080aab75067488385658e9510b58ef4bb00ca9fe3578
                              • Opcode Fuzzy Hash: db67ccfbd3a84d35f755d1becbbe0d1a12d0dc58356afb88ac1a9b1ba4cfe859
                              • Instruction Fuzzy Hash: 66412AB2808305AFC314DF65C8809ABF7F9FF88714F004A2EF99692650E775E548DB96
                              APIs
                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0065CCE2,00000000,00000000,00000000,00000000,00000000,?), ref: 0065C5AF
                              • __fassign.LIBCMT ref: 0065C62A
                              • __fassign.LIBCMT ref: 0065C645
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0065C66B
                              • WriteFile.KERNEL32(?,00000000,00000000,0065CCE2,00000000,?,?,?,?,?,?,?,?,?,0065CCE2,00000000), ref: 0065C68A
                              • WriteFile.KERNEL32(?,00000000,00000001,0065CCE2,00000000,?,?,?,?,?,?,?,?,?,0065CCE2,00000000), ref: 0065C6C3
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: b8f7d7edefdff3b7e0bd3e191e865e23ea773c384deec94fdc9b2a7e698fe6a9
                              • Instruction ID: e7edd3c05fe3cecaee93fd3ff655fbfdf2a04e29a64f7b6b29b6bc5ad2f07a63
                              • Opcode Fuzzy Hash: b8f7d7edefdff3b7e0bd3e191e865e23ea773c384deec94fdc9b2a7e698fe6a9
                              • Instruction Fuzzy Hash: BE51D0B4900308AFDB10CFA8D885AEEBBF6EF18311F14415AE951F7251E734AA44CF61
                              APIs
                              • GetTempPathW.KERNEL32(00000800,?), ref: 0064B0EE
                              • _swprintf.LIBCMT ref: 0064B122
                                • Part of subcall function 00633F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00633F3E
                              • SetDlgItemTextW.USER32(?,00000066,00673122), ref: 0064B142
                              • _wcschr.LIBVCRUNTIME ref: 0064B175
                              • EndDialog.USER32(?,00000001), ref: 0064B256
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                              • String ID: %s%s%u
                              • API String ID: 2892007947-1360425832
                              • Opcode ID: bce084c5852e3d9870befeb9fcc9134de536fdd0700b7a7c2419df13b2e97370
                              • Instruction ID: 3b5f16a815892dc7d68d525bc54cdd76bf32fce97ff2241059c307271a9253f9
                              • Opcode Fuzzy Hash: bce084c5852e3d9870befeb9fcc9134de536fdd0700b7a7c2419df13b2e97370
                              • Instruction Fuzzy Hash: 6C418D71900219AEEF65DB60CD85EEE77BEEB09304F4050A6F409E7151EFB09A848FA4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _strlen$_swprintf_wcschr_wcsrchr
                              • String ID: %08x
                              • API String ID: 1593746830-3682738293
                              • Opcode ID: 59ee27a02107d401d04c20890d8594d80645ad5ddd52a0666fc4e9bd2233e05a
                              • Instruction ID: b8f17f26697714b2feae49a99e7eb9cad902f578bd82be4d70aa8177dca3f3b4
                              • Opcode Fuzzy Hash: 59ee27a02107d401d04c20890d8594d80645ad5ddd52a0666fc4e9bd2233e05a
                              • Instruction Fuzzy Hash: 1941D332904354AAE730E624CC49EFB769FEB84720F05052AF949E7282D6749D05C3E6
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00648704,?), ref: 00647FB9
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00647FDA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AllocByteCharGlobalMultiWide
                              • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                              • API String ID: 3286310052-4209811716
                              • Opcode ID: 617897eca9be3a01b1ac51cdc5034b47c0c15177eb9028bc695bea1dd55fcff1
                              • Instruction ID: 9e045adf675de5062b525a6698536342fcbeefe53ba14e2f146d176306cb609d
                              • Opcode Fuzzy Hash: 617897eca9be3a01b1ac51cdc5034b47c0c15177eb9028bc695bea1dd55fcff1
                              • Instruction Fuzzy Hash: 4F31F3321083117EE764AB60DC06FAFB79BDF52760F14411EF510962C2EFB4990987A9
                              APIs
                              • ShowWindow.USER32(?,00000000), ref: 006485B4
                              • GetWindowRect.USER32(?,?), ref: 006485D9
                              • ShowWindow.USER32(?,00000005,?), ref: 00648670
                              • SetWindowTextW.USER32(?,00000000), ref: 00648678
                              • ShowWindow.USER32(00000000,00000005), ref: 0064868E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Window$Show$RectText
                              • String ID: RarHtmlClassName
                              • API String ID: 3937224194-1658105358
                              • Opcode ID: e9bc6f5b6d51acef837d54ab743506f06161d60db1dc9cc11b3b9eb8b23cecae
                              • Instruction ID: 308f3690d10e27bfe81d93add0ccdabb63ff87e019b69f2da75a630b79a1bb00
                              • Opcode Fuzzy Hash: e9bc6f5b6d51acef837d54ab743506f06161d60db1dc9cc11b3b9eb8b23cecae
                              • Instruction Fuzzy Hash: EB31AE32101210EFC7119FA4DD48E5FBFAAEB49701F054459FD49AA296DB70E904CFA2
                              APIs
                                • Part of subcall function 006592C4: _free.LIBCMT ref: 006592ED
                              • _free.LIBCMT ref: 0065934E
                                • Part of subcall function 006559B2: RtlFreeHeap.NTDLL(00000000,00000000,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?), ref: 006559C8
                                • Part of subcall function 006559B2: GetLastError.KERNEL32(?,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?,?), ref: 006559DA
                              • _free.LIBCMT ref: 00659359
                              • _free.LIBCMT ref: 00659364
                              • _free.LIBCMT ref: 006593B8
                              • _free.LIBCMT ref: 006593C3
                              • _free.LIBCMT ref: 006593CE
                              • _free.LIBCMT ref: 006593D9
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: f1ac33a155eeba0822e17f5f402666ce6a004e9925b6c7aeea596f78182db2dd
                              • Instruction ID: 8d9fea253ca21ebac3913fbc1dfe47d5ccf6136377073e26ea76ca35f6e1e4dd
                              • Opcode Fuzzy Hash: f1ac33a155eeba0822e17f5f402666ce6a004e9925b6c7aeea596f78182db2dd
                              • Instruction Fuzzy Hash: 72119631551B04F6DA70B7B0CC07FCBB79E9F00712F40481CBA9A66092D678F64C4764
                              APIs
                              • GetLastError.KERNEL32(?,?,00650BAB,0064E602), ref: 00650BC2
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00650BD0
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00650BE9
                              • SetLastError.KERNEL32(00000000,?,00650BAB,0064E602), ref: 00650C3B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 865b0e3209d42614c6690d0b9e9bf88934a06ed97476ec41c9793ddb167dde8b
                              • Instruction ID: 2fe336b5d9f68379720d602b2e571aae2bc514be7e1d26fd48205f4389923510
                              • Opcode Fuzzy Hash: 865b0e3209d42614c6690d0b9e9bf88934a06ed97476ec41c9793ddb167dde8b
                              • Instruction Fuzzy Hash: E60124321192125EF7602AB4ACC66A72A57FB133B7F20032EFC11552F1EFA18C0B9544
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                              • API String ID: 0-1718035505
                              • Opcode ID: c286f6994b51a613549e22e923e1c56665f4e32a335e07d5ee838479c746ae30
                              • Instruction ID: cc90e426abd9f7cd3ed7cfa695177730ff3614edf3df96f691d41e071f3d52d8
                              • Opcode Fuzzy Hash: c286f6994b51a613549e22e923e1c56665f4e32a335e07d5ee838479c746ae30
                              • Instruction Fuzzy Hash: 2E01F471753222AFEFA05FB55C94AE72F9B9B03771316223AE911D7350E760C841A7A0
                              APIs
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0064009C
                                • Part of subcall function 0063A930: GetVersionExW.KERNEL32(?), ref: 0063A955
                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 006400BE
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 006400D8
                              • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 006400E9
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 006400F9
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00640105
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Time$File$System$Local$SpecificVersion
                              • String ID:
                              • API String ID: 2092733347-0
                              • Opcode ID: 91b321cae91e79ac0c90abf4542d8c162f210f85c481d3e4cd1e8c6a40c134b6
                              • Instruction ID: 4c7429e321cf5436bfe14458a5d31d63bae6a3c76e5b11293cc34c4da88c28b8
                              • Opcode Fuzzy Hash: 91b321cae91e79ac0c90abf4542d8c162f210f85c481d3e4cd1e8c6a40c134b6
                              • Instruction Fuzzy Hash: 4331F57A1083459BD700DFA5C88099BB7F9BF98704F04592EFA99C3210E730D549CB6A
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: f01affc40d095a72dff3a018264228eb9d594f32fe23201c6ee16061f354da78
                              • Instruction ID: 65a66eaadd80e7fe07702fab6186c0dbe83121f3e9e899fb3c3b3583ecf5f7d7
                              • Opcode Fuzzy Hash: f01affc40d095a72dff3a018264228eb9d594f32fe23201c6ee16061f354da78
                              • Instruction Fuzzy Hash: 0F21C2B1A0060AAFDB009A14DC82EBF77AEAF60749B148128FC05DB206E7B1DE4596D4
                              APIs
                              • GetLastError.KERNEL32(?,0066CBE8,00652664,0066CBE8,?,?,00652203,?,?,0066CBE8), ref: 00656312
                              • _free.LIBCMT ref: 00656345
                              • _free.LIBCMT ref: 0065636D
                              • SetLastError.KERNEL32(00000000,?,0066CBE8), ref: 0065637A
                              • SetLastError.KERNEL32(00000000,?,0066CBE8), ref: 00656386
                              • _abort.LIBCMT ref: 0065638C
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: d44fc1fdf81cb8301b8e9365e0a8215ac48cf0813ccf22a83717c140e10baeed
                              • Instruction ID: 988ca18e9addb299559a4dab533f2c6fcf017954f1cae3bae6e681a254e43dfa
                              • Opcode Fuzzy Hash: d44fc1fdf81cb8301b8e9365e0a8215ac48cf0813ccf22a83717c140e10baeed
                              • Instruction Fuzzy Hash: E9F0F43514990066D7513774EC1EB9B122B8BD0733F251228FC15D32A1FFA5880AC1A9
                              APIs
                              • CharUpperW.USER32(?,?,?,?,00001000), ref: 0064A92B
                              • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 0064A952
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CharUpper
                              • String ID: *ag$-
                              • API String ID: 9403516-929444008
                              • Opcode ID: 3248dac528403572bb46c5ec104d4fad422fe0180d995ea1795926edce1bfff6
                              • Instruction ID: 471e0f8cbee389911b3c1b34ad88e424a94c2cb25c38a26d42c85c024effb194
                              • Opcode Fuzzy Hash: 3248dac528403572bb46c5ec104d4fad422fe0180d995ea1795926edce1bfff6
                              • Instruction Fuzzy Hash: 642127724A4305B9D320EBE8880CBF7A69B9B95310F02481FF595C2681DBB8C8C8D367
                              APIs
                                • Part of subcall function 006312E7: GetDlgItem.USER32(00000000,00003021), ref: 0063132B
                                • Part of subcall function 006312E7: SetWindowTextW.USER32(00000000,006602E4), ref: 00631341
                              • EndDialog.USER32(?,00000001), ref: 0064B86A
                              • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 0064B880
                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 0064B89A
                              • SetDlgItemTextW.USER32(?,00000066), ref: 0064B8A5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ItemText$DialogWindow
                              • String ID: RENAMEDLG
                              • API String ID: 445417207-3299779563
                              • Opcode ID: b7228e8abd1af263870aa9235fd6c9a7c3e0ddb371e927d84072075a3680d9c4
                              • Instruction ID: 7eee59dcb4a2f2fc8219835a9e1dacd2cc5949f339f8f42cade528a9bfb6cd81
                              • Opcode Fuzzy Hash: b7228e8abd1af263870aa9235fd6c9a7c3e0ddb371e927d84072075a3680d9c4
                              • Instruction Fuzzy Hash: 1001F532A802117ED7114FA9DE48F777B6EAB8AB41F002416F241B71D0C7A6E8059B72
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00654A30,?,?,006549D0,?,00667F60,0000000C,00654B27,?,00000002), ref: 00654A9F
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00654AB2
                              • FreeLibrary.KERNEL32(00000000,?,?,?,00654A30,?,?,006549D0,?,00667F60,0000000C,00654B27,?,00000002,00000000), ref: 00654AD5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 4e8c58229dfe240e8b3846f381105adee5765eae45db4f5cc2522527117796bc
                              • Instruction ID: b019d748897050fba83a920c1d62418b004655ccb5f6eb1202a11015b0461eb8
                              • Opcode Fuzzy Hash: 4e8c58229dfe240e8b3846f381105adee5765eae45db4f5cc2522527117796bc
                              • Instruction Fuzzy Hash: 55F04F30A40209BBDB559F90DC19B9EBFBAEF44716F0441B8F805A2250DFB54A84CA94
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 019c3b8f1b40836c7086e40b16c80e6a7f6fd02642216720914e6f19350db1b9
                              • Instruction ID: 0246f0e3755d5107b0f37d2e3924d21894bdc5f6200773d25e2e8d4ad7ab5a27
                              • Opcode Fuzzy Hash: 019c3b8f1b40836c7086e40b16c80e6a7f6fd02642216720914e6f19350db1b9
                              • Instruction Fuzzy Hash: A841E832A00600DFCB14DFB8C895A9DB7B6EF89321F15456DE956EB381EB71AD05CB80
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 006589A9
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006589CC
                                • Part of subcall function 006559EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,0065239A,?,0000015D,?,?,?,?,00652F19,000000FF,00000000,?,?), ref: 00655A1E
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 006589F2
                              • _free.LIBCMT ref: 00658A05
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00658A14
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: e9fd61ff9033e0247279cfe34e837ba11f8f45f6641e4309b8f46fb7175b12fd
                              • Instruction ID: 46f8969a296e85d7757d8f8ad83ea1c018485e43878f3085896ed6428637c739
                              • Opcode Fuzzy Hash: e9fd61ff9033e0247279cfe34e837ba11f8f45f6641e4309b8f46fb7175b12fd
                              • Instruction Fuzzy Hash: F701A772602695BF372156BA6C4DCBB796FDFC6FA2714012EFD04E7600EEA08D0581B1
                              APIs
                              • GetLastError.KERNEL32(?,?,?,00655E33,00655ACF,?,0065633C,00000001,00000364,?,00652203,?,?,0066CBE8), ref: 00656397
                              • _free.LIBCMT ref: 006563CC
                              • _free.LIBCMT ref: 006563F3
                              • SetLastError.KERNEL32(00000000,?,0066CBE8), ref: 00656400
                              • SetLastError.KERNEL32(00000000,?,0066CBE8), ref: 00656409
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: 23952c23384a078b8adee6aed47e3bdc33ae680904a140cf0e21b4dc63f10ba5
                              • Instruction ID: 67fc3a855b22fa550f0e3e5ca9b902037c46fb87555992009bf31ca9da13ceaf
                              • Opcode Fuzzy Hash: 23952c23384a078b8adee6aed47e3bdc33ae680904a140cf0e21b4dc63f10ba5
                              • Instruction Fuzzy Hash: C6012672149A016797113764EC89A6B166BCBE0373F615128FC1693252EFA4CC0EC165
                              APIs
                              • _free.LIBCMT ref: 00659273
                                • Part of subcall function 006559B2: RtlFreeHeap.NTDLL(00000000,00000000,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?), ref: 006559C8
                                • Part of subcall function 006559B2: GetLastError.KERNEL32(?,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?,?), ref: 006559DA
                              • _free.LIBCMT ref: 00659285
                              • _free.LIBCMT ref: 00659297
                              • _free.LIBCMT ref: 006592A9
                              • _free.LIBCMT ref: 006592BB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 6d660fc24adf0fd2818095553228b73938fd003b9b4074a9c23d2bf0441b6b81
                              • Instruction ID: 6a92c4858535c11f2750823afebb8746a40a2edb3df02eb7f5de229f883d4610
                              • Opcode Fuzzy Hash: 6d660fc24adf0fd2818095553228b73938fd003b9b4074a9c23d2bf0441b6b81
                              • Instruction Fuzzy Hash: DBF04F3251A640FB9A60EB98E986C56B3EBEB00731F64480DFC09E7601CA68FC844A64
                              APIs
                              • _free.LIBCMT ref: 00655531
                                • Part of subcall function 006559B2: RtlFreeHeap.NTDLL(00000000,00000000,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?), ref: 006559C8
                                • Part of subcall function 006559B2: GetLastError.KERNEL32(?,?,006592F2,?,00000000,?,00000000,?,00659319,?,00000007,?,?,00659716,?,?), ref: 006559DA
                              • _free.LIBCMT ref: 00655543
                              • _free.LIBCMT ref: 00655556
                              • _free.LIBCMT ref: 00655567
                              • _free.LIBCMT ref: 00655578
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: c8f982bb6fe116295a6e8dd2f882744bf40822f9986f68e9c8cf73b9d838367e
                              • Instruction ID: 1e9919747811865924ec9f69b7f5bbe87028d7a88d65ccd95c0bf015f2188d57
                              • Opcode Fuzzy Hash: c8f982bb6fe116295a6e8dd2f882744bf40822f9986f68e9c8cf73b9d838367e
                              • Instruction Fuzzy Hash: 4BF017B0826920ABAB517F98FC154097BB3FB04732B81220EFD15A2371D72808469F87
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\efthfxj.sfx.exe,00000104), ref: 00654BBA
                              • _free.LIBCMT ref: 00654C85
                              • _free.LIBCMT ref: 00654C8F
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\AppData\Roaming\efthfxj.sfx.exe
                              • API String ID: 2506810119-2596865311
                              • Opcode ID: 780bd16ba39fc83aa76c858479a959163ce520bf12073c626ed82acd415c32e0
                              • Instruction ID: 64d9c3f841a1d72c52490cc67ba317c7d679cb67134944cefc7279ee7d5a032f
                              • Opcode Fuzzy Hash: 780bd16ba39fc83aa76c858479a959163ce520bf12073c626ed82acd415c32e0
                              • Instruction Fuzzy Hash: 5B319571A01258FFDB21DB999C8599EBBFEEF85315F1041AAFC0497310DB708A88CB54
                              APIs
                              • __EH_prolog.LIBCMT ref: 00637468
                                • Part of subcall function 00633A90: __EH_prolog.LIBCMT ref: 00633A95
                              • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000), ref: 0063752E
                                • Part of subcall function 00637A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00637AAC
                                • Part of subcall function 00637A9D: GetLastError.KERNEL32 ref: 00637AF2
                                • Part of subcall function 00637A9D: CloseHandle.KERNEL32(?), ref: 00637B01
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                              • String ID: SeRestorePrivilege$SeSecurityPrivilege
                              • API String ID: 3813983858-639343689
                              • Opcode ID: 874f26c91ba3cc334d1f5f5bfa9e78322ce76a93f29c395c9e50238e62752908
                              • Instruction ID: 9dc33e9def8f38a6e5bccc3d10cdc36caa1344efd9cff82840f382acec404c04
                              • Opcode Fuzzy Hash: 874f26c91ba3cc334d1f5f5bfa9e78322ce76a93f29c395c9e50238e62752908
                              • Instruction Fuzzy Hash: E731C4B1904248AFDFA0EFA4DC02BEE7BBBEF55320F004069F545A7252DB745A448BA5
                              APIs
                                • Part of subcall function 006312E7: GetDlgItem.USER32(00000000,00003021), ref: 0063132B
                                • Part of subcall function 006312E7: SetWindowTextW.USER32(00000000,006602E4), ref: 00631341
                              • EndDialog.USER32(?,00000001), ref: 006491AA
                              • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 006491BF
                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 006491D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ItemText$DialogWindow
                              • String ID: ASKNEXTVOL
                              • API String ID: 445417207-3402441367
                              • Opcode ID: 28ab615807e613cad5db9929d2e928e8b2f8a3ce457ca3b328bc2c4c287d431d
                              • Instruction ID: acb82106f76583bca0072654f165fddd61d39c7d1052afd3b4520438f8338781
                              • Opcode Fuzzy Hash: 28ab615807e613cad5db9929d2e928e8b2f8a3ce457ca3b328bc2c4c287d431d
                              • Instruction Fuzzy Hash: C611E632284202BFE7019FE4DD4DF973B6BEB46701F014116F600AB2A0C362AD01DB76
                              APIs
                              • DialogBoxParamW.USER32(GETPASSWORD1,?,00649645,?,?), ref: 0064C021
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: DialogParam
                              • String ID: *ag$*ag$GETPASSWORD1
                              • API String ID: 665744214-2557219278
                              • Opcode ID: 1fea71e62a29c67e3c2b64d664be2412b3241288bd8a725d6fcd5e0729aa42fc
                              • Instruction ID: 2cee4294985f60a98d6a84856bc590500d3c7021a64c99249523f5a531a636d3
                              • Opcode Fuzzy Hash: 1fea71e62a29c67e3c2b64d664be2412b3241288bd8a725d6fcd5e0729aa42fc
                              • Instruction Fuzzy Hash: 03113832244244ABEB51DE64EC05BEB378BBB09760F041069FD49A72C1D7B55C80DBA8
                              APIs
                                • Part of subcall function 006312E7: GetDlgItem.USER32(00000000,00003021), ref: 0063132B
                                • Part of subcall function 006312E7: SetWindowTextW.USER32(00000000,006602E4), ref: 00631341
                              • EndDialog.USER32(?,00000001), ref: 00649693
                              • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 006496AB
                              • SetDlgItemTextW.USER32(?,00000066,?), ref: 006496D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ItemText$DialogWindow
                              • String ID: GETPASSWORD1
                              • API String ID: 445417207-3292211884
                              • Opcode ID: 0f33b12b0015cd4209a9e3f9ff822c87b9ea0f4184c360c9acfd1d17be977c0d
                              • Instruction ID: 8f6650c56f2b89238fe899d52e323c7d64a597b9b46cdf11783863bcfe1e178b
                              • Opcode Fuzzy Hash: 0f33b12b0015cd4209a9e3f9ff822c87b9ea0f4184c360c9acfd1d17be977c0d
                              • Instruction Fuzzy Hash: 68112B32590118B7EB219EB49D49FFB376FEB0A700F120015FA45F72C0C2A5AD118AB5
                              APIs
                              • _swprintf.LIBCMT ref: 0063B177
                                • Part of subcall function 00633F2B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00633F3E
                              • _wcschr.LIBVCRUNTIME ref: 0063B195
                              • _wcschr.LIBVCRUNTIME ref: 0063B1A5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _wcschr$__vswprintf_c_l_swprintf
                              • String ID: %c:\
                              • API String ID: 525462905-3142399695
                              • Opcode ID: 5916a0caaa3f29362842c769cac9966b67d176099091fb690a1d1d9c07b5acf6
                              • Instruction ID: 0972db2546df60550aec1c58371db26ddd3d12e43652d395e494c2caac0990da
                              • Opcode Fuzzy Hash: 5916a0caaa3f29362842c769cac9966b67d176099091fb690a1d1d9c07b5acf6
                              • Instruction Fuzzy Hash: 4B014563500321B9DB30AB249C42CBBA3AEEE96360F00540FFE44C2282FB20D84482F5
                              APIs
                              • InitializeCriticalSection.KERNEL32(000001A0,00000000,00671E74,?,?,0063FB9D,00000020,?,0063A812,?,0063C79B,?,00000000,?,00000001,?), ref: 0063F9BB
                              • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,0063A812,?,0063C79B,?,00000000,?,00000001,?,?,?,00643AFE), ref: 0063F9C5
                              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,0063A812,?,0063C79B,?,00000000,?,00000001,?,?,?,00643AFE), ref: 0063F9D5
                              Strings
                              • Thread pool initialization failed., xrefs: 0063F9ED
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Create$CriticalEventInitializeSectionSemaphore
                              • String ID: Thread pool initialization failed.
                              • API String ID: 3340455307-2182114853
                              • Opcode ID: 3ed86bb21e4c6bee2952be13a70918324a8253bb0b0040f758ea6330c0e89642
                              • Instruction ID: 0af253a524ac124be2f6638b4cd56faab7f53420e04cc5f956f99f732f3b2037
                              • Opcode Fuzzy Hash: 3ed86bb21e4c6bee2952be13a70918324a8253bb0b0040f758ea6330c0e89642
                              • Instruction Fuzzy Hash: 3C115AB1A00744AFD3205F66D889BA7FBEDFF95355F10483EE2DA86240DAB12840CB60
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: RENAMEDLG$REPLACEFILEDLG
                              • API String ID: 0-56093855
                              • Opcode ID: 7f1c97f75babd6b5074b93d63d1e980b8768aeb5f9c938713e4ea65596d745f8
                              • Instruction ID: 5ee66f8a80a9feb8b1dd367daa32e2f81f8a34be84cd0710aa284e496def2398
                              • Opcode Fuzzy Hash: 7f1c97f75babd6b5074b93d63d1e980b8768aeb5f9c938713e4ea65596d745f8
                              • Instruction Fuzzy Hash: 2C017171609202BFC7519F58EC40E22BB9BE789390F057526F549D2230E362DC5AEF65
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0063CEA7
                              • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 0063CEB6
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: FindHandleModuleResource
                              • String ID: LTR$RTL
                              • API String ID: 3537982541-719208805
                              • Opcode ID: 615e4c2ca5a97557a79aed3d73cfdcf51942b4a89d595327bf4fc1e974fc4e91
                              • Instruction ID: e416ce25b511f96dd8249842a214a3d42c31b65be2f50728f15324bbfa04ab48
                              • Opcode Fuzzy Hash: 615e4c2ca5a97557a79aed3d73cfdcf51942b4a89d595327bf4fc1e974fc4e91
                              • Instruction Fuzzy Hash: B0F0243160425467F7246A74AC0AFA73BAEE785B20F00066DF606E61C0DBA0990987F4
                              APIs
                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,00637F55,?,?,?), ref: 0063A020
                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,00637F55,?,?), ref: 0063A064
                              • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,00637F55,?,?,?,?,?,?,?,?), ref: 0063A0E5
                              • CloseHandle.KERNEL32(?,?,00000000,?,00637F55,?,?,?,?,?,?,?,?,?,?,?), ref: 0063A0EC
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: File$Create$CloseHandleTime
                              • String ID:
                              • API String ID: 2287278272-0
                              • Opcode ID: a65a18bfde6f9d6ebd585168d5b209bc66726cbf4250017e58af310a5039b1f2
                              • Instruction ID: 586935b24c289b46882373e7d2dff72f980fd4912cf821ae90676df55ef961d0
                              • Opcode Fuzzy Hash: a65a18bfde6f9d6ebd585168d5b209bc66726cbf4250017e58af310a5039b1f2
                              • Instruction Fuzzy Hash: 6341BE316483819AE731DF64DC45BEFBBEAAF85704F04091DF5E5D3280C6A49A08DBA3
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,F5E85006,00652784,00000000,00000000,00652FB2,?,00652FB2,?,00000001,00652784,F5E85006,00000001,00652FB2,00652FB2), ref: 00659431
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006594BA
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 006594CC
                              • __freea.LIBCMT ref: 006594D5
                                • Part of subcall function 006559EC: RtlAllocateHeap.NTDLL(00000000,?,?,?,0065239A,?,0000015D,?,?,?,?,00652F19,000000FF,00000000,?,?), ref: 00655A1E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                              • String ID:
                              • API String ID: 2652629310-0
                              • Opcode ID: 0316da40b5ed5c27614da26ca9c1df4ec11b06d45f5f69e2d1e8e9e34271df64
                              • Instruction ID: 4533815728e0087084653dfc71a7509b99ccb8d3504577003de68d7eb26ae47f
                              • Opcode Fuzzy Hash: 0316da40b5ed5c27614da26ca9c1df4ec11b06d45f5f69e2d1e8e9e34271df64
                              • Instruction Fuzzy Hash: E531CB72A0020AABDF25CF64CC85DEE7BA6EB00311F040168FC04DB291E735CD5ACBA0
                              APIs
                              • LoadBitmapW.USER32(00000065), ref: 00649A85
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00649AA6
                              • DeleteObject.GDI32(00000000), ref: 00649ACE
                              • DeleteObject.GDI32(00000000), ref: 00649AED
                                • Part of subcall function 00648BCF: FindResourceW.KERNEL32(00000066,PNG,?,?,00649AC7,00000066), ref: 00648BE0
                                • Part of subcall function 00648BCF: SizeofResource.KERNEL32(00000000,75FD5780,?,?,00649AC7,00000066), ref: 00648BF8
                                • Part of subcall function 00648BCF: LoadResource.KERNEL32(00000000,?,?,00649AC7,00000066), ref: 00648C0B
                                • Part of subcall function 00648BCF: LockResource.KERNEL32(00000000,?,?,00649AC7,00000066), ref: 00648C16
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                              • String ID:
                              • API String ID: 142272564-0
                              • Opcode ID: 407b8aaccfe6b1343422ba13c9482d00fe74095502469ee33ce9e2c026d14480
                              • Instruction ID: e635cd2f1971d4577c05c47b11b573f34c8f793cd9648c1252b4a687e5814564
                              • Opcode Fuzzy Hash: 407b8aaccfe6b1343422ba13c9482d00fe74095502469ee33ce9e2c026d14480
                              • Instruction Fuzzy Hash: 730126325802152FD71177B44D46EFF76AFEF84B61F080019FE00A7391DEA18C1186B5
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00650FED
                                • Part of subcall function 00651625: ___AdjustPointer.LIBCMT ref: 0065166F
                              • _UnwindNestedFrames.LIBCMT ref: 00651004
                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00651016
                              • CallCatchBlock.LIBVCRUNTIME ref: 0065103A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID:
                              • API String ID: 2633735394-0
                              • Opcode ID: b9fa4c2ca776b65944230fb083eb0fa8b0de912ee33a1d220a96a688825d65b2
                              • Instruction ID: b97face72208e6f6f2571fe8220eb1dfeb1723bbbf833599f956f3aa9c6b0a42
                              • Opcode Fuzzy Hash: b9fa4c2ca776b65944230fb083eb0fa8b0de912ee33a1d220a96a688825d65b2
                              • Instruction Fuzzy Hash: FE012532000149BBCF226F95CC01EDA3BBBFF59755F054018FE1866121C776E8A5EBA4
                              APIs
                              • __EH_prolog.LIBCMT ref: 0063FB59
                              • EnterCriticalSection.KERNEL32(00671E74,?,?,0063A812,?,0063C79B,?,00000000,?,00000001,?,?,?,00643AFE,?,00008000), ref: 0063FB66
                              • new.LIBCMT ref: 0063FB82
                                • Part of subcall function 0063F982: InitializeCriticalSection.KERNEL32(000001A0,00000000,00671E74,?,?,0063FB9D,00000020,?,0063A812,?,0063C79B,?,00000000,?,00000001,?), ref: 0063F9BB
                                • Part of subcall function 0063F982: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,0063A812,?,0063C79B,?,00000000,?,00000001,?,?,?,00643AFE), ref: 0063F9C5
                                • Part of subcall function 0063F982: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,0063A812,?,0063C79B,?,00000000,?,00000001,?,?,?,00643AFE), ref: 0063F9D5
                              • LeaveCriticalSection.KERNEL32(00671E74,?,0063A812,?,0063C79B,?,00000000,?,00000001,?,?,?,00643AFE,?,00008000,?), ref: 0063FBA3
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CriticalSection$Create$EnterEventH_prologInitializeLeaveSemaphore
                              • String ID:
                              • API String ID: 3780591329-0
                              • Opcode ID: 43be5fb6001b25c553467aef64691246c7cddb11b99e792304e5d35ac432f98e
                              • Instruction ID: 26d0ec10e7c0ce7e68412f244a05053ba43aea0d12187ea4380343e642dc78ac
                              • Opcode Fuzzy Hash: 43be5fb6001b25c553467aef64691246c7cddb11b99e792304e5d35ac432f98e
                              • Instruction Fuzzy Hash: CDF01D75E122119BDB889F6CE811BAA7AA7EB4A311F00513EEC09D7350DBB189408B95
                              APIs
                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00650B06
                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00650B0B
                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00650B10
                                • Part of subcall function 00651BDE: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00651BEF
                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00650B25
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 1761009282-0
                              • Opcode ID: 531e6f4e0a03c94a47563f5691ee99a7aac98bf87a5ed1e2fb88b7d1485fc598
                              • Instruction ID: 3e56dff7da74bbee2b8e15299922214d1546bb248b51ae6bfa6e54b18d75ac30
                              • Opcode Fuzzy Hash: 531e6f4e0a03c94a47563f5691ee99a7aac98bf87a5ed1e2fb88b7d1485fc598
                              • Instruction Fuzzy Hash: B1C04C14640395943DE43BB129833ED13431C637CFF8015C9AC501F2075A57884F503F
                              APIs
                                • Part of subcall function 00648BA4: GetDC.USER32(00000000), ref: 00648BA8
                                • Part of subcall function 00648BA4: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00648BB3
                                • Part of subcall function 00648BA4: ReleaseDC.USER32(00000000,00000000), ref: 00648BBE
                              • GetObjectW.GDI32(?,00000018,?), ref: 00648D23
                                • Part of subcall function 00648EE9: GetDC.USER32(00000000), ref: 00648EF2
                                • Part of subcall function 00648EE9: GetObjectW.GDI32(?,00000018,?), ref: 00648F21
                                • Part of subcall function 00648EE9: ReleaseDC.USER32(00000000,?), ref: 00648FB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ObjectRelease$CapsDevice
                              • String ID: (
                              • API String ID: 1061551593-3887548279
                              • Opcode ID: 78e4b1ddead82265f25a59385b5e9705d818b6ea55a86c1103b2a0d5dfe32a0a
                              • Instruction ID: a8d12b2edd99c7b8cca8d5670a37ee4fd3bf80f24573990a3eb4848db7cdeecb
                              • Opcode Fuzzy Hash: 78e4b1ddead82265f25a59385b5e9705d818b6ea55a86c1103b2a0d5dfe32a0a
                              • Instruction Fuzzy Hash: A0611371608211AFD310DFA4C884E6BBBEAEF89704F10491DF599CB261CB71E805CB62
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: _swprintf
                              • String ID: %ls$%s: %s
                              • API String ID: 589789837-2259941744
                              • Opcode ID: 062b29bd6f4a5d78932ea6c92652350e14af7d9e615e38862c3e278c7d2ddb66
                              • Instruction ID: 84dcf9071793063653b0fc965bdefeaf4ae5ef74302333c2cd88c3e8301bc321
                              • Opcode Fuzzy Hash: 062b29bd6f4a5d78932ea6c92652350e14af7d9e615e38862c3e278c7d2ddb66
                              • Instruction Fuzzy Hash: E2511B35288330FAF7711A948C4BF377657AB05F00F60850AF78A684E6C5F2A751B75A
                              APIs
                              • _free.LIBCMT ref: 00657D45
                                • Part of subcall function 00655D1D: IsProcessorFeaturePresent.KERNEL32(00000017,00655D0C,0000002C,006680C8,00658D62,00000000,00000000,00656391,?,?,00655D19,00000000,00000000,00000000,00000000,00000000), ref: 00655D1F
                                • Part of subcall function 00655D1D: GetCurrentProcess.KERNEL32(C0000417,006680C8,0000002C,00655A4A,00000016,00656391), ref: 00655D41
                                • Part of subcall function 00655D1D: TerminateProcess.KERNEL32(00000000), ref: 00655D48
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                              • String ID: *?$.
                              • API String ID: 2667617558-3972193922
                              • Opcode ID: 7b97f05bead931982e7a23c9cf534e270e960d3348eeadaf4e8a2cba3451af48
                              • Instruction ID: bf5a0572894fbb61d71bf61cfa4cab369aa9c450e636d8e57ec6ed2d1623149b
                              • Opcode Fuzzy Hash: 7b97f05bead931982e7a23c9cf534e270e960d3348eeadaf4e8a2cba3451af48
                              • Instruction Fuzzy Hash: DC51BE71E0420AAFDF14CFA8D881AEDBBB6EF48315F24416EEC54E7300E6719A098B50
                              APIs
                              • __EH_prolog.LIBCMT ref: 0063761E
                              • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00637799
                                • Part of subcall function 0063A113: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00639F49,?,?,?,00639DE2,?,00000001,00000000,?,?), ref: 0063A127
                                • Part of subcall function 0063A113: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00639F49,?,?,?,00639DE2,?,00000001,00000000,?,?), ref: 0063A158
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: File$Attributes$H_prologTime
                              • String ID: :
                              • API String ID: 1861295151-336475711
                              • Opcode ID: bd1fadf799a0a78d894abe3c07c16ce357c7214413517dc42a91abf4e3b1c6c5
                              • Instruction ID: 02423c64b3ff3ad1180dd652bda9505a7907cf8a4351d925d9c6f9d54f3c740f
                              • Opcode Fuzzy Hash: bd1fadf799a0a78d894abe3c07c16ce357c7214413517dc42a91abf4e3b1c6c5
                              • Instruction Fuzzy Hash: 4341CEB1805218AADB74EB60DC56EEF777EAF45340F0040ADB645A2182DB705F89CFE4
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: UNC$\\?\
                              • API String ID: 0-253988292
                              • Opcode ID: b404b3b3374d290102b1ed08d6dae158e9f8f5736536d1f69c1a75059ee8adee
                              • Instruction ID: 96d38f153af0c8aba9be6b9dcb6b7eec769b63b91270aeb4bb447aeb85b2c360
                              • Opcode Fuzzy Hash: b404b3b3374d290102b1ed08d6dae158e9f8f5736536d1f69c1a75059ee8adee
                              • Instruction Fuzzy Hash: B641E731800259BADF61AF20DC01EEF77ABAF01360F40542AFA5493157E770DA91DAE8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: Shell.Explorer$about:blank
                              • API String ID: 0-874089819
                              • Opcode ID: 6c809daa9fa3a6560c7799f7ccecf2122c7f83e42a012a78a613454b45bde13d
                              • Instruction ID: 4a5efcf242c84888f1d0cde73e57e2a5a322ad12030ff2641f0ae1a2875a1617
                              • Opcode Fuzzy Hash: 6c809daa9fa3a6560c7799f7ccecf2122c7f83e42a012a78a613454b45bde13d
                              • Instruction Fuzzy Hash: AA21AE75310706AFD704AF64C8A0E3EB76ABF85B10B14862DF5058B282CF71EC44CBA0
                              APIs
                                • Part of subcall function 0063CF27: GetWindowRect.USER32(?,?), ref: 0063CF5E
                                • Part of subcall function 0063CF27: GetClientRect.USER32(?,?), ref: 0063CF6A
                                • Part of subcall function 0063CF27: GetWindowLongW.USER32(?,000000F0), ref: 0063D00B
                                • Part of subcall function 0063CF27: GetWindowRect.USER32(?,?), ref: 0063D038
                                • Part of subcall function 0063CF27: GetWindowTextW.USER32(?,?,00000400), ref: 0063D057
                              • GetDlgItem.USER32(00000000,00003021), ref: 0063132B
                              • SetWindowTextW.USER32(00000000,006602E4), ref: 00631341
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: Window$Rect$Text$ClientItemLong
                              • String ID: 0
                              • API String ID: 660763476-4108050209
                              • Opcode ID: 88a1f4bd31f0971637f6934e70c3966042b224e7b7c132ae175c5dfde067180e
                              • Instruction ID: 4683de67e485a36881d7d87fd6d1910e212ab6395e02c4150f4d11a805dcbfd4
                              • Opcode Fuzzy Hash: 88a1f4bd31f0971637f6934e70c3966042b224e7b7c132ae175c5dfde067180e
                              • Instruction Fuzzy Hash: DCF096B158034CABEF251FA0CC19AF93F5BAF06755F084018FD84A86A1C775C991EF94
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,0063FCF9,?,?,0063FD6E,?,?,?,?,?,0063FD58), ref: 0063FB1F
                              • GetLastError.KERNEL32(?,?,0063FD6E,?,?,?,?,?,0063FD58), ref: 0063FB2B
                                • Part of subcall function 00636D8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00636DAD
                              Strings
                              • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 0063FB34
                              Memory Dump Source
                              • Source File: 00000004.00000002.2051942387.0000000000631000.00000020.00000001.01000000.00000009.sdmp, Offset: 00630000, based on PE: true
                              • Associated: 00000004.00000002.2051922636.0000000000630000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2051977563.0000000000660000.00000002.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000066E000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052001783.000000000068A000.00000004.00000001.01000000.00000009.sdmpDownload File
                              • Associated: 00000004.00000002.2052071994.000000000068C000.00000002.00000001.01000000.00000009.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_630000_efthfxj.jbxd
                              Similarity
                              • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                              • String ID: WaitForMultipleObjects error %d, GetLastError %d
                              • API String ID: 1091760877-2248577382
                              • Opcode ID: b332050367ac99e9da8fcf43a59a830f88af278b77fc0a8a18a33e23e5ca6719
                              • Instruction ID: 4520e52f4436615efb9571191ceb7953e475529df1ce0c5e3a6c39ab6304978f
                              • Opcode Fuzzy Hash: b332050367ac99e9da8fcf43a59a830f88af278b77fc0a8a18a33e23e5ca6719
                              • Instruction Fuzzy Hash: 44D05E71A0C43077EA412B28DC1AEBF7907AF52771F245769F53AA92F1CAA0084146E5

                              Execution Graph

                              Execution Coverage:23.7%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:6.8%
                              Total number of Nodes:353
                              Total number of Limit Nodes:13
                              execution_graph 11429 fb4d98 11430 fb4de5 VirtualProtect 11429->11430 11431 fb4e51 11430->11431 11001 115d810 11003 115d832 11001->11003 11002 115d87d 11003->11002 11049 aa70a47 11003->11049 11057 aa70d67 11003->11057 11068 aa70663 11003->11068 11073 aa70103 11003->11073 11078 aa70fe2 11003->11078 11083 aa704ec 11003->11083 11088 aa703cb 11003->11088 11093 aa709d6 11003->11093 11098 aa70833 11003->11098 11109 aa706be 11003->11109 11114 aa7023c 11003->11114 11119 aa70279 11003->11119 11124 4af9305 11003->11124 11135 4af8903 11003->11135 11140 4af89ce 11003->11140 11145 4af8d59 11003->11145 11150 4af91ff 11003->11150 11155 4af902c 11003->11155 11166 4af85db 11003->11166 11177 4af8c05 11003->11177 11185 4afbd63 11003->11185 11190 4afbcd3 11003->11190 11195 4afc1d1 11003->11195 11200 4afbd0e 11003->11200 11205 4afb4b0 11003->11205 11210 4afb681 11003->11210 11218 4afba7e 11003->11218 11223 4afb29a 11003->11223 11231 4afb81a 11003->11231 11239 4afbbab 11003->11239 11247 4afb49a 11003->11247 11252 4afbcb3 11003->11252 11257 4afb976 11003->11257 11265 4afb804 11003->11265 11277 4afdb60 11003->11277 11282 4afd9ab 11003->11282 11287 4afe139 11003->11287 11292 4afd60e 11003->11292 11297 4afda75 11003->11297 11302 4afd5b9 11003->11302 11307 4afdca6 11003->11307 11315 4afe1dd 11003->11315 11320 4afd498 11003->11320 11325 4afd389 11003->11325 11333 4afdea6 11003->11333 11050 aa70a53 11049->11050 11341 aa71377 11050->11341 11346 aa71388 11050->11346 11051 aa70aa0 11351 4afa7b9 11051->11351 11355 4afa7c0 11051->11355 11052 aa70ade 11058 aa70d73 11057->11058 11367 4afa8d8 11058->11367 11371 4afa8e0 11058->11371 11059 aa70e0d 11062 aa71377 2 API calls 11059->11062 11063 aa71388 2 API calls 11059->11063 11060 aa70e5b 11375 4afac01 11060->11375 11379 4afac08 11060->11379 11061 aa70f96 11062->11060 11063->11060 11070 aa70667 11068->11070 11069 aa706ef 11071 aa71377 2 API calls 11070->11071 11072 aa71388 2 API calls 11070->11072 11071->11069 11072->11069 11074 aa7010b 11073->11074 11076 4afa8d8 NtWriteVirtualMemory 11074->11076 11077 4afa8e0 NtWriteVirtualMemory 11074->11077 11075 aa701f2 11076->11075 11077->11075 11079 aa70fee 11078->11079 11383 4afa6b9 11079->11383 11387 4afa6c0 11079->11387 11080 aa7102c 11084 aa704f8 11083->11084 11086 4afac08 NtSetContextThread 11084->11086 11087 4afac01 NtSetContextThread 11084->11087 11085 aa7051d 11086->11085 11087->11085 11089 aa703d7 11088->11089 11091 4afa6b9 NtResumeThread 11089->11091 11092 4afa6c0 NtResumeThread 11089->11092 11090 aa70416 11091->11090 11092->11090 11094 aa709ed 11093->11094 11391 4af9875 11094->11391 11395 4af9880 11094->11395 11099 aa7083f 11098->11099 11107 aa71377 2 API calls 11099->11107 11108 aa71388 2 API calls 11099->11108 11100 aa70896 11103 4afa8d8 NtWriteVirtualMemory 11100->11103 11104 4afa8e0 NtWriteVirtualMemory 11100->11104 11101 aa708d2 11105 aa71377 2 API calls 11101->11105 11106 aa71388 2 API calls 11101->11106 11102 aa70931 11103->11101 11104->11101 11105->11102 11106->11102 11107->11100 11108->11100 11110 aa706d3 11109->11110 11112 aa71377 2 API calls 11110->11112 11113 aa71388 2 API calls 11110->11113 11111 aa706ef 11112->11111 11113->11111 11115 aa701fb 11114->11115 11115->11114 11117 aa71377 2 API calls 11115->11117 11118 aa71388 2 API calls 11115->11118 11116 aa702a1 11117->11116 11118->11116 11120 aa70285 11119->11120 11122 aa71377 2 API calls 11120->11122 11123 aa71388 2 API calls 11120->11123 11121 aa702a1 11122->11121 11123->11121 11125 4af9311 11124->11125 11129 4afac08 NtSetContextThread 11125->11129 11130 4afac01 NtSetContextThread 11125->11130 11126 4af9336 11131 4afa8d8 NtWriteVirtualMemory 11126->11131 11132 4afa8e0 NtWriteVirtualMemory 11126->11132 11127 4af93e3 11399 4af9e60 11127->11399 11404 4af9e51 11127->11404 11128 4af9431 11129->11126 11130->11126 11131->11127 11132->11127 11136 4af891f 11135->11136 11137 4af89d1 11136->11137 11138 4afa8d8 NtWriteVirtualMemory 11136->11138 11139 4afa8e0 NtWriteVirtualMemory 11136->11139 11138->11136 11139->11136 11141 4af898b 11140->11141 11142 4af89d1 11140->11142 11141->11140 11143 4afa8d8 NtWriteVirtualMemory 11141->11143 11144 4afa8e0 NtWriteVirtualMemory 11141->11144 11143->11141 11144->11141 11146 4af8d65 11145->11146 11148 4afa6b9 NtResumeThread 11146->11148 11149 4afa6c0 NtResumeThread 11146->11149 11147 4af8da3 11148->11147 11149->11147 11151 4af9217 11150->11151 11153 4afac08 NtSetContextThread 11151->11153 11154 4afac01 NtSetContextThread 11151->11154 11152 4af92ee 11153->11152 11154->11152 11156 4af9038 11155->11156 11164 4af9e51 2 API calls 11156->11164 11165 4af9e60 2 API calls 11156->11165 11157 4af908f 11160 4afa8d8 NtWriteVirtualMemory 11157->11160 11161 4afa8e0 NtWriteVirtualMemory 11157->11161 11158 4af90cb 11162 4af9e51 2 API calls 11158->11162 11163 4af9e60 2 API calls 11158->11163 11159 4af912a 11160->11158 11161->11158 11162->11159 11163->11159 11164->11157 11165->11157 11167 4af85f2 11166->11167 11171 4af9e51 2 API calls 11167->11171 11172 4af9e60 2 API calls 11167->11172 11168 4af8660 11173 4af9e51 2 API calls 11168->11173 11174 4af9e60 2 API calls 11168->11174 11169 4af86a4 11175 4afa6b9 NtResumeThread 11169->11175 11176 4afa6c0 NtResumeThread 11169->11176 11170 4af879d 11171->11168 11172->11168 11173->11169 11174->11169 11175->11170 11176->11170 11178 4af8c1d 11177->11178 11181 4af9e51 2 API calls 11178->11181 11182 4af9e60 2 API calls 11178->11182 11179 4af8cfc 11183 4afa7b9 VirtualAllocEx 11179->11183 11184 4afa7c0 VirtualAllocEx 11179->11184 11180 4af8d3a 11181->11179 11182->11179 11183->11180 11184->11180 11186 4afbd6b 11185->11186 11188 4afa8d8 NtWriteVirtualMemory 11186->11188 11189 4afa8e0 NtWriteVirtualMemory 11186->11189 11187 4afbe52 11188->11187 11189->11187 11191 4afbd4e 11190->11191 11193 4afa8d8 NtWriteVirtualMemory 11191->11193 11194 4afa8e0 NtWriteVirtualMemory 11191->11194 11192 4afbe52 11193->11192 11194->11192 11196 4afc1e9 11195->11196 11198 4afac08 NtSetContextThread 11196->11198 11199 4afac01 NtSetContextThread 11196->11199 11197 4afc2c1 11198->11197 11199->11197 11201 4afbd1a 11200->11201 11203 4afac08 NtSetContextThread 11201->11203 11204 4afac01 NtSetContextThread 11201->11204 11202 4afbd3f 11203->11202 11204->11202 11206 4afb4c8 11205->11206 11208 4afa6b9 NtResumeThread 11206->11208 11209 4afa6c0 NtResumeThread 11206->11209 11207 4afb5b9 11208->11207 11209->11207 11211 4afb699 11210->11211 11409 4afc50f 11211->11409 11414 4afc520 11211->11414 11212 4afb7a5 11214 4afa8d8 NtWriteVirtualMemory 11212->11214 11215 4afa8e0 NtWriteVirtualMemory 11212->11215 11213 4afb7e1 11214->11213 11215->11213 11219 4afba88 11218->11219 11221 4afc50f 2 API calls 11219->11221 11222 4afc520 2 API calls 11219->11222 11220 4afbad6 11221->11220 11222->11220 11224 4afb2af 11223->11224 11229 4afc50f 2 API calls 11224->11229 11230 4afc520 2 API calls 11224->11230 11225 4afb2cb 11227 4afc50f 2 API calls 11225->11227 11228 4afc520 2 API calls 11225->11228 11226 4afb266 11226->11003 11227->11226 11228->11226 11229->11225 11230->11225 11232 4afb826 11231->11232 11235 4afa8d8 NtWriteVirtualMemory 11232->11235 11236 4afa8e0 NtWriteVirtualMemory 11232->11236 11233 4afb8c0 11237 4afc50f 2 API calls 11233->11237 11238 4afc520 2 API calls 11233->11238 11234 4afb90e 11235->11233 11236->11233 11237->11234 11238->11234 11240 4afbbc3 11239->11240 11241 4afbc72 11240->11241 11243 4afa6b9 NtResumeThread 11240->11243 11244 4afa6c0 NtResumeThread 11240->11244 11242 4afbcb8 11241->11242 11245 4afa6b9 NtResumeThread 11241->11245 11246 4afa6c0 NtResumeThread 11241->11246 11243->11241 11244->11241 11245->11241 11246->11241 11248 4afb50e 11247->11248 11250 4afa6b9 NtResumeThread 11248->11250 11251 4afa6c0 NtResumeThread 11248->11251 11249 4afb5b9 11250->11249 11251->11249 11253 4afbcb8 11252->11253 11254 4afbc72 11252->11254 11254->11252 11255 4afa6b9 NtResumeThread 11254->11255 11256 4afa6c0 NtResumeThread 11254->11256 11255->11254 11256->11254 11258 4afb982 11257->11258 11261 4afc50f 2 API calls 11258->11261 11262 4afc520 2 API calls 11258->11262 11259 4afb9cf 11263 4afa7b9 VirtualAllocEx 11259->11263 11264 4afa7c0 VirtualAllocEx 11259->11264 11260 4afba0d 11261->11259 11262->11259 11263->11260 11264->11260 11266 4afb7c3 11265->11266 11268 4afb809 11265->11268 11271 4afa8d8 NtWriteVirtualMemory 11266->11271 11272 4afa8e0 NtWriteVirtualMemory 11266->11272 11267 4afb7e1 11275 4afa8d8 NtWriteVirtualMemory 11268->11275 11276 4afa8e0 NtWriteVirtualMemory 11268->11276 11269 4afb8c0 11273 4afc50f 2 API calls 11269->11273 11274 4afc520 2 API calls 11269->11274 11270 4afb90e 11271->11267 11272->11267 11273->11270 11274->11270 11275->11269 11276->11269 11278 4afdb6a 11277->11278 11419 4afe4cf 11278->11419 11424 4afe4e0 11278->11424 11279 4afdbb8 11283 4afd9b7 11282->11283 11285 4afa8d8 NtWriteVirtualMemory 11283->11285 11286 4afa8e0 NtWriteVirtualMemory 11283->11286 11284 4afda51 11285->11284 11286->11284 11288 4afe145 11287->11288 11290 4afa8d8 NtWriteVirtualMemory 11288->11290 11291 4afa8e0 NtWriteVirtualMemory 11288->11291 11289 4afe1b8 11290->11289 11291->11289 11293 4afd61a 11292->11293 11295 4afa6b9 NtResumeThread 11293->11295 11296 4afa6c0 NtResumeThread 11293->11296 11294 4afd658 11295->11294 11296->11294 11298 4afdaa0 11297->11298 11300 4afe4cf 2 API calls 11298->11300 11301 4afe4e0 2 API calls 11298->11301 11299 4afdabc 11300->11299 11301->11299 11303 4afd5c5 11302->11303 11305 4afac08 NtSetContextThread 11303->11305 11306 4afac01 NtSetContextThread 11303->11306 11304 4afd5ea 11305->11304 11306->11304 11308 4afdcd8 11307->11308 11311 4afe4cf 2 API calls 11308->11311 11312 4afe4e0 2 API calls 11308->11312 11309 4afdd46 11313 4afe4cf 2 API calls 11309->11313 11314 4afe4e0 2 API calls 11309->11314 11310 4afdd8a 11311->11309 11312->11309 11313->11310 11314->11310 11316 4afe1f5 11315->11316 11318 4afac08 NtSetContextThread 11316->11318 11319 4afac01 NtSetContextThread 11316->11319 11317 4afe2cc 11318->11317 11319->11317 11321 4afd4a4 11320->11321 11323 4afa6b9 NtResumeThread 11321->11323 11324 4afa6c0 NtResumeThread 11321->11324 11322 4afd4e3 11323->11322 11324->11322 11326 4afd395 11325->11326 11331 4afe4cf 2 API calls 11326->11331 11332 4afe4e0 2 API calls 11326->11332 11327 4afd3e2 11329 4afa7b9 VirtualAllocEx 11327->11329 11330 4afa7c0 VirtualAllocEx 11327->11330 11328 4afd420 11329->11328 11330->11328 11331->11327 11332->11327 11334 4afdeb2 11333->11334 11337 4afe4cf 2 API calls 11334->11337 11338 4afe4e0 2 API calls 11334->11338 11335 4afdf09 11339 4afa8d8 NtWriteVirtualMemory 11335->11339 11340 4afa8e0 NtWriteVirtualMemory 11335->11340 11336 4afdf45 11337->11335 11338->11335 11339->11336 11340->11336 11343 aa71388 11341->11343 11342 aa713f2 11342->11051 11343->11342 11359 4afa508 11343->11359 11363 4afa500 11343->11363 11348 aa713ac 11346->11348 11347 aa713f2 11347->11051 11348->11347 11349 4afa508 NtReadVirtualMemory 11348->11349 11350 4afa500 NtReadVirtualMemory 11348->11350 11349->11348 11350->11348 11352 4afa7c0 VirtualAllocEx 11351->11352 11354 4afa87c 11352->11354 11354->11052 11356 4afa804 VirtualAllocEx 11355->11356 11358 4afa87c 11356->11358 11358->11052 11360 4afa554 NtReadVirtualMemory 11359->11360 11362 4afa5cc 11360->11362 11362->11343 11364 4afa508 NtReadVirtualMemory 11363->11364 11366 4afa5cc 11364->11366 11366->11343 11368 4afa8e0 NtWriteVirtualMemory 11367->11368 11370 4afa9c2 11368->11370 11370->11059 11372 4afa929 NtWriteVirtualMemory 11371->11372 11374 4afa9c2 11372->11374 11374->11059 11376 4afac08 NtSetContextThread 11375->11376 11378 4afacc9 11376->11378 11378->11061 11380 4afac51 NtSetContextThread 11379->11380 11382 4afacc9 11380->11382 11382->11061 11384 4afa6c0 NtResumeThread 11383->11384 11386 4afa75b 11384->11386 11386->11080 11388 4afa704 NtResumeThread 11387->11388 11390 4afa75b 11388->11390 11390->11080 11393 4af9880 CreateProcessW 11391->11393 11394 4af9ce4 11393->11394 11398 4af9910 CreateProcessW 11395->11398 11397 4af9ce4 11398->11397 11401 4af9e84 11399->11401 11400 4af9eca 11400->11128 11401->11400 11402 4afa508 NtReadVirtualMemory 11401->11402 11403 4afa500 NtReadVirtualMemory 11401->11403 11402->11401 11403->11401 11406 4af9e60 11404->11406 11405 4af9eca 11405->11128 11406->11405 11407 4afa508 NtReadVirtualMemory 11406->11407 11408 4afa500 NtReadVirtualMemory 11406->11408 11407->11406 11408->11406 11411 4afc51a 11409->11411 11410 4afc5ee 11410->11212 11411->11410 11412 4afa508 NtReadVirtualMemory 11411->11412 11413 4afa500 NtReadVirtualMemory 11411->11413 11412->11411 11413->11411 11416 4afc544 11414->11416 11415 4afc5ee 11415->11212 11416->11415 11417 4afa508 NtReadVirtualMemory 11416->11417 11418 4afa500 NtReadVirtualMemory 11416->11418 11417->11416 11418->11416 11421 4afe4da 11419->11421 11420 4afe54a 11420->11279 11421->11420 11422 4afa508 NtReadVirtualMemory 11421->11422 11423 4afa500 NtReadVirtualMemory 11421->11423 11422->11421 11423->11421 11426 4afe504 11424->11426 11425 4afe54a 11425->11279 11426->11425 11427 4afa508 NtReadVirtualMemory 11426->11427 11428 4afa500 NtReadVirtualMemory 11426->11428 11427->11426 11428->11426

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 308 1157d28-1157d4b 309 1157d52-1157d9e 308->309 310 1157d4d 308->310 313 1157da1 309->313 310->309 314 1157da8-1157dc4 313->314 315 1157dc6 314->315 316 1157dcd-1157dce 314->316 315->313 315->316 317 1157df5-1157e29 315->317 318 1157dd3-1157dd9 315->318 319 1157ef3-1157f05 315->319 320 1157e5e-1157e7d 315->320 321 1157eba-1157eee 315->321 322 1157f3a-1157f85 315->322 323 1157fa6-1158049 315->323 324 1157e82-1157e87 315->324 325 1157e2e-1157e32 315->325 326 1157f0a-1157f0e 315->326 327 1157f8a-1157fa1 315->327 316->323 317->314 340 1157de1-1157df3 318->340 319->314 320->314 321->314 322->314 332 1157e89-1157e98 324->332 333 1157e9a-1157ea1 324->333 330 1157e45-1157e4c 325->330 331 1157e34-1157e43 325->331 328 1157f21-1157f28 326->328 329 1157f10-1157f1f 326->329 327->314 335 1157f2f-1157f35 328->335 329->335 336 1157e53-1157e59 330->336 331->336 339 1157ea8-1157eb5 332->339 333->339 335->314 336->314 339->314 340->314
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: MhR$MhR$Te]q$Te]q
                              • API String ID: 0-1863040356
                              • Opcode ID: 4d94b8a8ee8b2360a3158bdb8d1cb1b0c468cff3e1c7d37048754055966b0da6
                              • Instruction ID: e792aaf52c7a316fe621466b192b9421f81d90527e65092a2c17a2ceee4458f1
                              • Opcode Fuzzy Hash: 4d94b8a8ee8b2360a3158bdb8d1cb1b0c468cff3e1c7d37048754055966b0da6
                              • Instruction Fuzzy Hash: E3A1D1B4E00219CFDB48CFAAC9819AEBBF2FF89300F608529D815AB354D7719905CF55

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 603 4af9880-4af993a 605 4af99f2-4af9a07 603->605 606 4af9940-4af997b 603->606 607 4af9a0d-4af9a53 605->607 608 4af9ab7-4af9abb 605->608 623 4af997d-4af9985 606->623 624 4af99b3-4af99c4 606->624 628 4af9a55-4af9a5d 607->628 629 4af9a91-4af9a9c 607->629 609 4af9abd-4af9aff 608->609 610 4af9b05-4af9b56 608->610 609->610 612 4af9c0e-4af9c20 610->612 613 4af9b5c-4af9b97 610->613 615 4af9c3d-4af9c4f 612->615 616 4af9c22-4af9c3a 612->616 643 4af9bcf-4af9be0 613->643 644 4af9b99-4af9ba1 613->644 620 4af9c6c-4af9ce2 CreateProcessW 615->620 621 4af9c51-4af9c69 615->621 616->615 625 4af9ceb-4af9d2c 620->625 626 4af9ce4-4af9cea 620->626 621->620 630 4af99a8-4af99b1 623->630 631 4af9987-4af9991 623->631 632 4af99ca-4af99ea 624->632 652 4af9d2e-4af9d3d 625->652 653 4af9d43-4af9d5a 625->653 626->625 635 4af9a5f-4af9a69 628->635 636 4af9a80-4af9a8f 628->636 642 4af9aa2-4af9ab1 629->642 630->632 637 4af9995-4af99a4 631->637 638 4af9993 631->638 632->605 639 4af9a6d-4af9a7c 635->639 640 4af9a6b 635->640 636->642 637->637 641 4af99a6 637->641 638->637 639->639 649 4af9a7e 639->649 640->639 641->630 642->608 656 4af9be6-4af9c06 643->656 650 4af9bc4-4af9bcd 644->650 651 4af9ba3-4af9bad 644->651 649->636 650->656 654 4af9baf 651->654 655 4af9bb1-4af9bc0 651->655 652->653 661 4af9d5c-4af9d68 653->661 662 4af9d73-4af9d83 653->662 654->655 655->655 659 4af9bc2 655->659 656->612 659->650 661->662 663 4af9d9a-4af9ddd 662->663 664 4af9d85-4af9d94 662->664 669 4af9ddf-4af9de3 663->669 670 4af9ded-4af9df1 663->670 664->663 669->670 673 4af9de5 669->673 671 4af9df3-4af9df7 670->671 672 4af9e01-4af9e05 670->672 671->672 674 4af9df9 671->674 675 4af9e07-4af9e0b 672->675 676 4af9e15 672->676 673->670 674->672 675->676 677 4af9e0d 675->677 678 4af9e16 676->678 677->676 678->678
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 04AF9CCF
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: ac2747cc545c310a88059488a041c50c052c6beb703b9890ef3f3f98bcd58205
                              • Instruction ID: 568434c3f8231a8686ed42a401f9678b0beb1630d5dd39dc67dd7418f4942e1a
                              • Opcode Fuzzy Hash: ac2747cc545c310a88059488a041c50c052c6beb703b9890ef3f3f98bcd58205
                              • Instruction Fuzzy Hash: 8E02C1B4E00229CFDB64CFA9CC80B9EBBB5BF49304F1481A9E519B7250DB34A985CF55

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 679 4af9875-4af993a 682 4af99f2-4af9a07 679->682 683 4af9940-4af997b 679->683 684 4af9a0d-4af9a53 682->684 685 4af9ab7-4af9abb 682->685 700 4af997d-4af9985 683->700 701 4af99b3-4af99c4 683->701 705 4af9a55-4af9a5d 684->705 706 4af9a91-4af9a9c 684->706 686 4af9abd-4af9aff 685->686 687 4af9b05-4af9b56 685->687 686->687 689 4af9c0e-4af9c20 687->689 690 4af9b5c-4af9b97 687->690 692 4af9c3d-4af9c4f 689->692 693 4af9c22-4af9c3a 689->693 720 4af9bcf-4af9be0 690->720 721 4af9b99-4af9ba1 690->721 697 4af9c6c-4af9ce2 CreateProcessW 692->697 698 4af9c51-4af9c69 692->698 693->692 702 4af9ceb-4af9d2c 697->702 703 4af9ce4-4af9cea 697->703 698->697 707 4af99a8-4af99b1 700->707 708 4af9987-4af9991 700->708 709 4af99ca-4af99ea 701->709 729 4af9d2e-4af9d3d 702->729 730 4af9d43-4af9d5a 702->730 703->702 712 4af9a5f-4af9a69 705->712 713 4af9a80-4af9a8f 705->713 719 4af9aa2-4af9ab1 706->719 707->709 714 4af9995-4af99a4 708->714 715 4af9993 708->715 709->682 716 4af9a6d-4af9a7c 712->716 717 4af9a6b 712->717 713->719 714->714 718 4af99a6 714->718 715->714 716->716 726 4af9a7e 716->726 717->716 718->707 719->685 733 4af9be6-4af9c06 720->733 727 4af9bc4-4af9bcd 721->727 728 4af9ba3-4af9bad 721->728 726->713 727->733 731 4af9baf 728->731 732 4af9bb1-4af9bc0 728->732 729->730 738 4af9d5c-4af9d68 730->738 739 4af9d73-4af9d83 730->739 731->732 732->732 736 4af9bc2 732->736 733->689 736->727 738->739 740 4af9d9a-4af9ddd 739->740 741 4af9d85-4af9d94 739->741 746 4af9ddf-4af9de3 740->746 747 4af9ded-4af9df1 740->747 741->740 746->747 750 4af9de5 746->750 748 4af9df3-4af9df7 747->748 749 4af9e01-4af9e05 747->749 748->749 751 4af9df9 748->751 752 4af9e07-4af9e0b 749->752 753 4af9e15 749->753 750->747 751->749 752->753 754 4af9e0d 752->754 755 4af9e16 753->755 754->753 755->755
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 04AF9CCF
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 1b6fe3b58960b9bdd9b1bbcf874d4de31b8e74944c533da440a68d64c7d5a9d7
                              • Instruction ID: da6da0fb008bd821fc10c1f4aa4f586494fe67e30ece835d26c79f93cd0b7902
                              • Opcode Fuzzy Hash: 1b6fe3b58960b9bdd9b1bbcf874d4de31b8e74944c533da440a68d64c7d5a9d7
                              • Instruction Fuzzy Hash: A2F1C2B4D00219CFDB24CFA9CC81B9EBBB5BF49304F1481A9E519B7250DB34A985CF55
                              APIs
                              • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 04AFA9B0
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryVirtualWrite
                              • String ID:
                              • API String ID: 3527976591-0
                              • Opcode ID: d3b3dbbe6dcc9b9ea2765ec8d0691401eee0ee5c54bedffb37d34fad08551a75
                              • Instruction ID: 1999ca802bac57cae6d9ae74e1a5e35840a7e662cabf2658c1e8f441a4ae18ac
                              • Opcode Fuzzy Hash: d3b3dbbe6dcc9b9ea2765ec8d0691401eee0ee5c54bedffb37d34fad08551a75
                              • Instruction Fuzzy Hash: D641BCB5D012589FCF00CFA9D984AEEFBF1BF49314F14902AE418B7210D739AA45CB64
                              APIs
                              • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 04AFA9B0
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryVirtualWrite
                              • String ID:
                              • API String ID: 3527976591-0
                              • Opcode ID: c6cc38cf126e83c3a5bccc7a9dbcd6977d3689b9a802473328346a7e0a3dc543
                              • Instruction ID: bc8f14f962249e3f39f028ae27030b3433b83c3e47b02a450f9b458652543837
                              • Opcode Fuzzy Hash: c6cc38cf126e83c3a5bccc7a9dbcd6977d3689b9a802473328346a7e0a3dc543
                              • Instruction Fuzzy Hash: C641ABB5D012589FCF10CFA9D984AEEFBF1BB49310F10902AE418B7210D739AA45CB64
                              APIs
                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 04AFA5BA
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryReadVirtual
                              • String ID:
                              • API String ID: 2834387570-0
                              • Opcode ID: 7ff32651f5e0ef0301fd7635971d82d97560db7e00388351af7a266a8ae6a9ea
                              • Instruction ID: cbbfdfbc1eb5551b1e68fffbb7f7c94563f0b15542ca75f81f34698def35cba1
                              • Opcode Fuzzy Hash: 7ff32651f5e0ef0301fd7635971d82d97560db7e00388351af7a266a8ae6a9ea
                              • Instruction Fuzzy Hash: 6C41AAB5D002589FCF10CFA9D980AEEFBB1BF19310F14942AE819B7210D739A945CF64
                              APIs
                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 04AFA5BA
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryReadVirtual
                              • String ID:
                              • API String ID: 2834387570-0
                              • Opcode ID: 206a974d7cf081b2c6e55d5a46b32d96aedc31066a71ef3b3f98ca94538482bc
                              • Instruction ID: 66ac294198ac933aefd8c3a8c3984e6bd5cb9bf0bd845cd40d4e7cf7d9e01e39
                              • Opcode Fuzzy Hash: 206a974d7cf081b2c6e55d5a46b32d96aedc31066a71ef3b3f98ca94538482bc
                              • Instruction Fuzzy Hash: 54419BB5D042589FCF10CFA9D984AEEFBB1BF49310F10942AE919B7210D735A945CF64
                              APIs
                              • NtSetContextThread.NTDLL(?,?), ref: 04AFACB7
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: ContextThread
                              • String ID:
                              • API String ID: 1591575202-0
                              • Opcode ID: 1993e6d08590ab07ab4f1ffc4a0201592832722b2d0386b403610f0fc5353751
                              • Instruction ID: c2c95cf9c746a16af04bf3e9a7292ebae3d319fa1b34c625405a42c13eb9d53a
                              • Opcode Fuzzy Hash: 1993e6d08590ab07ab4f1ffc4a0201592832722b2d0386b403610f0fc5353751
                              • Instruction Fuzzy Hash: 6F41ABB5D002589FCB10DFEAD984AEEBBF1BF49310F14902AE419B7240D739A945CFA4
                              APIs
                              • NtSetContextThread.NTDLL(?,?), ref: 04AFACB7
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: ContextThread
                              • String ID:
                              • API String ID: 1591575202-0
                              • Opcode ID: 3430a513e9f8f8dce3975ce6b0ab3b19b5b084aba99ce3decc71a89eeaa1db0d
                              • Instruction ID: d55ad922a1126f5c763434dbb141405ef06e8f68c0a40827305b8797d85d1292
                              • Opcode Fuzzy Hash: 3430a513e9f8f8dce3975ce6b0ab3b19b5b084aba99ce3decc71a89eeaa1db0d
                              • Instruction Fuzzy Hash: A631ABB4D002589FCB10DFEAD984AEEBBF1BF49310F14802AE419B7240D739A945CFA4
                              APIs
                              • NtResumeThread.NTDLL(?,?), ref: 04AFA749
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: e521ad646689aa4ae174e1f96aafe96175a26fd38ee242ef45ecf8acb451600d
                              • Instruction ID: 768ba38a6c4e0cf9c99789313dbcffc9dc7988dc9d64fbfb4bb6c304872a4dd6
                              • Opcode Fuzzy Hash: e521ad646689aa4ae174e1f96aafe96175a26fd38ee242ef45ecf8acb451600d
                              • Instruction Fuzzy Hash: B53199B8D012189FCB10CFA9D984ADEFBF5BF49310F14942AE819B7200D735A945CF94
                              APIs
                              • NtResumeThread.NTDLL(?,?), ref: 04AFA749
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 87eff08a7948f198bff28948d22b8eac78f49042c3e5bfeb529b807d9cf20fa0
                              • Instruction ID: 9e8309502675f277582be93c65ab182cc8305b312d452b6eb5ce37589c88e91b
                              • Opcode Fuzzy Hash: 87eff08a7948f198bff28948d22b8eac78f49042c3e5bfeb529b807d9cf20fa0
                              • Instruction Fuzzy Hash: 623199B8D012189FCB10DFA9D984ADEFBF5FB49310F10942AE819B7200D779A945CFA4
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 75fcf0ee49c6fa24f7a12a588acfa60fc5cc56c755c9a8e20a132f7a1dc220bb
                              • Instruction ID: c7732062fec84c1b3a8e8403d9efe9bb17692a3cb474b51df63400bf44fe90a9
                              • Opcode Fuzzy Hash: 75fcf0ee49c6fa24f7a12a588acfa60fc5cc56c755c9a8e20a132f7a1dc220bb
                              • Instruction Fuzzy Hash: A8E17DF2D043248FD79ACF558D491DDB7B2FB91321BCA80AED4899A625FA368941CF40
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a5206844b518db7fa4e2099eec4cfd908fa76aa02f212067ba1bc278017e8b42
                              • Instruction ID: 48774719a73e7a6e4a9594edf5ce77c365047c17f200f8e30fe3d4aa7abba6e9
                              • Opcode Fuzzy Hash: a5206844b518db7fa4e2099eec4cfd908fa76aa02f212067ba1bc278017e8b42
                              • Instruction Fuzzy Hash: BDA1B474E00208DFCB54DFA5E88569CBBB2FF89310F50906AD81AEB364DB745986CF21
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6bef411b243a30655dff892e7ceac79f1b44283cd8b89f0d3348dd53d86afe7a
                              • Instruction ID: 74faa8eb7fd6f8f748d8ac97870a6254ecd6272241550c010fa61e4ef1c66341
                              • Opcode Fuzzy Hash: 6bef411b243a30655dff892e7ceac79f1b44283cd8b89f0d3348dd53d86afe7a
                              • Instruction Fuzzy Hash: 2D615970D15219DFCF48DFE5D5406AEBBB1FB89308F10852AC826AB258D7759A02CF52
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6552dfa6bfd23a42f8cfc0160eace934bfa63614c6f19f4c842de82e8c730408
                              • Instruction ID: b3a006997c126cdcbb099ae03994d9f325b49b01c1d5ee4275a9aaa4d57f7fe3
                              • Opcode Fuzzy Hash: 6552dfa6bfd23a42f8cfc0160eace934bfa63614c6f19f4c842de82e8c730408
                              • Instruction Fuzzy Hash: D2412471E116188BEB5DCF6B8D4078EFAF7AFC9201F14C1BAD91CAA215DB7016468F11
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ae95bc791c0903b0fd69e7a3c6bb50ac25fee380dd80894381f1e42d2753ab5b
                              • Instruction ID: af7f89ea6bdaea2150a007cc4673c8571bbc91eac26ef52777b372113c3a863d
                              • Opcode Fuzzy Hash: ae95bc791c0903b0fd69e7a3c6bb50ac25fee380dd80894381f1e42d2753ab5b
                              • Instruction Fuzzy Hash: B6414371E016588BEB5DCF6B8D4178AFAF7AFC9200F14C1BA880CAA225DB7406468F11

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 594 1153645-1153646 595 11536ac-11536b2 594->595 596 1153648-1153665 594->596 597 11536bd-1153743 595->597 596->595
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: l.dl$$]q
                              • API String ID: 0-1344983801
                              • Opcode ID: 40239cc40ae3c1b17fbe61b0b273b0a08cc3334feb55220f928576933cdc73e6
                              • Instruction ID: 1ace634222fee2da84ffce3fea41df51d6c0a4b56250b1a841f8d5ee7276e840
                              • Opcode Fuzzy Hash: 40239cc40ae3c1b17fbe61b0b273b0a08cc3334feb55220f928576933cdc73e6
                              • Instruction Fuzzy Hash: 74110474A40229CFCB2ACF65C954B9EBBB6BF89340F1094E99449AB315CB708E81CF55
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00FB4E3F
                              Memory Dump Source
                              • Source File: 00000005.00000002.2075777880.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_fb0000_efthfxj.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 58a89ae509a52817a7ce7f4a77d648e1af32dca8762bdf202ca8be4bc4aad284
                              • Instruction ID: 0f64c9cb390fcce176d4f4441f87fa031ab6e899435a8b6ab92c97b60d17ad17
                              • Opcode Fuzzy Hash: 58a89ae509a52817a7ce7f4a77d648e1af32dca8762bdf202ca8be4bc4aad284
                              • Instruction Fuzzy Hash: F7515D74D182988FEB16CFB5C99698DFFB0EF06300F1490AED8C967292C2359907CB51
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04AFA86A
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: b41a09151a235eccb5730205b5f20a8214388981280ef65a9054be53a405821f
                              • Instruction ID: 9870a21688f5304aa3184ec619e44893d862e708b338d3d50f99e4c0175ae1b3
                              • Opcode Fuzzy Hash: b41a09151a235eccb5730205b5f20a8214388981280ef65a9054be53a405821f
                              • Instruction Fuzzy Hash: 3A3199B5D002589FCF10CFA9D980ADEFBB1FB49310F10A42AE819B7210D775A942CF94
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04AFA86A
                              Memory Dump Source
                              • Source File: 00000005.00000002.2078574746.0000000004AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AF0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_4af0000_efthfxj.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: d5b5be50bb4c0e425611b469ea653b40c6d02ba481ed1a3a1a28dbd0fbd1e2e4
                              • Instruction ID: 6526c1193f3b1dceb4a2c0eb29b0a3cdd8dbdda22dd7c5cc3bab827185243d83
                              • Opcode Fuzzy Hash: d5b5be50bb4c0e425611b469ea653b40c6d02ba481ed1a3a1a28dbd0fbd1e2e4
                              • Instruction Fuzzy Hash: 9A3187B9D002589FCF10CFA9D980ADEFBB5FB49310F10942AE919B7210D775A946CFA4
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00FBA51F
                              Memory Dump Source
                              • Source File: 00000005.00000002.2075777880.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_fb0000_efthfxj.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 1794349b46dd7cd524ce7a8805da3c8ebb10d9458057d5056df648f2356183b8
                              • Instruction ID: 6ea60387738ef55fd5b9721f24632c380ec0d0e72825e08557c1fd9491786e83
                              • Opcode Fuzzy Hash: 1794349b46dd7cd524ce7a8805da3c8ebb10d9458057d5056df648f2356183b8
                              • Instruction Fuzzy Hash: BB318BB5D042589FCB10CFA9D584ADEFBF5BF19310F14902AE818B7210D375AA45CF64
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00FB4E3F
                              Memory Dump Source
                              • Source File: 00000005.00000002.2075777880.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_fb0000_efthfxj.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 58d1f9616d47da3156a97c634080e0342a87785503ad90998d65b18165720d0b
                              • Instruction ID: 03e5b53d6dac6209acd5a0fde92dfd315e96f9120686ca9ea5fbdd2666a4f061
                              • Opcode Fuzzy Hash: 58d1f9616d47da3156a97c634080e0342a87785503ad90998d65b18165720d0b
                              • Instruction Fuzzy Hash: 6E3179B9D042589FCF10CFAAD584ADEFBF5BB19310F24902AE818B7211D375A945CFA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,
                              • API String ID: 0-3772416878
                              • Opcode ID: e69304722053b496247961f3dcc567332d9cb239068971986b2eb76ab4c923c9
                              • Instruction ID: 697c7d7bb08513ad7294d3feb20e149e8a70d7b4444d2fc2d4909bfcea87f92c
                              • Opcode Fuzzy Hash: e69304722053b496247961f3dcc567332d9cb239068971986b2eb76ab4c923c9
                              • Instruction Fuzzy Hash: 93518074A052299FDB60DF68CD98BDEBBB1AB48301F5091D9E80DA7351DB31AE81CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: 9"U
                              • API String ID: 0-2706808553
                              • Opcode ID: fa6119a6229f4185ac3c0991b44fb8564cc30589ab41709ed746e649b4490a33
                              • Instruction ID: dd25dc67a826b81a1e44ba4a4573e1ef1f7996478d5e5107c454cc98d52d4330
                              • Opcode Fuzzy Hash: fa6119a6229f4185ac3c0991b44fb8564cc30589ab41709ed746e649b4490a33
                              • Instruction Fuzzy Hash: 67211874E04208EFCB48DFA9D584A9DBBF2FF88200F14C5A6D919A7354D770DA01CB11
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: Y
                              • API String ID: 0-3233089245
                              • Opcode ID: 2733dff247988581693e1f66bcf75ef1a5dd2364a7f6a9b2e70c55996b88e92b
                              • Instruction ID: 34d25f7693aa4dac6119f3ad6b8706033f5972f0bcd5c704ee971027cfc33f4e
                              • Opcode Fuzzy Hash: 2733dff247988581693e1f66bcf75ef1a5dd2364a7f6a9b2e70c55996b88e92b
                              • Instruction Fuzzy Hash: 00316D74A01229CFDBA5DF25C998B9DBBB5BB49300F5081D9E84DA7360DB309E81CF01
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: $]q
                              • API String ID: 0-1007455737
                              • Opcode ID: 2d514e32d27c19871efd1c516ac314f1dff2afef5dbb1e9e1fd766c93bcca368
                              • Instruction ID: ad84e8b6a7e87d2b1bbf2911ef85adb4b79646f4b46b379af07a3963ea56ccb8
                              • Opcode Fuzzy Hash: 2d514e32d27c19871efd1c516ac314f1dff2afef5dbb1e9e1fd766c93bcca368
                              • Instruction Fuzzy Hash: 97112974A40228CFCB6ACF24C844B9DBBBABF85300F1045EA944967214DB708FC1CF45
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: 67b682530c91a33317c1f52ba2c21bd815b6f63c783cc329b4c5045bb3c6204b
                              • Instruction ID: 07185fcc39dd065a1467761f3f725f5a147fddd75b0ad8b16b212eb0d953e43e
                              • Opcode Fuzzy Hash: 67b682530c91a33317c1f52ba2c21bd815b6f63c783cc329b4c5045bb3c6204b
                              • Instruction Fuzzy Hash: B5F0CFB4E0222DDEDBA8CF60DA8079EBB76BF52340F5010A9D5987A250C7301A81CF52
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: <
                              • API String ID: 0-4251816714
                              • Opcode ID: 914d4185daec4775c3268ffe83eba6d690f262b32c5ed1262d3d5b91f965c172
                              • Instruction ID: edabe514a35f4c0d0317f0b2fb68a79932efa3474775fd3b895ec22b19efe715
                              • Opcode Fuzzy Hash: 914d4185daec4775c3268ffe83eba6d690f262b32c5ed1262d3d5b91f965c172
                              • Instruction Fuzzy Hash: 97F0F9B0D22229CFDBA5CF25C960B99BBB4BF45600F0094D9C44967212D7714BC0CF11
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 67bdbd8c1a711bad5003a44ab7b7409eb2e481b5b3a810ad9dfec69f65bd657f
                              • Instruction ID: 359cd1a5eb00b5d66470fba5490f36634b7228c57ed42923e40489da5b4e290a
                              • Opcode Fuzzy Hash: 67bdbd8c1a711bad5003a44ab7b7409eb2e481b5b3a810ad9dfec69f65bd657f
                              • Instruction Fuzzy Hash: 3C51A074E00219DFCF54CFA9D8509EEBBF6BF88310F10912AE419AB2A4DB359902CF51
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 13f987e229be35c84f650dc7baf561c69bb835bd31f56a3607fff4c95eed1f52
                              • Instruction ID: 3cca3c9b1bd2eba214a00099acb11cc83fe8ef0b1392a6bf49bf07bad3e221a2
                              • Opcode Fuzzy Hash: 13f987e229be35c84f650dc7baf561c69bb835bd31f56a3607fff4c95eed1f52
                              • Instruction Fuzzy Hash: 4251AFB5E042199FCF54CFA5D8909EEBBF6FF88300F14912AE415AB2A4DB359902CF51
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c47b498b123b7a1df9ed8e5a0c161f754358478adaf071bccc0ceac7a726f9da
                              • Instruction ID: 9cfed4c2c3b4356f86b39d5429a4d778417f99f3a317a6630964cf3790e4f3b6
                              • Opcode Fuzzy Hash: c47b498b123b7a1df9ed8e5a0c161f754358478adaf071bccc0ceac7a726f9da
                              • Instruction Fuzzy Hash: CC410774D05209DFCF48CFA9E9446AEBBB2EF88300F10946AD815B7364DB749A01CF62
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8b163b78554ff28f318b2666d46ada8290eedd8118310fa6058494a7a9c26169
                              • Instruction ID: 37da4eab5d00f770187c656ee316101238c01b0dd36b197146f33d42046a0cd9
                              • Opcode Fuzzy Hash: 8b163b78554ff28f318b2666d46ada8290eedd8118310fa6058494a7a9c26169
                              • Instruction Fuzzy Hash: 504192B5A012199FDBA5DF58C885BDEBBF9AB49300F1481D9E84CE7351DB319E818F20
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6cc3869451b0d3aba25fab28e698b883a2475b9f1dfcc934662a9ebc011cf1d0
                              • Instruction ID: 7996fd978ba6eadadb33b629e491a33d3b6bab3928072646b852639044f689f9
                              • Opcode Fuzzy Hash: 6cc3869451b0d3aba25fab28e698b883a2475b9f1dfcc934662a9ebc011cf1d0
                              • Instruction Fuzzy Hash: CB31C874E05209DFCB88CFAAC5815AEBBF2FB88300F10956AD919E7314D7749A41CF51
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cfeb72912e25aabd4b80e64b7dc48e7df10b3320769dab48c651946475b7d621
                              • Instruction ID: 4aad3ce29099862ed5f0b5e2c96afbfbc5685f7a7121dca0903ed28f7dc76cf4
                              • Opcode Fuzzy Hash: cfeb72912e25aabd4b80e64b7dc48e7df10b3320769dab48c651946475b7d621
                              • Instruction Fuzzy Hash: F331B4B5E012199FCB65CB58CC51BDEBBB1AB98300F14C0A5A55DA7351EB709E81CF50
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b69c341680da5059596b93e5ba63b64735805411ebabc084bd4009976abe09a4
                              • Instruction ID: 1053b83d60f5cbd25a2c05bf2dc3c8cb9267d7c6c0733ac750cf9c6f95c32d2a
                              • Opcode Fuzzy Hash: b69c341680da5059596b93e5ba63b64735805411ebabc084bd4009976abe09a4
                              • Instruction Fuzzy Hash: 3631BD74A012298FCB25CF68CD94ADEFBF1AF48300F1480E9940CA7261DB30AE96CF54
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e4646a2c36d3aab535fa3e45d9d8b5d715123cce419cb1330bfd05b5e0763dff
                              • Instruction ID: fe0854bdebe5ae0326a5508e870161436edc0e283c689caf9b27aa57cde28b6a
                              • Opcode Fuzzy Hash: e4646a2c36d3aab535fa3e45d9d8b5d715123cce419cb1330bfd05b5e0763dff
                              • Instruction Fuzzy Hash: EE315A74911229DFDBA0DF58C884B9EBBB1EB48310F1095DAE80DA7391DB309E81CF11
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 65c925de2c8b0ce4118e2e293c93a41f6f9ad88ca8406ba46605f193526a0e86
                              • Instruction ID: 835d3b017ad036a543d888797084b6b631e057fe743afe908262d1c588bbd507
                              • Opcode Fuzzy Hash: 65c925de2c8b0ce4118e2e293c93a41f6f9ad88ca8406ba46605f193526a0e86
                              • Instruction Fuzzy Hash: F3218074A012289FDBA4DF68EC88B9DBBF1BB49301F1081D9D84DA7351DB309E858F21
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 826be79166f8c37d04a7fd737b8b59b57f926937ac76c0511255d3ae84a85c47
                              • Instruction ID: 96bbdb331ad260f56d38ec3b67ab45fc40e97494314dcd4a10268aebf696d4cb
                              • Opcode Fuzzy Hash: 826be79166f8c37d04a7fd737b8b59b57f926937ac76c0511255d3ae84a85c47
                              • Instruction Fuzzy Hash: 82118E74859358DFCB57CF78C8806AD7FB0FF06320B90829DD48096246EB764A55CB81
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 53f9edf5e72eb5c0b85c3b2a16bbcd19aa6a7be6a8379b210795999473c06c22
                              • Instruction ID: d08ea946c0b5a2c0309b14d0100d9cc8bc0fcf7252ed8738cd5c69b3148f4195
                              • Opcode Fuzzy Hash: 53f9edf5e72eb5c0b85c3b2a16bbcd19aa6a7be6a8379b210795999473c06c22
                              • Instruction Fuzzy Hash: 6F014CB49051199FDBA0DF69C855BDEBAF6FB88300F10D0E9E50DE7241EA349E858F24
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 26dadd4958688b02eb27f9d7b8c23c0b4465a6c6864a22310ea6cd177d05b75c
                              • Instruction ID: 84ed47f1c85092cb02152649ff8d50f7abbe87957a328e50c4d76b552a20eeaa
                              • Opcode Fuzzy Hash: 26dadd4958688b02eb27f9d7b8c23c0b4465a6c6864a22310ea6cd177d05b75c
                              • Instruction Fuzzy Hash: 97015E70C09348EFCB5ACF78C8806ADBFB0FF05310F5086A9D864D6252E7768A55CB85
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e07cdc2c21fbbdb6a8dd74fbb3b30c91eb2a15533d28e9a4f3d948e82051f5e1
                              • Instruction ID: c73dbff8609986006f0fff924ba6d938090277a2c939538f08feae4fcc526eb5
                              • Opcode Fuzzy Hash: e07cdc2c21fbbdb6a8dd74fbb3b30c91eb2a15533d28e9a4f3d948e82051f5e1
                              • Instruction Fuzzy Hash: 43F03A70C05348DFCB45DFB8C842AADBFB0EB06310F1086AAD854E7252D7B59A51CB91
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d4ca5ecadc3cecff2991b7310e072a54ee7d8baa06b54062e950b6cad1117066
                              • Instruction ID: 27e461f43b1ea958d68379b3be0c7ccbbca1a4e28992a49ba094a1b91255dffb
                              • Opcode Fuzzy Hash: d4ca5ecadc3cecff2991b7310e072a54ee7d8baa06b54062e950b6cad1117066
                              • Instruction Fuzzy Hash: 2A01B271D01219AFDF25DFA1DD44ADDBBB2BF88300F2081AAA509A3260D7315E829F10
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eb995be01145fbc6ef1bf72e2ff6efe800577e1f55e7892b11095598566e98d4
                              • Instruction ID: d38efb0132abb7768753b0ef06598ac8511664a5781f4b7422699684e6a0e5ae
                              • Opcode Fuzzy Hash: eb995be01145fbc6ef1bf72e2ff6efe800577e1f55e7892b11095598566e98d4
                              • Instruction Fuzzy Hash: FFF0DAB5901115AFDBA1DB58DC51BDEB6BABF88300F40D0A4F40CE3241EA349E408F60
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8dac9454d0fe3c2b78f2e50107bf5439f8d464b45659f5553e661fc6d057163d
                              • Instruction ID: 255da25d65b19b89c5c409f7f1f03a97f8ae8b78acc48dfed7faa5110f82a137
                              • Opcode Fuzzy Hash: 8dac9454d0fe3c2b78f2e50107bf5439f8d464b45659f5553e661fc6d057163d
                              • Instruction Fuzzy Hash: E2F04975D166298FDBA0CF24CC44ADEBBF0BB55300F14D0DAD44AE7251EB304A869F61
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec02aaf5ae329f9782a7ea5fbc8b3c12ba861c204da1301e34229887055b2154
                              • Instruction ID: e1dd4a28bc9055c5f0a7a295647a4833269146033d9ab0097042207f624837d6
                              • Opcode Fuzzy Hash: ec02aaf5ae329f9782a7ea5fbc8b3c12ba861c204da1301e34229887055b2154
                              • Instruction Fuzzy Hash: C4F01230A01759CFCB59DF25CC50779B3BAFF84606F1454D988096B254CA319EC2DF16
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f8af23c11f61bf060092ccda59e4d5bcce584475eb4e2ebc3bfebab3163d334e
                              • Instruction ID: 30bd6cb3cf0b83ccf8be4c833af1bb5e1dae5ed88d397f00a56fa0bfd076624c
                              • Opcode Fuzzy Hash: f8af23c11f61bf060092ccda59e4d5bcce584475eb4e2ebc3bfebab3163d334e
                              • Instruction Fuzzy Hash: DBF09774A022148FDBA4CF24C944A9EF7B1EF49310F55C5E99449A7251DB31DE81CF01
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0936d1516cf01bed824f30d84369a2d96bebab765136b2d451beefe2edf1609f
                              • Instruction ID: 556293511de6b3c19659039caf0afcc959c90adafdf7b57268c2b0c88504c0e5
                              • Opcode Fuzzy Hash: 0936d1516cf01bed824f30d84369a2d96bebab765136b2d451beefe2edf1609f
                              • Instruction Fuzzy Hash: 6CE0E5F5A011159FD794DB58CC51BEEB6BAAB89300F10D099F509E3251D7345D418F60
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1afe400d4e4199f10575bbe1b120b351670238970474b8b2590d4c50fa96f9f6
                              • Instruction ID: cc1263b6c0fbfe32dbd12feed8662afa2147f8f4cd37211b74a2bb060ac8b35f
                              • Opcode Fuzzy Hash: 1afe400d4e4199f10575bbe1b120b351670238970474b8b2590d4c50fa96f9f6
                              • Instruction Fuzzy Hash: 31F0F274D0020DEFCF41DFA8D905AAEBFB1FB08310F0085A9E828A2210D7719660EF90
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c30ab7d238c33cd70d3a1cb4e06b7ff664a5e37b25c228e9f0d2140da3f08e7d
                              • Instruction ID: c17a8cf2f3ce962dfd298bb6b3682eac7cced940628cb9ea588b486a8c72d0c3
                              • Opcode Fuzzy Hash: c30ab7d238c33cd70d3a1cb4e06b7ff664a5e37b25c228e9f0d2140da3f08e7d
                              • Instruction Fuzzy Hash: B9F0C9B8D41218DFCB44DFA8D944AADBBF4FB08310F1085AAE818E3311E7719A50DF91
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d4073543cfa7918b50564b0e23402220dcb53ab3918f27143bad7bf1de58f767
                              • Instruction ID: 95bd6617793765db17fbd8057c0ca697c2823bb2a6b03c6e9a25515d9d266427
                              • Opcode Fuzzy Hash: d4073543cfa7918b50564b0e23402220dcb53ab3918f27143bad7bf1de58f767
                              • Instruction Fuzzy Hash: 17E0EEB1D15208AFCB61EFA8C84538CBBF0AB14316F1481A99448E2390E7B69A80CB50
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e4792dddd0a727ba0b249c37771137e827ad6410b879fbe0dbdadfb5152b34d1
                              • Instruction ID: f03ac934829d53c0e6fae2c5f130398341387b106a56694b433e3eba65d67381
                              • Opcode Fuzzy Hash: e4792dddd0a727ba0b249c37771137e827ad6410b879fbe0dbdadfb5152b34d1
                              • Instruction Fuzzy Hash: 8BE0E5B0D00308EFCB45EFA8D8446ADBFF0FB48300F5086AAD824A3300E7719A50DB94
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d8f332a0bfb23fa6b48786e22de3f0c55b1aa39a2394301a4a4696c2f2cc9ea0
                              • Instruction ID: 86a17bbf3d122ffd4e27d552a4adb870354113e849b8e5e45bbc41636f6c3730
                              • Opcode Fuzzy Hash: d8f332a0bfb23fa6b48786e22de3f0c55b1aa39a2394301a4a4696c2f2cc9ea0
                              • Instruction Fuzzy Hash: 53E0E5B0D00309EFCB44EFA8D8006AEBBB1FB08300F5086AAD828A3341D7719691DB95
                              Memory Dump Source
                              • Source File: 00000005.00000002.2079935868.000000000AA70000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_aa70000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: db17c01580b3e5c2d05a127c32f2f9abc07f7cee82e2ec53a677026b54bbe5a2
                              • Instruction ID: 7c6f4b96e9743dd39710302b9c877968dacbb3448b9f4f0154d67935a9c0fe24
                              • Opcode Fuzzy Hash: db17c01580b3e5c2d05a127c32f2f9abc07f7cee82e2ec53a677026b54bbe5a2
                              • Instruction Fuzzy Hash: BCF0F2349012299FCB64CF14C880AA9FBB2EB49310F24C0D9981CA7212CB31EE828F10
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 831d044146a6bd7ee8a628e760fc6c986c7d1b4aba3f0fb25b2c1ca8dfe2fe56
                              • Instruction ID: 1aef2e482c4a0cdb63d20e03103731d1e674aa579f55f7d47d45263efa2472e9
                              • Opcode Fuzzy Hash: 831d044146a6bd7ee8a628e760fc6c986c7d1b4aba3f0fb25b2c1ca8dfe2fe56
                              • Instruction Fuzzy Hash: 8BE07EB5E0031CCFDF54CF98C880AADBBB5AB19310F0050599918AB340D3349985CF19
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f7bace7253aacc5b4de98c3a216133ea71a36f74f71201b2a9ce25e16e79414c
                              • Instruction ID: fae05a786f15ee16e316d396ddc6bb7c823732b6671e489b54f8b7765e90d7b5
                              • Opcode Fuzzy Hash: f7bace7253aacc5b4de98c3a216133ea71a36f74f71201b2a9ce25e16e79414c
                              • Instruction Fuzzy Hash: 2AE09A349412699FCB94DF69DA90B9CB7B5FF44204F0045E6D01DB7264D7305D49CF20
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 85f473f3ed23c7f90a3c8ab5789618506b9ab096ec8aa4e3c4187c5638020a70
                              • Instruction ID: addaf2e77ca9ef55e1684df20cf567415c864142b91f80d2c903e1e69135f9e9
                              • Opcode Fuzzy Hash: 85f473f3ed23c7f90a3c8ab5789618506b9ab096ec8aa4e3c4187c5638020a70
                              • Instruction Fuzzy Hash: 06E01771D0401ECFDB58CBA0C840BAEF3B5BF84300F1094AA881AB7204D7309A81CF24
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 324e58a04a4d78050a12cd5028f418e1be8d2a0f6d89f931331fc1ff3082a844
                              • Instruction ID: ad30374a5cb4b67ea0a8d0e5223cf90540de57009d465471ea69200b161a1b47
                              • Opcode Fuzzy Hash: 324e58a04a4d78050a12cd5028f418e1be8d2a0f6d89f931331fc1ff3082a844
                              • Instruction Fuzzy Hash: B8D09E7691412ECFCB58CB91C840BAEB6B5AB54340F1055A98519FB245D7349A818F24
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3668fc8cdc316f67de2d5efa954d9a13ae8be7e6e3d9a745b02ae71cbd72ee9c
                              • Instruction ID: 62034ec72a31d2bd31654cf5b8b1e6141bb71bdf74cb18ade962a9de05515a6e
                              • Opcode Fuzzy Hash: 3668fc8cdc316f67de2d5efa954d9a13ae8be7e6e3d9a745b02ae71cbd72ee9c
                              • Instruction Fuzzy Hash: B9D0C97690421ECBCB98DA90C840BAEB3B5BB55300F005555885AB7340CB3489828B15
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d2ebdd069914d330d50cacc95b0d2f2899efc0212a875cddc69f20d07bf981f
                              • Instruction ID: c4de947f6e943f763bd202abc7b876e11bed672eb96cc97744fbd97ec46b25a0
                              • Opcode Fuzzy Hash: 1d2ebdd069914d330d50cacc95b0d2f2899efc0212a875cddc69f20d07bf981f
                              • Instruction Fuzzy Hash: 7BE0EC30908259CFCB19CF54CA40B99B7B9FF44204F0045E59109A7228D3709E82CF20
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 29e9ca138837a3dc81fdad7eb4118117df270811e961ec5f22eaabcb1bef38ed
                              • Instruction ID: e602d554b2c14102a83d3549dfcc40c7427efc4b99ccac56cee25434ddbad8f4
                              • Opcode Fuzzy Hash: 29e9ca138837a3dc81fdad7eb4118117df270811e961ec5f22eaabcb1bef38ed
                              • Instruction Fuzzy Hash: 62D0C971D0011DCBCB58DF90C950BAEB374BF14300F0090998819B3200DB7459C1CF19
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2409d59e5f45128d13b3e02d09004f7979442405c86e178bf96b53c6a3c6848b
                              • Instruction ID: 198ebcc60b9607c5e7a89522dfd56450af28a6e0ad38dc50add990853b999352
                              • Opcode Fuzzy Hash: 2409d59e5f45128d13b3e02d09004f7979442405c86e178bf96b53c6a3c6848b
                              • Instruction Fuzzy Hash: FBC012B1D0421DCFCB54CF90C8107AEB274BB15300F005659891977200D33084828F19
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ac92589779e1471571e81ba5f969e2336d9db3b0cfae4b03c498739c3913345b
                              • Instruction ID: b95ddd1ab7c9a11a9db6871f60e42908e5dfc3b5074c7f58e31e22729bdde8e2
                              • Opcode Fuzzy Hash: ac92589779e1471571e81ba5f969e2336d9db3b0cfae4b03c498739c3913345b
                              • Instruction Fuzzy Hash: B2C0127590011DCBCB54DF90C840BAEB374BB54300F005499841973300CB304D818F15
                              Memory Dump Source
                              • Source File: 00000005.00000002.2076166418.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_1150000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2abca4bd2e31e42e03afc1bef331151f3c4e2e7c5ebd7c2517d6191a302cd7e1
                              • Instruction ID: bf228a5cd19f7cb2c832fef733cc1307622761c3b8e49bd17bbd9b04c6aa4ba4
                              • Opcode Fuzzy Hash: 2abca4bd2e31e42e03afc1bef331151f3c4e2e7c5ebd7c2517d6191a302cd7e1
                              • Instruction Fuzzy Hash: 57C02B72902D12CBC7B8C5A7CD00309F9E1AB453A0F05DBD1022AF93A0F370C9828E21
                              Memory Dump Source
                              • Source File: 00000005.00000002.2075777880.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_fb0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e6538f31c1c9879699a469210a567de62ee0f61c82b420965213678ac00d72ba
                              • Instruction ID: 924e698be0af62dd2d2fdb01265ef48f5791e7788fa668a06a98791ada284b9b
                              • Opcode Fuzzy Hash: e6538f31c1c9879699a469210a567de62ee0f61c82b420965213678ac00d72ba
                              • Instruction Fuzzy Hash: C2215C70E0020A8FCF05DFA8D4416DEBBB1EF89310F15866AD540BB255DB746D8ACBA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000007.00000002.2064419816.0000000002620000.00000040.00000800.00020000.00000000.sdmp, Offset: 02620000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_2620000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: daq
                              • API String ID: 0-1532007458
                              • Opcode ID: d0151231a20ad996db212c0551c9da0fc6c0d1e72c8391074d90b9291363cb5c
                              • Instruction ID: b99b4aa8afffb799ab95803b1ea8d6ce1fb57d708fe24530e9e477649b2d101b
                              • Opcode Fuzzy Hash: d0151231a20ad996db212c0551c9da0fc6c0d1e72c8391074d90b9291363cb5c
                              • Instruction Fuzzy Hash: 55829F74A00629CFCB24DFA8D984BDDBBB5BF49304F1086E6D409AB365D770AA85CF50
                              Memory Dump Source
                              • Source File: 00000007.00000002.2064419816.0000000002620000.00000040.00000800.00020000.00000000.sdmp, Offset: 02620000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_2620000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7e1a05d2e839b571e5986b91c3f88d25b74a5dc57e360602be966a6e3dcff4be
                              • Instruction ID: d1d6bd8b6836d2ef8bd24056940deae5f11288e71ec3ac7c54c0707404d1f520
                              • Opcode Fuzzy Hash: 7e1a05d2e839b571e5986b91c3f88d25b74a5dc57e360602be966a6e3dcff4be
                              • Instruction Fuzzy Hash: 8F213670E0124A9FCF45DFB8D9509DDBFB1EF49300F4582A6D454BB2A6DB30A946CB90
                              Memory Dump Source
                              • Source File: 00000007.00000002.2064419816.0000000002620000.00000040.00000800.00020000.00000000.sdmp, Offset: 02620000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_2620000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 90f5f3d460e59185f88ec00a318d1e70107fb7daddf2b6d4618b8009ebc73f29
                              • Instruction ID: 4065e82a2c365f6b2910f29367b1a3dbd2301ba42480ac72e6117a75d750b306
                              • Opcode Fuzzy Hash: 90f5f3d460e59185f88ec00a318d1e70107fb7daddf2b6d4618b8009ebc73f29
                              • Instruction Fuzzy Hash: 09110D74901609DFCB45EFB8FA44A8D7BB5FB44309F0086B5D1059B279E7B46A4ACF80
                              Memory Dump Source
                              • Source File: 00000007.00000002.2064419816.0000000002620000.00000040.00000800.00020000.00000000.sdmp, Offset: 02620000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_2620000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 03d246317a5282be9cdf30e082deac246218919233d014f2c009f69ab208f19b
                              • Instruction ID: 8752fa2a1bcc6c06be42e595d13adae842654bd9ea3308f595e6ddcd6a7db5de
                              • Opcode Fuzzy Hash: 03d246317a5282be9cdf30e082deac246218919233d014f2c009f69ab208f19b
                              • Instruction Fuzzy Hash: 50F03CB4D092698BDF10DFA5D4447EEBBF0AB9A310F1090A9D418B7292D77C460ACF51
                              Memory Dump Source
                              • Source File: 00000007.00000002.2064419816.0000000002620000.00000040.00000800.00020000.00000000.sdmp, Offset: 02620000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_2620000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4830a257393d39e3f2a7db66323dd70a7c65fb797ec8dee3edb662c358227fa6
                              • Instruction ID: 082bbe0afba62e73e4daebaf713afc71c8932b15e08081deef8cd4f0999eb5e9
                              • Opcode Fuzzy Hash: 4830a257393d39e3f2a7db66323dd70a7c65fb797ec8dee3edb662c358227fa6
                              • Instruction Fuzzy Hash: 4B01E470D052599FCB01DFB8D85569DBFB0BF06205F1446AAC455A72A1E7708A54CF81
                              Memory Dump Source
                              • Source File: 00000007.00000002.2064419816.0000000002620000.00000040.00000800.00020000.00000000.sdmp, Offset: 02620000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_2620000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf79525e1d1da9c8a25d7ec01b190224256a4fa5fe1fc7b5e9c1717d41fa5816
                              • Instruction ID: 2ff4934f30d99f081267606131543ab2703b8501f1a7578c5b54ad7820158da6
                              • Opcode Fuzzy Hash: bf79525e1d1da9c8a25d7ec01b190224256a4fa5fe1fc7b5e9c1717d41fa5816
                              • Instruction Fuzzy Hash: ADF0B270D00219EFCB45EFB8D9456EEBBB4FB08305F5046AAD415A73A4EB709A84DF81
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (Rr$(Rr$(Rr$(Rr$(Rr$(Rr
                              • API String ID: 0-501461687
                              • Opcode ID: 31a02b3a2849406da36a306b0be60e34337c30f310f084e0d8fefdc7bc2fd0aa
                              • Instruction ID: a00ac509635bc7598ed751e558630b1c04e0b63b0f7c986b49f5ff9264179d52
                              • Opcode Fuzzy Hash: 31a02b3a2849406da36a306b0be60e34337c30f310f084e0d8fefdc7bc2fd0aa
                              • Instruction Fuzzy Hash: 84628E74A01229CFCB24CF68C984BD9BBF1BF8A310F5482A5D449AB365D734AE85CF51
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (Rr$(Rr$(Rr
                              • API String ID: 0-2808380048
                              • Opcode ID: 06c354bb44bed1e119dcf3ffad2d8b6dc5d04553b5fba17ff3053e1bc93d4e1f
                              • Instruction ID: d347530e1a76eb9caf5a16a9711291679a03e40a64e7e4f63e0284ecd86ed6b5
                              • Opcode Fuzzy Hash: 06c354bb44bed1e119dcf3ffad2d8b6dc5d04553b5fba17ff3053e1bc93d4e1f
                              • Instruction Fuzzy Hash: A7229E74A012298FCB24CF69C984BD9BBF1BF8A300F5182E5D449AB365D734AE85CF41
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: daq
                              • API String ID: 0-1532007458
                              • Opcode ID: e71925e565196939951df59eca94a8d7827d7472168b88541d5f9e2aad8b9cf6
                              • Instruction ID: bb0c1d6efef1e2a65a387ad91acb00a2f1a214bde27c12b4c89b1b532ffa7974
                              • Opcode Fuzzy Hash: e71925e565196939951df59eca94a8d7827d7472168b88541d5f9e2aad8b9cf6
                              • Instruction Fuzzy Hash: A0829074A00229CFCB24DFA8D984BDDBBB5FF49304F1486A6D409AB265D734AE85CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq
                              • API String ID: 0-600464949
                              • Opcode ID: 5d42f65dfad719ef02eda532fe9e1b1a815030808686f76bfd13f6a9544c1ba7
                              • Instruction ID: 77b8220d8050178dea342cb9e4eab7aee2c532c70d533ceaf4bb5d74816de3c2
                              • Opcode Fuzzy Hash: 5d42f65dfad719ef02eda532fe9e1b1a815030808686f76bfd13f6a9544c1ba7
                              • Instruction Fuzzy Hash: 81E1F674A00209CFCB18DFA9C594A9EBBF6FF89310F208569D405AB3A5DB34AD46CF50
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 57a8f6eb437ba89bf8b3e6cfbb01b4bc50ed8b46a4aefbc648ba9d61fc858308
                              • Instruction ID: 456886683b286fa3befb5c3faaa79fe97e95447dab9e726a0cad2058821e30ed
                              • Opcode Fuzzy Hash: 57a8f6eb437ba89bf8b3e6cfbb01b4bc50ed8b46a4aefbc648ba9d61fc858308
                              • Instruction Fuzzy Hash: C1129574D00229CFCB24CFA8D984BDDBBB5FF89314F1482A6D419AB265D7349A85CF50
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 42938ef5ccb53eebb5290429f043ce8390d70ab08fc4d69de63d9b20342357c2
                              • Instruction ID: fa356c196bae433e009b050860e520bd4a8bbd412029fb42c785f2c2859806e5
                              • Opcode Fuzzy Hash: 42938ef5ccb53eebb5290429f043ce8390d70ab08fc4d69de63d9b20342357c2
                              • Instruction Fuzzy Hash: D7B16D75E00319CFCB14CFA9C584ADDBBF2BF89310F2591A9E409AB265D734AA85CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (Rr$(Rr$(Rr
                              • API String ID: 0-2808380048
                              • Opcode ID: 24ec306ac063b14c3c63246f921be9d136adefc5af77e18f3359e073f5d58a89
                              • Instruction ID: 66221213339b32b8fa576432e49b13076fcac37123c64e7117bdd975afbe64f8
                              • Opcode Fuzzy Hash: 24ec306ac063b14c3c63246f921be9d136adefc5af77e18f3359e073f5d58a89
                              • Instruction Fuzzy Hash: DBE19F74E002188FDB54CFA9D884ADDFBF5BF49310F1492A6E819AB369D734A946CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (Rr$(Rr
                              • API String ID: 0-490398145
                              • Opcode ID: c5bc8a100a5cda03e4858833cf51f7bc8a7433d1d2bf8866c36344c89e5c5891
                              • Instruction ID: af7c1bd82a8011a0702fe92a76206da2f4711edeb0090c4e32c365461f797673
                              • Opcode Fuzzy Hash: c5bc8a100a5cda03e4858833cf51f7bc8a7433d1d2bf8866c36344c89e5c5891
                              • Instruction Fuzzy Hash: 13318F74E002098FCB08CFA9C584ADDBBF6FF89315F149166D415AB369E734A94ACF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: h^q$h^q
                              • API String ID: 0-4075327559
                              • Opcode ID: 9e408f749db8c397c0852583552b10dbc53f6f042b5865c0b6e70bde94d6eef0
                              • Instruction ID: b1ef4e5f0038aba9716005218b92e2ab6776926c716f51dc0d879589a6c231b2
                              • Opcode Fuzzy Hash: 9e408f749db8c397c0852583552b10dbc53f6f042b5865c0b6e70bde94d6eef0
                              • Instruction Fuzzy Hash: 052139B4E0025A8FCB05DFA8DA509EDBBF1FF89300F508696D414BB265CB34A906CF90
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: h^q$h^q
                              • API String ID: 0-4075327559
                              • Opcode ID: 5e9caf701d772a2ff58b69b0bd65b86d65170bb1fd301c1cbeb12f60e078cf39
                              • Instruction ID: f1428833cc86f23be3737c35aea41c2884fc1bee9ea144bb36461bfa2198a08b
                              • Opcode Fuzzy Hash: 5e9caf701d772a2ff58b69b0bd65b86d65170bb1fd301c1cbeb12f60e078cf39
                              • Instruction Fuzzy Hash: FD214A70E0014A9FCB05DFA8D5509DDBFF2EF89310F1082AAD454BB2A5DB34A946CF90
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq
                              • API String ID: 0-600464949
                              • Opcode ID: 4de24aff2940e8e32de4cde01bd5753a4947f5db8e70a8083a09fa03441424b2
                              • Instruction ID: 3063627dd9f25ae3b6b1d9075dce387dc393264e8be3e18f6ade385a2460f84f
                              • Opcode Fuzzy Hash: 4de24aff2940e8e32de4cde01bd5753a4947f5db8e70a8083a09fa03441424b2
                              • Instruction Fuzzy Hash: 56D18E74E002598FCB14CFA8D984ADDBBF2FF49310F1582A5E409AB36AD774A985CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq
                              • API String ID: 0-600464949
                              • Opcode ID: 22f1ebf30ec3c96c44d303398e742118bdaaf4dc59515c2908b72229cf6152ce
                              • Instruction ID: bde528fd2fd2dbfa900e38ed0e998febe15807190c9bb811a2243e7d23bb12a7
                              • Opcode Fuzzy Hash: 22f1ebf30ec3c96c44d303398e742118bdaaf4dc59515c2908b72229cf6152ce
                              • Instruction Fuzzy Hash: E4C18074A00259CFCB14CFA8D984ADDBBF2FF49310F1581A5D409AB36AD774A989CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq
                              • API String ID: 0-600464949
                              • Opcode ID: 78795cf9c9c191388e9f7cff4852f2bbc8141abf6aa2b85e8dd04e46da6c5685
                              • Instruction ID: 3fb5a60b4ee2f4384f77e31112bc3ae5cec4823377ba77412e3a2bdf186ebf0c
                              • Opcode Fuzzy Hash: 78795cf9c9c191388e9f7cff4852f2bbc8141abf6aa2b85e8dd04e46da6c5685
                              • Instruction Fuzzy Hash: EB910974A00208CFCB19DFB8D594A9EBBB2FF89300F208569D405AB366DB35AD46CF54
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fcad2113afc7f386004f4b02ff59bc6e8cf64ddaf05f644e1f422462c1ff5858
                              • Instruction ID: c79df6ac2c641c0de8a2602feb1693edb140d0111f2ddd736eaf8f1ffaceed56
                              • Opcode Fuzzy Hash: fcad2113afc7f386004f4b02ff59bc6e8cf64ddaf05f644e1f422462c1ff5858
                              • Instruction Fuzzy Hash: C75137B4D053889FCB11CFA9C894ADEBFB1EF4A304F2480AAD854BB251D7749946CF64
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 79890086e810e777f8a273031a281f9a8cc8afee8afda74e32c7993eb48d951d
                              • Instruction ID: b262946a365f9d1a9ef7eb243689a44c59332d86a8702dd707221dffb9f4ca7a
                              • Opcode Fuzzy Hash: 79890086e810e777f8a273031a281f9a8cc8afee8afda74e32c7993eb48d951d
                              • Instruction Fuzzy Hash: 0B51EFB4D042489FCF11CFA9C990AEEBFF1AF4A300F24906AE858BB251D7749985CF54
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 017fb5b28f0f59bd8ff58d99cfdfeb60b388db117d41855396b83325279a5638
                              • Instruction ID: 5b351790c56ca417adf0499227b33991f11c6fde3fc1deb0c38f33a5acf03b8c
                              • Opcode Fuzzy Hash: 017fb5b28f0f59bd8ff58d99cfdfeb60b388db117d41855396b83325279a5638
                              • Instruction Fuzzy Hash: 32314A74E0025A9FCB05DFA8D9509DDBBB2FF89300B1582A6D854AB365D730EE46CF90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2957c1e60e851555f39586eb811c6d756591bcef71b189ce8666b2a92b4f1e20
                              • Instruction ID: 1623596dd13c6417a57ed3bdc617deef19f63df56ae30f14d501c73bc6f6f026
                              • Opcode Fuzzy Hash: 2957c1e60e851555f39586eb811c6d756591bcef71b189ce8666b2a92b4f1e20
                              • Instruction Fuzzy Hash: 60A18774A00229CFCB14CFA8D884BD9BBB5FF89314F1581A6D419AB365E730AE85CF50
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 13f2fe0b238668f83aee03e54ec0eb721216b01c674daacd8ee21b397e5a7fae
                              • Instruction ID: ce29b1deb56546023580345f22cbab07b68d08ae9c7c0ab0f13dfe039e59e7de
                              • Opcode Fuzzy Hash: 13f2fe0b238668f83aee03e54ec0eb721216b01c674daacd8ee21b397e5a7fae
                              • Instruction Fuzzy Hash: FD81C175E00219DFCB05DFA8D9949DDBBB2FF89310F10826AE415AB265D730AA46CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33bcfac2a89cf2a0e8473ce8b846800a2220f7223b3c89ac71ea2b7f1794e69a
                              • Instruction ID: b15cf1021385c1f8155f2d1a9067d3840c543652c7f3a8711bc1396984003269
                              • Opcode Fuzzy Hash: 33bcfac2a89cf2a0e8473ce8b846800a2220f7223b3c89ac71ea2b7f1794e69a
                              • Instruction Fuzzy Hash: 2791D774A00209CFCB18DFB8D584A9EBBB6FF89300F208569D409AB365DB35AD46CF54
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2585d848e86577293608da9c455e56ee1ee3c56960a00827e2c9bfa8c0f2a325
                              • Instruction ID: 817f56a3f2485d1205aba408c9712417a9079f911902e8053b847d2c2e61e329
                              • Opcode Fuzzy Hash: 2585d848e86577293608da9c455e56ee1ee3c56960a00827e2c9bfa8c0f2a325
                              • Instruction Fuzzy Hash: 0961CF75E01218CFCB08CFA9C8849EDBBB6FF89310F149169E415AB365DB30AD46CB50
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5f257dec4c7f33e1896b399f541d3729c39e381306de5dffcb70857ef55f8a10
                              • Instruction ID: bfc7922381cbb0b02a90394b68729f0671caefed12f172385f20cacf45f27a14
                              • Opcode Fuzzy Hash: 5f257dec4c7f33e1896b399f541d3729c39e381306de5dffcb70857ef55f8a10
                              • Instruction Fuzzy Hash: 1641BDB4D002489FCF14CFAAC984ADEBBB1BF49300F24942AE818BB250DB749985DF54
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ebdaeab3cb647a6cde30b57f73c3aa4f64d7d9e1316e833f0dcf9830f5157710
                              • Instruction ID: c780cc05ad2d938beaaffa00848c85eb9d85a3bba8d22d6a29658a3f0a767940
                              • Opcode Fuzzy Hash: ebdaeab3cb647a6cde30b57f73c3aa4f64d7d9e1316e833f0dcf9830f5157710
                              • Instruction Fuzzy Hash: 1F41C470D003198FDB14CFA9C994ADDBBF2BF89314F219199D458AB265D730AE86CF40
                              Memory Dump Source
                              • Source File: 00000009.00000002.3277752291.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_9fd000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ac79027060acf57b05ff1037dd943d7693977c715b3ad262c9f923a77bbff2b1
                              • Instruction ID: c6fea5fd9e2fb8ba28397e39072d8eafb8a3282ae98967cffdc8b66cd01acc3d
                              • Opcode Fuzzy Hash: ac79027060acf57b05ff1037dd943d7693977c715b3ad262c9f923a77bbff2b1
                              • Instruction Fuzzy Hash: EB213771501208DFDB05DF14D9C0F36BF6AFB98324F208569EA0D8B25AC33AD816DBA1
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 41fa867f0186d01abeb2d1730d30fff204528c3414d7c7bb7ef88fad64421906
                              • Instruction ID: ce0d0d9a74121cbb2079dae7a7d37a3c8a4fe09ae7443369d2ddb48e5f68a532
                              • Opcode Fuzzy Hash: 41fa867f0186d01abeb2d1730d30fff204528c3414d7c7bb7ef88fad64421906
                              • Instruction Fuzzy Hash: 6A311770D0025A9FCB05DFA8D9509EDBFB1FF89310F0182A6D454BB266D730AA46CF90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5caafb2d9188c971b06357206565b3fbeebcc0be0c988e8144c441edcbb9eb22
                              • Instruction ID: 36ba5d11466b6963f88447257b24d346f147008632a4fdd409f4cfd0d241fcf3
                              • Opcode Fuzzy Hash: 5caafb2d9188c971b06357206565b3fbeebcc0be0c988e8144c441edcbb9eb22
                              • Instruction Fuzzy Hash: F53128B1E0021A8FCB05DFA8D9909EEBBB1FF89310F418566E411BB261DB34AD46CF50
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45772a601f3ca1949010ee43293f723050d10c0fd5e366e20ff7b93090bf1d07
                              • Instruction ID: 94761f8495fc54896410d8c1cc35cac974d9a6a12d92c6bb6e50887dfb7942b8
                              • Opcode Fuzzy Hash: 45772a601f3ca1949010ee43293f723050d10c0fd5e366e20ff7b93090bf1d07
                              • Instruction Fuzzy Hash: 15211970E0025A9FCF05DFA8D9509DDBBB1FF49300F0182AAD454BB266D734AA46CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 28bcfbbd38aab243b3d64438401760e494c751562e4a25f0d9a64943dd11f83b
                              • Instruction ID: 1162396911a0dd82e447335f5d04fccf0c12a5e4c0748ba2d5b4ff65d05d6ea1
                              • Opcode Fuzzy Hash: 28bcfbbd38aab243b3d64438401760e494c751562e4a25f0d9a64943dd11f83b
                              • Instruction Fuzzy Hash: 0B213471E0024A9FCB41DFA8D450ADDBFB1EF89300F4482A6D450BB265DB30A986CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5e0fdf7b007b6616679d8d5698b14a78ea7e6e9615f784495507866055946c29
                              • Instruction ID: 7c4aa025e317840b6e488cd397c63b1f40e8b34025e8e86c35916297d3c54bd1
                              • Opcode Fuzzy Hash: 5e0fdf7b007b6616679d8d5698b14a78ea7e6e9615f784495507866055946c29
                              • Instruction Fuzzy Hash: 11214830D0024E9FCB46DFA8D4509DCBBB1EF49310F0486A6D450BB3A5DB34E946CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c0ca95daaf34ff7b3c13c88f8d8109b36e088620015fdde840a4dfd1ca529ca2
                              • Instruction ID: 96b80bc5fd3b0966e0786db14c6cf94aee4484babf5ffbef70c63e9e5447d15f
                              • Opcode Fuzzy Hash: c0ca95daaf34ff7b3c13c88f8d8109b36e088620015fdde840a4dfd1ca529ca2
                              • Instruction Fuzzy Hash: 0C218E70900609DFDB05EFBCF984AC97BB6EF89305F10C665D1045F26ADB799A4ACB80
                              Memory Dump Source
                              • Source File: 00000009.00000002.3277752291.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_9fd000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction ID: fe62bc356e4e3a841b93f0dc4767693b4717943cfe555e1fcfb95d1d787493e3
                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction Fuzzy Hash: 7E11D376504284CFCB16CF14D5C4B26BF72FB98314F24C5A9D9094B656C336D85ACBA2
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 38177abce4ca2c16f5896bd6ba7d2cc1dc15f26340a06cc00acc7115a7eeb80d
                              • Instruction ID: 0f143513695057eabec7347ad40463bc009cad1f190f6982cfb35e99826ef3fa
                              • Opcode Fuzzy Hash: 38177abce4ca2c16f5896bd6ba7d2cc1dc15f26340a06cc00acc7115a7eeb80d
                              • Instruction Fuzzy Hash: 73210B74900509DFDB05EFB8E984B897BB5EF89305F10C6B8D1059B22AD7795A4ACF80
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 34e8c7ba8d9af3654c82a08b3d8c0590e6bd9a474afe92296a4eac1349963dfd
                              • Instruction ID: 982c48106ea2f4284abefc774aa38a19047b27519ffdad5596349b96bfcf16da
                              • Opcode Fuzzy Hash: 34e8c7ba8d9af3654c82a08b3d8c0590e6bd9a474afe92296a4eac1349963dfd
                              • Instruction Fuzzy Hash: 0F110D74900609DFDB05EFB8F984A8D7BB6EB88305F00C574D1059B26ADB785A49CF80
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ed66b3ae6b25380a9e27fad43ee151837a1beab4c5fc12fbbefb9b9bbe058b3
                              • Instruction ID: 67baf1a129b31827f4e6fdab731821598a78c580e76955aba276fa9e19450474
                              • Opcode Fuzzy Hash: 4ed66b3ae6b25380a9e27fad43ee151837a1beab4c5fc12fbbefb9b9bbe058b3
                              • Instruction Fuzzy Hash: FD018CB5E042499FCF01CFA8E9409EDBFB1EF45314B114399D464AB262C3308A46CB61
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0098d33f49b1397f92e90e6a702b9b06f38a8955c14ffd67337eb292d586d287
                              • Instruction ID: f44974fee5d06a6f10b473099c85230c7e5525a81b17e2f513b12ab103b62be5
                              • Opcode Fuzzy Hash: 0098d33f49b1397f92e90e6a702b9b06f38a8955c14ffd67337eb292d586d287
                              • Instruction Fuzzy Hash: E9115B70E0014A9FCF02CFA8DA909DDBBB1FF46314F4182DAE454AB262D730DA06CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3277752291.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_9fd000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3f50c44161d1aa2810ab7e7ff5ec8a8085e0b6693411b5897b477a4617b67bc3
                              • Instruction ID: 551f0e90dc97f2dbacd2553929046f1b714f6a59b358a2210d63698f1b1a8b04
                              • Opcode Fuzzy Hash: 3f50c44161d1aa2810ab7e7ff5ec8a8085e0b6693411b5897b477a4617b67bc3
                              • Instruction Fuzzy Hash: B501FC712093089AE7249A15CD84777BF9DDF45320F18C529EE180A246C2399841C771
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d033be7a38caf61011bec80b1c3f31feab9a8029ae21201d7791c4b7b7932318
                              • Instruction ID: 4cc07ae7c62eeb37ec96c3dda987747c643957231298637b31b6f751ff827c92
                              • Opcode Fuzzy Hash: d033be7a38caf61011bec80b1c3f31feab9a8029ae21201d7791c4b7b7932318
                              • Instruction Fuzzy Hash: 2001AD35D042499BDB15CB74C865AEEBBB1AF84350F15882E8042AB291DE74194BCB82
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51bcd326a141d97ed74bbe852231450438cbd4d91642777b550fc09cc9a191cf
                              • Instruction ID: 4d74e7a56fc2c21af4d42352ffb1858879ef315f8163ee7bfad68025ef3d078c
                              • Opcode Fuzzy Hash: 51bcd326a141d97ed74bbe852231450438cbd4d91642777b550fc09cc9a191cf
                              • Instruction Fuzzy Hash: 2CF037B5E04249CADF00CFA6D5043EEBBF4AB49311F14902AD554B7241D7784A4ACF60
                              Memory Dump Source
                              • Source File: 00000009.00000002.3277752291.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_9fd000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9016fec15832d362c7688fb903f00431d27d9702fca2ca7011025b32cb4708c4
                              • Instruction ID: c8174775ea098ab692b7c9ac745a106a42eb22f40d3416ac0f4e96eedc76da34
                              • Opcode Fuzzy Hash: 9016fec15832d362c7688fb903f00431d27d9702fca2ca7011025b32cb4708c4
                              • Instruction Fuzzy Hash: 42F0C2711093449EF7248A0ACC84B62FFACEF55334F18C45AEE084A286C2799844CBB0
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c64e642702fde3c7eb7c1fbffc0a66a9a5a6b55893e3e049ecae1cde8259ec2f
                              • Instruction ID: cc41142443ef8509db196d5858e29cccd163c4e8b05dca276fdb62e4a68ee1a1
                              • Opcode Fuzzy Hash: c64e642702fde3c7eb7c1fbffc0a66a9a5a6b55893e3e049ecae1cde8259ec2f
                              • Instruction Fuzzy Hash: 9E012470A40109DFCB05DFA8D684E9EFBB1AF85304F5482E9D4046B266CB34DE85DB85
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1c2893b56c1d6deeb585aa47e5106b46e9d90f9b7a6d8f78ccfc3c763ef19230
                              • Instruction ID: f46e5e5804f24608191f7484726b5eb18c66d349366cd386f335f0b55d50d573
                              • Opcode Fuzzy Hash: 1c2893b56c1d6deeb585aa47e5106b46e9d90f9b7a6d8f78ccfc3c763ef19230
                              • Instruction Fuzzy Hash: F0F052B0C0010ACFDB04CFA0D858BEEBB71BF04344F158068D008A7160CB740E0ACB62
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 502313e3adc9fb2a56642ee8ffabd716fac28360e02b03bd35eca2ad75aa6e1d
                              • Instruction ID: 0597fff252107a7a5b5e9b53b8512f72bbb1657b672014888839b2a0b9aca29d
                              • Opcode Fuzzy Hash: 502313e3adc9fb2a56642ee8ffabd716fac28360e02b03bd35eca2ad75aa6e1d
                              • Instruction Fuzzy Hash: 5301F2B0D00209DFCB05DFA8C844ADDBBB0FF09305F1046AED415A7261EB709A50CF81
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9e778e00ee5ca304afb817ca2aceba87939e8df9f8b6e4942769886ec9e154d5
                              • Instruction ID: 74d5f091562c1c46471d1d06dc618d969f0cd770c5c8078aa8f194d85b47244c
                              • Opcode Fuzzy Hash: 9e778e00ee5ca304afb817ca2aceba87939e8df9f8b6e4942769886ec9e154d5
                              • Instruction Fuzzy Hash: 8AF0E271B08240AFC704CF59D444EAABFB6FFC9321B18C05BE84AC3212C7319822CBA0
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 046fdcdef08425c20005bb8bf8cec1e090d74b87ce36554594920cc673a683c5
                              • Instruction ID: 90493f09450b09a23786c04e9c87a3e8748134df548a7e243863c7c922172c32
                              • Opcode Fuzzy Hash: 046fdcdef08425c20005bb8bf8cec1e090d74b87ce36554594920cc673a683c5
                              • Instruction Fuzzy Hash: A5F0A732B082089F8B04CF5DD4049AABFF6EBC9221719C05BE858C7355D631DD52D780
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 281bd9b372b63395453bf97eecff450a6e3edad962daea4711137ad036ebe9ae
                              • Instruction ID: 9567217c928a255477246bb8cb97fee435ed43cb6699b21065805ee581e76304
                              • Opcode Fuzzy Hash: 281bd9b372b63395453bf97eecff450a6e3edad962daea4711137ad036ebe9ae
                              • Instruction Fuzzy Hash: 20E03931B14204AB87148A4AE804D6ABFAAEBC9361768C02AE849C7315DA32DC529B90
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8ddc842343ae2f477ffbae5a2479612dc0118a29b3012e886326d3dd20889678
                              • Instruction ID: 6975c5e85b0f47e1ff73522f26b03d69ccc319a0d687b5a74ace9770d019e907
                              • Opcode Fuzzy Hash: 8ddc842343ae2f477ffbae5a2479612dc0118a29b3012e886326d3dd20889678
                              • Instruction Fuzzy Hash: 24F0D470E046288FCB28CF5AC944AA9F7F1AFCE360F5591A6C01DA7224D6309A41CF05
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a765a1608efb1500dc7c6d98883d4f6eca6a3ec3c30a585585fb59a50b34314c
                              • Instruction ID: cc124944708610a2eb82ad7ac506b1af79f9b26b214216141fca0feba57b656a
                              • Opcode Fuzzy Hash: a765a1608efb1500dc7c6d98883d4f6eca6a3ec3c30a585585fb59a50b34314c
                              • Instruction Fuzzy Hash: C5F0B770D00219DFCB45DFB8D5446DEBBB4FB05300F1086AAD415A7354EB709A41DF80
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a042d64ecd53a83ade33b0099bf99c6efd4358441787444f4240e47fd5a7391e
                              • Instruction ID: b00864b2d3c3d89b562a4c4dd8a3ced395d8c94ba701fa5743520eba36b214d8
                              • Opcode Fuzzy Hash: a042d64ecd53a83ade33b0099bf99c6efd4358441787444f4240e47fd5a7391e
                              • Instruction Fuzzy Hash: 3AF01E34905248EFCB05CBA8D54299CBFB1AB4A321F6482A8E84823366C3359E81CB40
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f1cc47251b939af4b5b56822f53394040266bd95f919675bce423cea3c9f0185
                              • Instruction ID: 11d0d299beb37e4482e47fbdb9e2ed5d2f1c14da8979c55da3d3256972f9f802
                              • Opcode Fuzzy Hash: f1cc47251b939af4b5b56822f53394040266bd95f919675bce423cea3c9f0185
                              • Instruction Fuzzy Hash: 1EE01A74E04218CBCF28DFAAE9408ECB7B1FFC4324B109566D015AB264D770DE12CB40
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c056e03830db563824d3bab5295f76735b35bad5630995b60d3ef1b480bdde57
                              • Instruction ID: a6873b910f66f5cf75144cadc1adcf6d40fc277c8f92b6fd0bcaf7855d11c7d6
                              • Opcode Fuzzy Hash: c056e03830db563824d3bab5295f76735b35bad5630995b60d3ef1b480bdde57
                              • Instruction Fuzzy Hash: 7BE08634E04108CBCB24CF99D5406ECB771EFC9320F20A165C009B7264C6305E128F50
                              Memory Dump Source
                              • Source File: 00000009.00000002.3278359826.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_a60000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4eccf70f92f1f8a5cc306efa9761035831bc7fb1842acbd5b284c081a8353aa5
                              • Instruction ID: 6de29c911d29d011ad85b325213c316acaab605cb717d13e2dcf0645f3ffdf64
                              • Opcode Fuzzy Hash: 4eccf70f92f1f8a5cc306efa9761035831bc7fb1842acbd5b284c081a8353aa5
                              • Instruction Fuzzy Hash: 88E04638E0421C8BCB14CFA9D84049CB772EFC6320F0092668069BF264C7309916CB00
                              Strings
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: daq
                              • API String ID: 0-1532007458
                              • Opcode ID: 95ebb6ec07b699c4eb037640a21a47e94836d88ef34b8d720904234080a4745a
                              • Instruction ID: b2badb70f60d45cdab252469f678a8939fae0f840fd2ebb38af93f703fd0890d
                              • Opcode Fuzzy Hash: 95ebb6ec07b699c4eb037640a21a47e94836d88ef34b8d720904234080a4745a
                              • Instruction Fuzzy Hash: 03828074A002298FCB24DF68D984BD9BBB5FF49304F1096E6D409BB265DB34AE85CF50
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2171218ab1912d0022ed0551c693222c5744fc4b29120e660b9954415d5aeee8
                              • Instruction ID: 21ef1123abf975ea6ad2745b227d5ad952a1f67f898c06cb73e86b676d9aaec5
                              • Opcode Fuzzy Hash: 2171218ab1912d0022ed0551c693222c5744fc4b29120e660b9954415d5aeee8
                              • Instruction Fuzzy Hash: F5218BB09012499FDB06EF78E954B997FB5FF84304F0086A5C1049B26ADB789A49CF80
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7b2f329a5a880d5a560e4288357f3e4ca254a9dba63e1e12180515c0dc2e7e38
                              • Instruction ID: 0008baa556ae9d9ecf4d3726b0a2e277c2ef58e657f33e65e11647cb39ca6f57
                              • Opcode Fuzzy Hash: 7b2f329a5a880d5a560e4288357f3e4ca254a9dba63e1e12180515c0dc2e7e38
                              • Instruction Fuzzy Hash: E0213CB49012499FDB06EF78F984B997FF5FF85304F1086B5C1059B26ADB785A0ACB80
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 193c621aa5fa78e69d4f088239e9bd0d5ddbced91ac46f6ba6057be0b0d0c518
                              • Instruction ID: c798bdfd47102111464fa7af3d0b85c118b03bfa404ef5426a5a6131045f5ad7
                              • Opcode Fuzzy Hash: 193c621aa5fa78e69d4f088239e9bd0d5ddbced91ac46f6ba6057be0b0d0c518
                              • Instruction Fuzzy Hash: 58214AB49012499FDB06EF78F994B997FF5FF85304F0085B5C1059B26AEB789909CB80
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d1e1b3b6787cafa13ac1b7f929e5540e7ff4647440d102b41f255ab82465a947
                              • Instruction ID: 0b5af7cefd969c4a0bc8cb61089d78c80dff3b33fd16fd9644da976b8ce4569a
                              • Opcode Fuzzy Hash: d1e1b3b6787cafa13ac1b7f929e5540e7ff4647440d102b41f255ab82465a947
                              • Instruction Fuzzy Hash: F3214871E0024E9FCF41DFA8E4509EDBFB1EF49300F4582A6D454BB265DB30A946CB90
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eed8a61abbb1ae85fe4c387840a248848e092f0f62bc4c913b8c09ae9cdbfcce
                              • Instruction ID: 2004afa53ae68224892bbb326eae70245eb106f71bc5a3d3577e9f6ae0b0e868
                              • Opcode Fuzzy Hash: eed8a61abbb1ae85fe4c387840a248848e092f0f62bc4c913b8c09ae9cdbfcce
                              • Instruction Fuzzy Hash: 6F119C749012099FDB05EF78F944AA97BF5FB44304F1085B5D1059B26ADB785A49CB80
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 052e04a6f679e2827d163bac18ed38a72d185ef27c56cb9c499db05767e76d43
                              • Instruction ID: 193fd616da5ef11fccbd1ac1e780a6d51498f775cb37799215add2de9fe73456
                              • Opcode Fuzzy Hash: 052e04a6f679e2827d163bac18ed38a72d185ef27c56cb9c499db05767e76d43
                              • Instruction Fuzzy Hash: 0AF04F74D04249CBCF04DFA5E5143EEBBF0AB4D310F54A0A5D414B7251D7395A59DF50
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 726908103354b62651db2dc2c59f0552920404e919a2c051bca086161687f3be
                              • Instruction ID: e1225f61b32172989b0e328730939599d76c6888cc0ce262f253731c37376fcb
                              • Opcode Fuzzy Hash: 726908103354b62651db2dc2c59f0552920404e919a2c051bca086161687f3be
                              • Instruction Fuzzy Hash: DD0114B0D00209DFCB01DFB8D8446AEBBB0FF05315F104AAEC415A72A1EB709A40DB80
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2064331007.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_e40000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 956f4cb094d41a6143d843f76ea6de1bdf76b040e7fe24e2f4464d6988c7aac0
                              • Instruction ID: 1ce00980df42dd73bfa20eaf263a265a13694df3fdc7a50da2c9c35642bbb335
                              • Opcode Fuzzy Hash: 956f4cb094d41a6143d843f76ea6de1bdf76b040e7fe24e2f4464d6988c7aac0
                              • Instruction Fuzzy Hash: 1BF0B270D00219DFCB45EFB8D9446AEBBB4FB04314F104AAAD419A72A4EB709A40DB80

                              Execution Graph

                              Execution Coverage:17.6%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:350
                              Total number of Limit Nodes:14
                              execution_graph 11544 2c34d98 11545 2c34de5 VirtualProtect 11544->11545 11546 2c34e51 11545->11546 11116 4cdd550 11118 4cdd572 11116->11118 11117 4cdd5bd 11118->11117 11164 53a0279 11118->11164 11169 53a0833 11118->11169 11180 53a09d6 11118->11180 11185 53a03cb 11118->11185 11190 53a04ec 11118->11190 11195 53a0fe2 11118->11195 11200 53a0103 11118->11200 11205 53a0663 11118->11205 11210 53a0d67 11118->11210 11221 53a0a47 11118->11221 11229 53a06be 11118->11229 11234 53a023c 11118->11234 11239 63a8d59 11118->11239 11244 63a902c 11118->11244 11255 63a8903 11118->11255 11260 63a91ff 11118->11260 11265 63a8c05 11118->11265 11273 63a9305 11118->11273 11284 63a85db 11118->11284 11295 63ab81a 11118->11295 11303 63abbab 11118->11303 11311 63abd0e 11118->11311 11316 63ab1ac 11118->11316 11321 63ab1b8 11118->11321 11326 63aba7e 11118->11326 11331 63ab804 11118->11331 11343 63abd63 11118->11343 11348 63ab49a 11118->11348 11353 63ab681 11118->11353 11361 63ab29a 11118->11361 11366 63abcb3 11118->11366 11371 63ab976 11118->11371 11379 63ab4b0 11118->11379 11384 63ac1d1 11118->11384 11389 63adb60 11118->11389 11394 63ad60e 11118->11394 11399 63ad9ab 11118->11399 11404 63adca6 11118->11404 11412 63ad389 11118->11412 11420 63ae1dd 11118->11420 11425 63ae139 11118->11425 11430 63adea6 11118->11430 11438 63ada75 11118->11438 11443 63ad498 11118->11443 11448 63ad5b9 11118->11448 11165 53a0285 11164->11165 11453 53a1377 11165->11453 11458 53a1388 11165->11458 11166 53a02a1 11170 53a083f 11169->11170 11176 53a1388 2 API calls 11170->11176 11177 53a1377 2 API calls 11170->11177 11171 53a0896 11471 63aa8d8 11171->11471 11475 63aa8e0 11171->11475 11172 53a08d2 11174 53a1388 2 API calls 11172->11174 11175 53a1377 2 API calls 11172->11175 11173 53a0931 11174->11173 11175->11173 11176->11171 11177->11171 11181 53a09ed 11180->11181 11479 63a9875 11181->11479 11483 63a9880 11181->11483 11186 53a03d7 11185->11186 11487 63aa6b9 11186->11487 11491 63aa6c0 11186->11491 11187 53a0416 11191 53a04f8 11190->11191 11495 63aac08 11191->11495 11499 63aac01 11191->11499 11192 53a051d 11196 53a0fee 11195->11196 11198 63aa6b9 NtResumeThread 11196->11198 11199 63aa6c0 NtResumeThread 11196->11199 11197 53a102c 11198->11197 11199->11197 11201 53a010b 11200->11201 11203 63aa8d8 NtWriteVirtualMemory 11201->11203 11204 63aa8e0 NtWriteVirtualMemory 11201->11204 11202 53a01f2 11203->11202 11204->11202 11206 53a0667 11205->11206 11208 53a1388 2 API calls 11206->11208 11209 53a1377 2 API calls 11206->11209 11207 53a06ef 11208->11207 11209->11207 11211 53a0d73 11210->11211 11215 63aa8d8 NtWriteVirtualMemory 11211->11215 11216 63aa8e0 NtWriteVirtualMemory 11211->11216 11212 53a0e0d 11219 53a1388 2 API calls 11212->11219 11220 53a1377 2 API calls 11212->11220 11213 53a0e5b 11217 63aac08 NtSetContextThread 11213->11217 11218 63aac01 NtSetContextThread 11213->11218 11214 53a0f96 11215->11212 11216->11212 11217->11214 11218->11214 11219->11213 11220->11213 11222 53a0a53 11221->11222 11227 53a1388 2 API calls 11222->11227 11228 53a1377 2 API calls 11222->11228 11223 53a0aa0 11503 63aa7b9 11223->11503 11507 63aa7c0 11223->11507 11224 53a0ade 11227->11223 11228->11223 11230 53a06d3 11229->11230 11232 53a1388 2 API calls 11230->11232 11233 53a1377 2 API calls 11230->11233 11231 53a06ef 11232->11231 11233->11231 11235 53a01fb 11234->11235 11235->11234 11237 53a1388 2 API calls 11235->11237 11238 53a1377 2 API calls 11235->11238 11236 53a02a1 11237->11236 11238->11236 11240 63a8d65 11239->11240 11242 63aa6b9 NtResumeThread 11240->11242 11243 63aa6c0 NtResumeThread 11240->11243 11241 63a8da3 11242->11241 11243->11241 11245 63a9038 11244->11245 11511 63a9e60 11245->11511 11516 63a9e51 11245->11516 11246 63a908f 11249 63aa8d8 NtWriteVirtualMemory 11246->11249 11250 63aa8e0 NtWriteVirtualMemory 11246->11250 11247 63a90cb 11251 63a9e60 2 API calls 11247->11251 11252 63a9e51 2 API calls 11247->11252 11248 63a912a 11249->11247 11250->11247 11251->11248 11252->11248 11256 63a891f 11255->11256 11258 63aa8d8 NtWriteVirtualMemory 11256->11258 11259 63aa8e0 NtWriteVirtualMemory 11256->11259 11257 63a89a7 11258->11257 11259->11257 11261 63a9217 11260->11261 11263 63aac08 NtSetContextThread 11261->11263 11264 63aac01 NtSetContextThread 11261->11264 11262 63a92ee 11263->11262 11264->11262 11266 63a8c1d 11265->11266 11271 63a9e60 2 API calls 11266->11271 11272 63a9e51 2 API calls 11266->11272 11267 63a8cfc 11269 63aa7b9 VirtualAllocEx 11267->11269 11270 63aa7c0 VirtualAllocEx 11267->11270 11268 63a8d3a 11269->11268 11270->11268 11271->11267 11272->11267 11274 63a9311 11273->11274 11280 63aac08 NtSetContextThread 11274->11280 11281 63aac01 NtSetContextThread 11274->11281 11275 63a9336 11282 63aa8d8 NtWriteVirtualMemory 11275->11282 11283 63aa8e0 NtWriteVirtualMemory 11275->11283 11276 63a93e3 11278 63a9e60 2 API calls 11276->11278 11279 63a9e51 2 API calls 11276->11279 11277 63a9431 11278->11277 11279->11277 11280->11275 11281->11275 11282->11276 11283->11276 11285 63a85f2 11284->11285 11293 63a9e60 2 API calls 11285->11293 11294 63a9e51 2 API calls 11285->11294 11286 63a8660 11289 63a9e60 2 API calls 11286->11289 11290 63a9e51 2 API calls 11286->11290 11287 63a86a4 11291 63aa6b9 NtResumeThread 11287->11291 11292 63aa6c0 NtResumeThread 11287->11292 11288 63a879d 11289->11287 11290->11287 11291->11288 11292->11288 11293->11286 11294->11286 11296 63ab826 11295->11296 11301 63aa8d8 NtWriteVirtualMemory 11296->11301 11302 63aa8e0 NtWriteVirtualMemory 11296->11302 11297 63ab8c0 11521 63ac50f 11297->11521 11526 63ac520 11297->11526 11298 63ab90e 11301->11297 11302->11297 11304 63abbc3 11303->11304 11305 63abc72 11304->11305 11307 63aa6b9 NtResumeThread 11304->11307 11308 63aa6c0 NtResumeThread 11304->11308 11306 63abcb8 11305->11306 11309 63aa6b9 NtResumeThread 11305->11309 11310 63aa6c0 NtResumeThread 11305->11310 11307->11305 11308->11305 11309->11305 11310->11305 11312 63abd1a 11311->11312 11314 63aac08 NtSetContextThread 11312->11314 11315 63aac01 NtSetContextThread 11312->11315 11313 63abd3f 11314->11313 11315->11313 11317 63ab1b8 11316->11317 11318 63ab294 11317->11318 11319 63ac50f NtReadVirtualMemory NtReadVirtualMemory 11317->11319 11320 63ac520 NtReadVirtualMemory NtReadVirtualMemory 11317->11320 11318->11118 11319->11317 11320->11317 11322 63ab1f2 11321->11322 11323 63ab294 11322->11323 11324 63ac50f NtReadVirtualMemory NtReadVirtualMemory 11322->11324 11325 63ac520 NtReadVirtualMemory NtReadVirtualMemory 11322->11325 11323->11118 11324->11322 11325->11322 11327 63aba88 11326->11327 11329 63ac50f 2 API calls 11327->11329 11330 63ac520 2 API calls 11327->11330 11328 63abad6 11329->11328 11330->11328 11332 63ab7c3 11331->11332 11334 63ab809 11331->11334 11339 63aa8d8 NtWriteVirtualMemory 11332->11339 11340 63aa8e0 NtWriteVirtualMemory 11332->11340 11333 63ab7e1 11337 63aa8d8 NtWriteVirtualMemory 11334->11337 11338 63aa8e0 NtWriteVirtualMemory 11334->11338 11335 63ab8c0 11341 63ac50f 2 API calls 11335->11341 11342 63ac520 2 API calls 11335->11342 11336 63ab90e 11337->11335 11338->11335 11339->11333 11340->11333 11341->11336 11342->11336 11344 63abd6b 11343->11344 11346 63aa8d8 NtWriteVirtualMemory 11344->11346 11347 63aa8e0 NtWriteVirtualMemory 11344->11347 11345 63abe52 11346->11345 11347->11345 11349 63ab50e 11348->11349 11351 63aa6b9 NtResumeThread 11349->11351 11352 63aa6c0 NtResumeThread 11349->11352 11350 63ab5b9 11351->11350 11352->11350 11354 63ab699 11353->11354 11357 63ac50f 2 API calls 11354->11357 11358 63ac520 2 API calls 11354->11358 11355 63ab7a5 11359 63aa8d8 NtWriteVirtualMemory 11355->11359 11360 63aa8e0 NtWriteVirtualMemory 11355->11360 11356 63ab7e1 11357->11355 11358->11355 11359->11356 11360->11356 11362 63ab266 11361->11362 11362->11361 11363 63ab294 11362->11363 11364 63ac50f NtReadVirtualMemory NtReadVirtualMemory 11362->11364 11365 63ac520 NtReadVirtualMemory NtReadVirtualMemory 11362->11365 11363->11118 11364->11362 11365->11362 11367 63abcb8 11366->11367 11368 63abc72 11366->11368 11368->11366 11369 63aa6b9 NtResumeThread 11368->11369 11370 63aa6c0 NtResumeThread 11368->11370 11369->11368 11370->11368 11372 63ab982 11371->11372 11375 63ac50f 2 API calls 11372->11375 11376 63ac520 2 API calls 11372->11376 11373 63ab9cf 11377 63aa7b9 VirtualAllocEx 11373->11377 11378 63aa7c0 VirtualAllocEx 11373->11378 11374 63aba0d 11375->11373 11376->11373 11377->11374 11378->11374 11380 63ab4c8 11379->11380 11382 63aa6b9 NtResumeThread 11380->11382 11383 63aa6c0 NtResumeThread 11380->11383 11381 63ab5b9 11382->11381 11383->11381 11385 63ac1e9 11384->11385 11387 63aac08 NtSetContextThread 11385->11387 11388 63aac01 NtSetContextThread 11385->11388 11386 63ac2c1 11387->11386 11388->11386 11390 63adb6a 11389->11390 11531 63ae4cf 11390->11531 11536 63ae4e0 11390->11536 11391 63adbb8 11395 63ad61a 11394->11395 11397 63aa6b9 NtResumeThread 11395->11397 11398 63aa6c0 NtResumeThread 11395->11398 11396 63ad658 11397->11396 11398->11396 11400 63ad9b7 11399->11400 11402 63aa8d8 NtWriteVirtualMemory 11400->11402 11403 63aa8e0 NtWriteVirtualMemory 11400->11403 11401 63ada51 11402->11401 11403->11401 11405 63adcd8 11404->11405 11408 63ae4cf 2 API calls 11405->11408 11409 63ae4e0 2 API calls 11405->11409 11406 63add46 11410 63ae4cf 2 API calls 11406->11410 11411 63ae4e0 2 API calls 11406->11411 11407 63add8a 11408->11406 11409->11406 11410->11407 11411->11407 11413 63ad395 11412->11413 11416 63ae4cf 2 API calls 11413->11416 11417 63ae4e0 2 API calls 11413->11417 11414 63ad3e2 11418 63aa7b9 VirtualAllocEx 11414->11418 11419 63aa7c0 VirtualAllocEx 11414->11419 11415 63ad420 11416->11414 11417->11414 11418->11415 11419->11415 11421 63ae1f5 11420->11421 11423 63aac08 NtSetContextThread 11421->11423 11424 63aac01 NtSetContextThread 11421->11424 11422 63ae2cc 11423->11422 11424->11422 11426 63ae145 11425->11426 11428 63aa8d8 NtWriteVirtualMemory 11426->11428 11429 63aa8e0 NtWriteVirtualMemory 11426->11429 11427 63ae1b8 11428->11427 11429->11427 11431 63adeb2 11430->11431 11436 63ae4cf 2 API calls 11431->11436 11437 63ae4e0 2 API calls 11431->11437 11432 63adf09 11434 63aa8d8 NtWriteVirtualMemory 11432->11434 11435 63aa8e0 NtWriteVirtualMemory 11432->11435 11433 63adf45 11434->11433 11435->11433 11436->11432 11437->11432 11439 63adaa0 11438->11439 11441 63ae4cf 2 API calls 11439->11441 11442 63ae4e0 2 API calls 11439->11442 11440 63adabc 11441->11440 11442->11440 11444 63ad4a4 11443->11444 11446 63aa6b9 NtResumeThread 11444->11446 11447 63aa6c0 NtResumeThread 11444->11447 11445 63ad4e3 11446->11445 11447->11445 11449 63ad5c5 11448->11449 11451 63aac08 NtSetContextThread 11449->11451 11452 63aac01 NtSetContextThread 11449->11452 11450 63ad5ea 11451->11450 11452->11450 11455 53a1388 11453->11455 11454 53a154d 11454->11166 11455->11454 11463 63aa508 11455->11463 11467 63aa500 11455->11467 11460 53a13ac 11458->11460 11459 53a154d 11459->11166 11460->11459 11461 63aa508 NtReadVirtualMemory 11460->11461 11462 63aa500 NtReadVirtualMemory 11460->11462 11461->11460 11462->11460 11464 63aa554 NtReadVirtualMemory 11463->11464 11466 63aa5cc 11464->11466 11466->11455 11468 63aa508 NtReadVirtualMemory 11467->11468 11470 63aa5cc 11468->11470 11470->11455 11472 63aa8e0 NtWriteVirtualMemory 11471->11472 11474 63aa9c2 11472->11474 11474->11172 11476 63aa929 NtWriteVirtualMemory 11475->11476 11478 63aa9c2 11476->11478 11478->11172 11482 63a9880 CreateProcessW 11479->11482 11481 63a9ce4 11482->11481 11485 63a9910 CreateProcessW 11483->11485 11486 63a9ce4 11485->11486 11488 63aa6c0 NtResumeThread 11487->11488 11490 63aa75b 11488->11490 11490->11187 11492 63aa704 NtResumeThread 11491->11492 11494 63aa75b 11492->11494 11494->11187 11496 63aac51 NtSetContextThread 11495->11496 11498 63aacc9 11496->11498 11498->11192 11500 63aac08 NtSetContextThread 11499->11500 11502 63aacc9 11500->11502 11502->11192 11504 63aa7c0 VirtualAllocEx 11503->11504 11506 63aa87c 11504->11506 11506->11224 11508 63aa804 VirtualAllocEx 11507->11508 11510 63aa87c 11508->11510 11510->11224 11513 63a9e84 11511->11513 11512 63a9eca 11512->11246 11513->11512 11514 63aa508 NtReadVirtualMemory 11513->11514 11515 63aa500 NtReadVirtualMemory 11513->11515 11514->11513 11515->11513 11518 63a9e60 11516->11518 11517 63a9eca 11517->11246 11518->11517 11519 63aa508 NtReadVirtualMemory 11518->11519 11520 63aa500 NtReadVirtualMemory 11518->11520 11519->11518 11520->11518 11523 63ac51a 11521->11523 11522 63ac5ee 11522->11298 11523->11522 11524 63aa508 NtReadVirtualMemory 11523->11524 11525 63aa500 NtReadVirtualMemory 11523->11525 11524->11523 11525->11523 11528 63ac544 11526->11528 11527 63ac5ee 11527->11298 11528->11527 11529 63aa508 NtReadVirtualMemory 11528->11529 11530 63aa500 NtReadVirtualMemory 11528->11530 11529->11528 11530->11528 11533 63ae4da 11531->11533 11532 63ae54a 11532->11391 11533->11532 11534 63aa508 NtReadVirtualMemory 11533->11534 11535 63aa500 NtReadVirtualMemory 11533->11535 11534->11533 11535->11533 11538 63ae504 11536->11538 11537 63ae54a 11537->11391 11538->11537 11539 63aa508 NtReadVirtualMemory 11538->11539 11540 63aa500 NtReadVirtualMemory 11538->11540 11539->11538 11540->11538

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 306 4cd7d28-4cd7d4b 307 4cd7d4d 306->307 308 4cd7d52-4cd7d9e 306->308 307->308 311 4cd7da1 308->311 312 4cd7da8-4cd7dc4 311->312 313 4cd7dcd-4cd7dce 312->313 314 4cd7dc6 312->314 318 4cd7fa6-4cd8049 313->318 314->311 314->313 315 4cd7e2e-4cd7e32 314->315 316 4cd7f0a-4cd7f0e 314->316 317 4cd7f8a-4cd7fa1 314->317 314->318 319 4cd7e82-4cd7e87 314->319 320 4cd7e5e-4cd7e7d 314->320 321 4cd7eba-4cd7eee 314->321 322 4cd7f3a-4cd7f85 314->322 323 4cd7df5-4cd7e29 314->323 324 4cd7dd3-4cd7dd9 314->324 325 4cd7ef3-4cd7f05 314->325 330 4cd7e45-4cd7e4c 315->330 331 4cd7e34-4cd7e43 315->331 328 4cd7f21-4cd7f28 316->328 329 4cd7f10-4cd7f1f 316->329 317->312 326 4cd7e89-4cd7e98 319->326 327 4cd7e9a-4cd7ea1 319->327 320->312 321->312 322->312 323->312 333 4cd7de1-4cd7df3 324->333 325->312 332 4cd7ea8-4cd7eb5 326->332 327->332 337 4cd7f2f-4cd7f35 328->337 329->337 338 4cd7e53-4cd7e59 330->338 331->338 332->312 333->312 337->312 338->312
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: MhR$MhR$Te]q$Te]q
                              • API String ID: 0-1863040356
                              • Opcode ID: 2e9b7f0479c017c914a80622af9d18199cf4c69492685179f4a0026f8b9d6c7b
                              • Instruction ID: 3d96721226412b2d4b8c084bf7b38085c3bfce32686a0570cfdaa3488656f7c4
                              • Opcode Fuzzy Hash: 2e9b7f0479c017c914a80622af9d18199cf4c69492685179f4a0026f8b9d6c7b
                              • Instruction Fuzzy Hash: B7A1C2B4E01219CFDB48CFAAC9849AEBBF2BF89300F24852AD515BB354D735A901CF54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 491 63a9880-63a993a 493 63a99f2-63a9a07 491->493 494 63a9940-63a997b 491->494 495 63a9a0d-63a9a53 493->495 496 63a9ab7-63a9abb 493->496 510 63a997d-63a9985 494->510 511 63a99b3-63a99c4 494->511 513 63a9a91-63a9a9c 495->513 514 63a9a55-63a9a5d 495->514 498 63a9abd-63a9aff 496->498 499 63a9b05-63a9b56 496->499 498->499 500 63a9c0e-63a9c20 499->500 501 63a9b5c-63a9b97 499->501 503 63a9c3d-63a9c4f 500->503 504 63a9c22-63a9c3a 500->504 531 63a9b99-63a9ba1 501->531 532 63a9bcf-63a9be0 501->532 508 63a9c6c-63a9ce2 CreateProcessW 503->508 509 63a9c51-63a9c69 503->509 504->503 515 63a9ceb-63a9d2c 508->515 516 63a9ce4-63a9cea 508->516 509->508 517 63a99a8-63a99b1 510->517 518 63a9987-63a9991 510->518 526 63a99ca-63a99ea 511->526 533 63a9aa2-63a9ab1 513->533 520 63a9a5f-63a9a69 514->520 521 63a9a80-63a9a8f 514->521 540 63a9d2e-63a9d3d 515->540 541 63a9d43-63a9d5a 515->541 516->515 517->526 522 63a9993 518->522 523 63a9995-63a99a4 518->523 528 63a9a6b 520->528 529 63a9a6d-63a9a7c 520->529 521->533 522->523 523->523 534 63a99a6 523->534 526->493 528->529 529->529 537 63a9a7e 529->537 538 63a9ba3-63a9bad 531->538 539 63a9bc4-63a9bcd 531->539 544 63a9be6-63a9c06 532->544 533->496 534->517 537->521 542 63a9baf 538->542 543 63a9bb1-63a9bc0 538->543 539->544 540->541 549 63a9d5c-63a9d68 541->549 550 63a9d73-63a9d83 541->550 542->543 543->543 546 63a9bc2 543->546 544->500 546->539 549->550 551 63a9d9a-63a9ddd 550->551 552 63a9d85-63a9d94 550->552 557 63a9ddf-63a9de3 551->557 558 63a9ded-63a9df1 551->558 552->551 557->558 561 63a9de5 557->561 559 63a9df3-63a9df7 558->559 560 63a9e01-63a9e05 558->560 559->560 562 63a9df9 559->562 563 63a9e07-63a9e0b 560->563 564 63a9e15 560->564 561->558 562->560 563->564 565 63a9e0d 563->565 566 63a9e16 564->566 565->564 566->566
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 063A9CCF
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: bfcd482a76e89a22dc6d02bb2da57300c96c7c36c548a17c93152901eaeecf9d
                              • Instruction ID: 4880cb1febddfbe3e9c794de5f62baa761f8e51ba8e6c72c0208297a346d70b5
                              • Opcode Fuzzy Hash: bfcd482a76e89a22dc6d02bb2da57300c96c7c36c548a17c93152901eaeecf9d
                              • Instruction Fuzzy Hash: 7802C074E112288FEB64CFA9C880B9DBBB1FF49304F1481AAD419B7290DB349985DF95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 567 63a9875-63a993a 570 63a99f2-63a9a07 567->570 571 63a9940-63a997b 567->571 572 63a9a0d-63a9a53 570->572 573 63a9ab7-63a9abb 570->573 587 63a997d-63a9985 571->587 588 63a99b3-63a99c4 571->588 590 63a9a91-63a9a9c 572->590 591 63a9a55-63a9a5d 572->591 575 63a9abd-63a9aff 573->575 576 63a9b05-63a9b56 573->576 575->576 577 63a9c0e-63a9c20 576->577 578 63a9b5c-63a9b97 576->578 580 63a9c3d-63a9c4f 577->580 581 63a9c22-63a9c3a 577->581 608 63a9b99-63a9ba1 578->608 609 63a9bcf-63a9be0 578->609 585 63a9c6c-63a9ce2 CreateProcessW 580->585 586 63a9c51-63a9c69 580->586 581->580 592 63a9ceb-63a9d2c 585->592 593 63a9ce4-63a9cea 585->593 586->585 594 63a99a8-63a99b1 587->594 595 63a9987-63a9991 587->595 603 63a99ca-63a99ea 588->603 610 63a9aa2-63a9ab1 590->610 597 63a9a5f-63a9a69 591->597 598 63a9a80-63a9a8f 591->598 617 63a9d2e-63a9d3d 592->617 618 63a9d43-63a9d5a 592->618 593->592 594->603 599 63a9993 595->599 600 63a9995-63a99a4 595->600 605 63a9a6b 597->605 606 63a9a6d-63a9a7c 597->606 598->610 599->600 600->600 611 63a99a6 600->611 603->570 605->606 606->606 614 63a9a7e 606->614 615 63a9ba3-63a9bad 608->615 616 63a9bc4-63a9bcd 608->616 621 63a9be6-63a9c06 609->621 610->573 611->594 614->598 619 63a9baf 615->619 620 63a9bb1-63a9bc0 615->620 616->621 617->618 626 63a9d5c-63a9d68 618->626 627 63a9d73-63a9d83 618->627 619->620 620->620 623 63a9bc2 620->623 621->577 623->616 626->627 628 63a9d9a-63a9ddd 627->628 629 63a9d85-63a9d94 627->629 634 63a9ddf-63a9de3 628->634 635 63a9ded-63a9df1 628->635 629->628 634->635 638 63a9de5 634->638 636 63a9df3-63a9df7 635->636 637 63a9e01-63a9e05 635->637 636->637 639 63a9df9 636->639 640 63a9e07-63a9e0b 637->640 641 63a9e15 637->641 638->635 639->637 640->641 642 63a9e0d 640->642 643 63a9e16 641->643 642->641 643->643
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 063A9CCF
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 66d5cb9edb2ec1f9fb3f9ad608adca4654d197bc0343a78cec92d70fa9410ee1
                              • Instruction ID: db3401679a5e1f79ca57d6887c7f27f03a2c4637c04b766b86b5c54c021da25b
                              • Opcode Fuzzy Hash: 66d5cb9edb2ec1f9fb3f9ad608adca4654d197bc0343a78cec92d70fa9410ee1
                              • Instruction Fuzzy Hash: 80F1D174D11228CFEB64CFA9C880B9DBBB1FF49304F1481AAE419B7290DB349985DF95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 644 63aa8d8-63aa948 647 63aa94a-63aa95c 644->647 648 63aa95f-63aa9c0 NtWriteVirtualMemory 644->648 647->648 650 63aa9c9-63aaa1b 648->650 651 63aa9c2-63aa9c8 648->651 651->650
                              APIs
                              • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 063AA9B0
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryVirtualWrite
                              • String ID:
                              • API String ID: 3527976591-0
                              • Opcode ID: 5d6d1668b4db5123f3efea62451b1045da9aad13e1ae96584b1b0bc27a7462fe
                              • Instruction ID: 594e35271049c896c9d236bd03bde3f8553038c4fc04a7932994d0e3d5058c14
                              • Opcode Fuzzy Hash: 5d6d1668b4db5123f3efea62451b1045da9aad13e1ae96584b1b0bc27a7462fe
                              • Instruction Fuzzy Hash: AE419CB5D012589FCB00DFA9D984ADEFBF1FF49310F14902AE418B7250D779A945CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 656 63aa8e0-63aa948 658 63aa94a-63aa95c 656->658 659 63aa95f-63aa9c0 NtWriteVirtualMemory 656->659 658->659 661 63aa9c9-63aaa1b 659->661 662 63aa9c2-63aa9c8 659->662 662->661
                              APIs
                              • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 063AA9B0
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryVirtualWrite
                              • String ID:
                              • API String ID: 3527976591-0
                              • Opcode ID: 4897e0c3bb3840fb890465c9cad6fe3a0622b3b9798b06e0b6c2f82a4c46098f
                              • Instruction ID: 1306358f5b03a2a0eb320f5bb7ccde07b6b25812e5c658566b72b39b5d4809e6
                              • Opcode Fuzzy Hash: 4897e0c3bb3840fb890465c9cad6fe3a0622b3b9798b06e0b6c2f82a4c46098f
                              • Instruction Fuzzy Hash: FC419CB5D012589FCF00CFA9D984ADEFBF1FB49310F14902AE818B7250D779A945CB94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 667 63aa500-63aa5ca NtReadVirtualMemory 671 63aa5cc-63aa5d2 667->671 672 63aa5d3-63aa625 667->672 671->672
                              APIs
                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 063AA5BA
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryReadVirtual
                              • String ID:
                              • API String ID: 2834387570-0
                              • Opcode ID: 615abb89927e743dadaab2f31bf7fa34c75d7f5ebd06c15004c32ec8b9c0b177
                              • Instruction ID: 7baa59022af30f76405a4046dea22a2db1df5814fcab8743eaaff3343284f389
                              • Opcode Fuzzy Hash: 615abb89927e743dadaab2f31bf7fa34c75d7f5ebd06c15004c32ec8b9c0b177
                              • Instruction Fuzzy Hash: 6B419AB5D002589FCF10CFA9D984AEEFBB1BB19310F14942AE855B7210D739A945CFA4
                              APIs
                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 063AA5BA
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: MemoryReadVirtual
                              • String ID:
                              • API String ID: 2834387570-0
                              • Opcode ID: 20176f68cdc94ef40df385e0f69ee7b5e2dc4787c4361dace1d86161846a435d
                              • Instruction ID: b6bd50de625a6d29f790604005726df9617a5487080ca4a15d0a9e3059bfc586
                              • Opcode Fuzzy Hash: 20176f68cdc94ef40df385e0f69ee7b5e2dc4787c4361dace1d86161846a435d
                              • Instruction Fuzzy Hash: 8841AAB5D002589FCF10CFA9D984AEEFBB1BB09310F10942AE815B7210D739A945CFA8
                              APIs
                              • NtSetContextThread.NTDLL(?,?), ref: 063AACB7
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: ContextThread
                              • String ID:
                              • API String ID: 1591575202-0
                              • Opcode ID: 6ab6c70df1657a6f2d970a4349719387cc0d7d5ea68eadacc9bcac78f38669f5
                              • Instruction ID: 91f118eab07e22de07b6b6392cbc67484896a50117ebf529d9d7afcbf8a12bbb
                              • Opcode Fuzzy Hash: 6ab6c70df1657a6f2d970a4349719387cc0d7d5ea68eadacc9bcac78f38669f5
                              • Instruction Fuzzy Hash: 6941BCB5D002589FDB10DFA9D984AEEBBF1BF49310F14802AE409B7240D738A945CF94
                              APIs
                              • NtSetContextThread.NTDLL(?,?), ref: 063AACB7
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: ContextThread
                              • String ID:
                              • API String ID: 1591575202-0
                              • Opcode ID: 29591c53b8f7b4f435a0f3ff3e320813739a8c3ced9ff937db6e8bc57b513927
                              • Instruction ID: a7add0271d0430488921635c6da7b7b0e49123e28d4185df8928d0e82df3e230
                              • Opcode Fuzzy Hash: 29591c53b8f7b4f435a0f3ff3e320813739a8c3ced9ff937db6e8bc57b513927
                              • Instruction Fuzzy Hash: 8931ABB5D012589FDB10DFAAD984AEEFBF1BF49310F24802AE419B7240D739A945CF94
                              APIs
                              • NtResumeThread.NTDLL(?,?), ref: 063AA749
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 968d3c4b30f3db1632be0e7725fe2ab5274b3a721dec73f3bb32627f057c50f0
                              • Instruction ID: cc51e09211da247c8019b7826f07d7025ca3af252089a297d969923eec69fabc
                              • Opcode Fuzzy Hash: 968d3c4b30f3db1632be0e7725fe2ab5274b3a721dec73f3bb32627f057c50f0
                              • Instruction Fuzzy Hash: 7331CAB9D012189FCB10CFA9D980A9EFBF5FF49310F24842AE805B7200C739A945CF94
                              APIs
                              • NtResumeThread.NTDLL(?,?), ref: 063AA749
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: e30f486dcb37480f8519417ce4be8bd3ddda1eb5516d975041fc15f703c53131
                              • Instruction ID: f20db5bd3c4948d4b6a0ca6ac466c865276107068d958de3fc24c7d235180663
                              • Opcode Fuzzy Hash: e30f486dcb37480f8519417ce4be8bd3ddda1eb5516d975041fc15f703c53131
                              • Instruction Fuzzy Hash: B431A9B9D012189FCB10DFA9D984A9EFBF5FF49310F20942AE805B7200C779A945CFA4
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a078f988ddbff9c203bd21d63d541f96d3a4185dd39e49eb413f32ed7991a05
                              • Instruction ID: bf3f3e60657a40401a3af01b10ad86ba02c5babc6a6830c2e5399f262a797142
                              • Opcode Fuzzy Hash: 0a078f988ddbff9c203bd21d63d541f96d3a4185dd39e49eb413f32ed7991a05
                              • Instruction Fuzzy Hash: 609182B1D0165A8FDF14CF66C8852EDBBB2FF86304F1582B9D5099B221DA346A47DF00
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: db37b478912f383509d8ad5e734af9504e37e77341bbd23e12da343376d84b44
                              • Instruction ID: 4e5c5f0d96f0bc4caab5f24a5318152a0aa3925d0afa1a058685cd1443ebcff4
                              • Opcode Fuzzy Hash: db37b478912f383509d8ad5e734af9504e37e77341bbd23e12da343376d84b44
                              • Instruction Fuzzy Hash: 53A1B678E40318DFCB14DFA5E98469DBBB2FF89300F50946AD51AA7314EB34A982CF50
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 38927736e1457cc9efc2b81ec6057b06e4d6afd2c091cca409f36af149fd700d
                              • Instruction ID: a54e9b90aed93ee49ee676ed43ccc0f96fd2ce490d105714ab633fdfc5f91142
                              • Opcode Fuzzy Hash: 38927736e1457cc9efc2b81ec6057b06e4d6afd2c091cca409f36af149fd700d
                              • Instruction Fuzzy Hash: A7615970E05209DFCB18DFE6D540AAEBBB2FF89300F54992AC1167B254DB35AA02CF51
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0411c92e652d221634c3fbcdcabd7156cab0f882ea3cd5756078ce017d4a018f
                              • Instruction ID: 4b42c457e9ea3aaead588c91e1a37df6fd3512d278de0353c2c9292af829414f
                              • Opcode Fuzzy Hash: 0411c92e652d221634c3fbcdcabd7156cab0f882ea3cd5756078ce017d4a018f
                              • Instruction Fuzzy Hash: 8A414271E016188BEB5CCF6B8D4078EFAF7AFC9301F14C1BA990CAA214DB7416428F11
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5fe3ff5f31842063b3957df4c3030ed0ba850b92a261f38323ae00fe06b9bec6
                              • Instruction ID: c196b25461f4003ca1ab53fbb3bbf5d2fce27d8d52c1b5d7bd93a8d1103e360d
                              • Opcode Fuzzy Hash: 5fe3ff5f31842063b3957df4c3030ed0ba850b92a261f38323ae00fe06b9bec6
                              • Instruction Fuzzy Hash: C54143B1E016188BEB5DCF6B8D4078AFAF7BFC9200F14C1BA990CAA215DB3406468F10

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 482 4cd3645-4cd3646 483 4cd36ac-4cd36b2 482->483 484 4cd3648-4cd3665 482->484 485 4cd36bd-4cd3743 483->485 484->483
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: l.dl$$]q
                              • API String ID: 0-1344983801
                              • Opcode ID: aba2d89b57b5f1818035c645d773ff6682c0bfc0d66ad7128dce34a77a8d7fce
                              • Instruction ID: df269e74c8be576b07101f0a348272d706e6e2e47efa2528f7e2fde1e09b8a3d
                              • Opcode Fuzzy Hash: aba2d89b57b5f1818035c645d773ff6682c0bfc0d66ad7128dce34a77a8d7fce
                              • Instruction Fuzzy Hash: 2C11FB74A402698FCB29CF65C94479EBBF6FF89340F1094E99449AB324DB709E81CF45
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02C34E3F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2089195146.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2c30000_efthfxj.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: a5bb9c9ff5735fbdf379b55cdffebb69de1bba5ccabfb59f4a2db91e1ed7c877
                              • Instruction ID: 3325bc8fd566e858f60dd667c4dda0560ba8f74fbb16a99a3f7ab841d5ca51b3
                              • Opcode Fuzzy Hash: a5bb9c9ff5735fbdf379b55cdffebb69de1bba5ccabfb59f4a2db91e1ed7c877
                              • Instruction Fuzzy Hash: 413198B9D052589FCF10CFA9D984ADEFBF1AF19310F14906AE814B7210D378A945CBA4
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 063AA86A
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 0a23a3d850cfbfed325d2169d9b7c0592d0c54c954303eb9bc7fe0d94d850e56
                              • Instruction ID: 4c97f1f36d15e181b01c627e10dae918db5a9019dfb797a6035cc6195bcb5a12
                              • Opcode Fuzzy Hash: 0a23a3d850cfbfed325d2169d9b7c0592d0c54c954303eb9bc7fe0d94d850e56
                              • Instruction Fuzzy Hash: 073176B9D002589FCF10CFA9D984A9EFBB5FF49310F14942AE819B7210D735A946CFA4
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 063AA86A
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2097455439.00000000063A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_63a0000_efthfxj.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 68863eff60736a5cd05e9378d8d1cb9f1d797ca794a63980ad9b3c19b5861995
                              • Instruction ID: 604a2abd2cfcf7f7d0d45c51e7a9db826a6a618c761e6d0e062bf95c45a5575d
                              • Opcode Fuzzy Hash: 68863eff60736a5cd05e9378d8d1cb9f1d797ca794a63980ad9b3c19b5861995
                              • Instruction Fuzzy Hash: 033167B9D002589FCF10CFA9D984A9EFBB5FB59310F10942AE815B7210D735A946CFA4
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02C3A51F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2089195146.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2c30000_efthfxj.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 14e9f26cfbd363390d4728a047f17793a406c6a739fe2aed9fccd5d96b0216bf
                              • Instruction ID: 42ba4923fcdf599f0e4d7ad62128773c50688764d704af9f04f8f0ef6e7a70b3
                              • Opcode Fuzzy Hash: 14e9f26cfbd363390d4728a047f17793a406c6a739fe2aed9fccd5d96b0216bf
                              • Instruction Fuzzy Hash: 2D3199B9D002589FCB10CFA9D584ADEFBF1BF19310F24902AE814B7210D379A945CF64
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02C34E3F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2089195146.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2c30000_efthfxj.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: d5914a6ce06cefae39298bd0b7cbfc35c500573505a05a161108c5874af72d4d
                              • Instruction ID: fab2df3cfabd916e3b4adb1c2bfb850a0b32048cadba7fa53f5365fe294a96c4
                              • Opcode Fuzzy Hash: d5914a6ce06cefae39298bd0b7cbfc35c500573505a05a161108c5874af72d4d
                              • Instruction Fuzzy Hash: 303198B9D002589FCF14CFA9D584ADEFBF5BB19310F24902AE814B7210D379A945CFA4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,
                              • API String ID: 0-3772416878
                              • Opcode ID: 5d77f154c2e76b091c17451500fbfdea7041a068d201321800bf925ba03fc094
                              • Instruction ID: e0b07c8d921d6f68b9394fb1a9e4bd07a241c22bc0ddb19fa47a3d2051b07035
                              • Opcode Fuzzy Hash: 5d77f154c2e76b091c17451500fbfdea7041a068d201321800bf925ba03fc094
                              • Instruction Fuzzy Hash: A251A179A05228DFDB64DF68C988BE9BBB1EB49301F5081D9E40DA7351DB31AE81CF50
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: 9"U
                              • API String ID: 0-2706808553
                              • Opcode ID: e1c885c4770b728e1de85d5a83aa539b9686f6b4d9fef803554f7fda7692be5e
                              • Instruction ID: f41c593e241b3fc883ebfc9986608639f2e6b50f2bf74401188a097413b55094
                              • Opcode Fuzzy Hash: e1c885c4770b728e1de85d5a83aa539b9686f6b4d9fef803554f7fda7692be5e
                              • Instruction Fuzzy Hash: 2C21E774E05508EFCB04DFA9C584A9DBBF2AB88300F54D4A69519A7254EB31EA01DB00
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: Y
                              • API String ID: 0-3233089245
                              • Opcode ID: 330b13b5b420806cbebb069a7eced8a90e2ec0df7c59a8d2d931f0e0f68c4a02
                              • Instruction ID: fd9173bb7c0fb36dc9c2410e23cac3505cf811ba0aa59c0a0adecc576a280699
                              • Opcode Fuzzy Hash: 330b13b5b420806cbebb069a7eced8a90e2ec0df7c59a8d2d931f0e0f68c4a02
                              • Instruction Fuzzy Hash: DF315178A112298FDB65DF15C988B9DBBB6BF49300F1081D9D44DA7364EB31AE81CF01
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: $]q
                              • API String ID: 0-1007455737
                              • Opcode ID: 31880aed266c4bb63518655faa8c3c10db5b8ec2fe14d1cf2f9f35456872e491
                              • Instruction ID: 6dcec6f983ab25f7c1ba72bafa50dcb4e053ab9108616f6995c5440a5df20067
                              • Opcode Fuzzy Hash: 31880aed266c4bb63518655faa8c3c10db5b8ec2fe14d1cf2f9f35456872e491
                              • Instruction Fuzzy Hash: CB11F974A402298FCB26DF25C98469DBBBABF85700F1045EA944DA7224DB709FC1CF45
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: 8fddcd3938b3594750fd56ed3a42d90c1019eee798b32f2d2be0cabe7c18fe3b
                              • Instruction ID: 64f058b27895f587d6a310508ceb65eb355c990d101b5f972964a1e8ecc07271
                              • Opcode Fuzzy Hash: 8fddcd3938b3594750fd56ed3a42d90c1019eee798b32f2d2be0cabe7c18fe3b
                              • Instruction Fuzzy Hash: 9E018CB4A0621DDFDB60CF60C9416AAFB36FF52340F2012E9C19A6B111DB305A86DF01
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: <
                              • API String ID: 0-4251816714
                              • Opcode ID: 79a28c4d0028e920c3c42ce3e88aaf4eba90e6f5e77e7e3e600e1648ff59f592
                              • Instruction ID: c2f591ab4c844a32dc4a1e7b65da6e2c6bc9858e768873910a38628ab7d074e7
                              • Opcode Fuzzy Hash: 79a28c4d0028e920c3c42ce3e88aaf4eba90e6f5e77e7e3e600e1648ff59f592
                              • Instruction Fuzzy Hash: F5F0F4B4D22229CFDB65CF25C960B99BBB9BF49600F0094D9C1896B212D7319B80CF10
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1cb7997fcc432f0f3e8f4c04068b9a723d40252595926a5ef1188fe01a3f3a7e
                              • Instruction ID: 846e0ba61ac0551a40365873c0bce6593c7d032933e40b443fe0a26583630547
                              • Opcode Fuzzy Hash: 1cb7997fcc432f0f3e8f4c04068b9a723d40252595926a5ef1188fe01a3f3a7e
                              • Instruction Fuzzy Hash: AA51BF75E14219DFCF04CFA9D8809EEBBB6FF88310F10912AE419AB254DB349912CF51
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 677f4f000e5719baae685999484f07a883e5b23d465076e5acdd490ff86afe4f
                              • Instruction ID: cc2d48400bf0ba76fb882d1ddf72e96e92cdba70a6762eb8da06ce84f26737fe
                              • Opcode Fuzzy Hash: 677f4f000e5719baae685999484f07a883e5b23d465076e5acdd490ff86afe4f
                              • Instruction Fuzzy Hash: 5D51B075E042199FCF04CFE9D8849AEBBF6FF88300F14952AE419AB254DB349912CF51
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3df585600a0f6e21bfce1132d06414e16d5e21c22a329803750ccb066fb9ae67
                              • Instruction ID: 646bfca22e132bb8537795b3b43a9d5a017839c29e17ef33b9681f533731aee8
                              • Opcode Fuzzy Hash: 3df585600a0f6e21bfce1132d06414e16d5e21c22a329803750ccb066fb9ae67
                              • Instruction Fuzzy Hash: 3341A4B5A012199FDB64DF58C989BD9BBFAAF49300F1081D9E84CE7311DB309E818F10
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f7c982d121327c8f4eb0cbb5b4b50fe6a2d03b707058acd7fc8d50b0c2e2325d
                              • Instruction ID: e380f7f2ee2853eedb748cb37831ff11116a35c80a294a136b56adc4b4953375
                              • Opcode Fuzzy Hash: f7c982d121327c8f4eb0cbb5b4b50fe6a2d03b707058acd7fc8d50b0c2e2325d
                              • Instruction Fuzzy Hash: A231C6B4E05219DFCB44DFAAC5809AEFBF2FB88300F10956AD529A7354D734AA41CF60
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f10260be2b6aa8f8d378a2261c7ad795a1800635da1cf455acea87e77772ff25
                              • Instruction ID: aafc619009e4673f4057068fd0facd27740c191b19939719900cce9ffbb6b1c6
                              • Opcode Fuzzy Hash: f10260be2b6aa8f8d378a2261c7ad795a1800635da1cf455acea87e77772ff25
                              • Instruction Fuzzy Hash: BE31B2B5E012198FCB68CB68C895BDDBBB2AB98304F14C0E5A55CA7355EB709E81CF50
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 041b0fc0c79fc9a37940683e70e24c43e015561f7f99ea4a9f28d372fb45867b
                              • Instruction ID: e6250a4b107adf99f6b24bd1c746bed919e1d03c5bd31c23215a92f476d9f7c1
                              • Opcode Fuzzy Hash: 041b0fc0c79fc9a37940683e70e24c43e015561f7f99ea4a9f28d372fb45867b
                              • Instruction Fuzzy Hash: C1315C789012298FDB64DF68C884B9DBBB2FB49310F5085DAD90DA7351DB30AE81CF11
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7c9fd9fbab80d4f66047939c4be9115d7c7a2dd9059ae9b3328c03b1b31857be
                              • Instruction ID: f7b9656bcc9bc928f97847e256040221fc5d1b64a479e661d7b2ce58e13b34ff
                              • Opcode Fuzzy Hash: 7c9fd9fbab80d4f66047939c4be9115d7c7a2dd9059ae9b3328c03b1b31857be
                              • Instruction Fuzzy Hash: 8031AE74A012298FCB29CF68C988ADDFBF1BF48304F1480E9940CA7221DB30AE95CF54
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b3987a216780c7ac5407373dc335d296432dcb5d7adbec22be53635a1e05aa98
                              • Instruction ID: 38015bcaf66ead273c74f0a2814d322076cfd6ea344d7fed6eafc8d2255fc191
                              • Opcode Fuzzy Hash: b3987a216780c7ac5407373dc335d296432dcb5d7adbec22be53635a1e05aa98
                              • Instruction Fuzzy Hash: E7219F74E412289FDBA4DF68E988B99BBF2BB49310F1085DAD44DA7350DB309E818F11
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0216d16e0886869ce705c20bb110ccd1430ed8f0f737cfa64a5019e6ba904acc
                              • Instruction ID: f77b6863d7aaac17eb0c50058e189734ab5455b0cfac55ab40593094e8524a34
                              • Opcode Fuzzy Hash: 0216d16e0886869ce705c20bb110ccd1430ed8f0f737cfa64a5019e6ba904acc
                              • Instruction Fuzzy Hash: 2C018FB1D00608AFCB14DFB9D8406EEBBF1EB48310F1486B9D91896301EA31A656DF44
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ba08017d9a292f865073bc9ea911a7f97651aaf7861a775aa567b0e5be5b100
                              • Instruction ID: 47f7935b13bd4fb64b09478db8395fa013b3d2d73db4cf8756e64baa68376d4f
                              • Opcode Fuzzy Hash: 7ba08017d9a292f865073bc9ea911a7f97651aaf7861a775aa567b0e5be5b100
                              • Instruction Fuzzy Hash: 51F08CB1C00208ABCB14EFB9E4406EDBBF0EB48310F1046B9D91492301EB35965BDF80
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c429349f050ec8719a9644c3a39832cd173685bfb4d82175e8bda3edc9450cee
                              • Instruction ID: e91068d90ab863789fdc09f55da97748b1c56969bca035f5706328381a84f916
                              • Opcode Fuzzy Hash: c429349f050ec8719a9644c3a39832cd173685bfb4d82175e8bda3edc9450cee
                              • Instruction Fuzzy Hash: F4014CB5D051198FDBA4DF69C858B99BAF6FB88300F10D1E9D10CE7201EA349E808F20
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45e60c21b9435c5be36082aed274169a72dda5dfb9de02d53027a63a2a50f2ee
                              • Instruction ID: 9029d94b61f923b969b865a6610b33ca34093264db1c30f521c490421d6b8526
                              • Opcode Fuzzy Hash: 45e60c21b9435c5be36082aed274169a72dda5dfb9de02d53027a63a2a50f2ee
                              • Instruction Fuzzy Hash: 4BF058B0C11208DFCB05DFB8C9026ADBFB1FB05301F5085AAC818A3252D7709656CF90
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6252efeba478cbb603a879b35f059ce7011b62f5a347f1f38cd59abfd13d5fc8
                              • Instruction ID: 6e21215cc4e1f9954d9afe4d41ca23b617f64602c05eb9e57d4b02c00e69212e
                              • Opcode Fuzzy Hash: 6252efeba478cbb603a879b35f059ce7011b62f5a347f1f38cd59abfd13d5fc8
                              • Instruction Fuzzy Hash: BD01B671D05219AFDF25DFA1DD44ADDBBB2FF88304F2081A9A509A3250DB315E519F00
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 46f423a0d4ef0eadefe5ce500b1fa049e5239885cb4acd5201b58b3888b45666
                              • Instruction ID: c8387d5dec53fe94a634ec9733f6a62a28d79addd962497fe7702008c62964e7
                              • Opcode Fuzzy Hash: 46f423a0d4ef0eadefe5ce500b1fa049e5239885cb4acd5201b58b3888b45666
                              • Instruction Fuzzy Hash: 52F0B7B69011149FDB55DF59D855BE9B6BAEB89300F44D0A5E008E3211DA309A408F20
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3aaaf342a36773e257676000d12ed0fc900d74cb9ecfe9de10a6e06d0d81dfe5
                              • Instruction ID: 1e46506466f5f8b78b6620783194f67e521d5322db01b2e0254bdac4e550a482
                              • Opcode Fuzzy Hash: 3aaaf342a36773e257676000d12ed0fc900d74cb9ecfe9de10a6e06d0d81dfe5
                              • Instruction Fuzzy Hash: A8F01D70A017598FDB29DB25CC507BAB3BBAF8460AF1444E984096B260CA359E82DF06
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6b6c86bc9d67471cf9cd40da56e31c97cc216ff341ee0cdffcbed4c9e9225e7
                              • Instruction ID: b4ec7203732376e7a8968977231ac4a4b23b2729e24b2c8b187d7824c8c50eff
                              • Opcode Fuzzy Hash: f6b6c86bc9d67471cf9cd40da56e31c97cc216ff341ee0cdffcbed4c9e9225e7
                              • Instruction Fuzzy Hash: 14F04975D066698FDB54CF24CC48A89FBF1BB55300F14D0DAC049E7211EB305A819F61
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cdbf34c8afbdfbb0a2c209f2e1155f4e533b790c0964ac0d6cc3c8a33073a95c
                              • Instruction ID: 6104fdee1bcdd9cb97e4581d7ef40cc5dcbfc460bb87ec1c64fdc2e0964b6983
                              • Opcode Fuzzy Hash: cdbf34c8afbdfbb0a2c209f2e1155f4e533b790c0964ac0d6cc3c8a33073a95c
                              • Instruction Fuzzy Hash: 81F0A475A022188FDBA4CF24C984A9AFBB1FF89314F54C5E9984DAB211DB31DE81CF01
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 900f51e4ac0cec2fb7035ad5004e0acbc2fde0e2af012453ecf8fcb611672539
                              • Instruction ID: a5cce08482a7ec35dd7f363a2e0614256d03b4551752149cb0d5b83740ff96f5
                              • Opcode Fuzzy Hash: 900f51e4ac0cec2fb7035ad5004e0acbc2fde0e2af012453ecf8fcb611672539
                              • Instruction Fuzzy Hash: 50F01C74C0020CEFCF41DFA8D9046ADBFB1FB08310F008559E814A2210D7719660DF90
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 704084cb728e3c7d2b9459b1cd79dbe25dedcf9dbc72c372091d4ced5bcd1cb4
                              • Instruction ID: 90750cf328ea62a4e58cd6a305c50a9f02f720e2fe72d5f7fb4fa9f68f7bb526
                              • Opcode Fuzzy Hash: 704084cb728e3c7d2b9459b1cd79dbe25dedcf9dbc72c372091d4ced5bcd1cb4
                              • Instruction Fuzzy Hash: 2CE0EDFAA011149FDB54DF58CC45FEDBABAEB89300F10D099E109E3211EB30AE418F20
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 18c97a1f06958709cdbc345d3535678ebfd52b24feddffb7ec7674d5d07564b4
                              • Instruction ID: 97227d84f38b28cb8e75b7cdfd567cdbe99eb07c66798ce20467a4a99d7b019e
                              • Opcode Fuzzy Hash: 18c97a1f06958709cdbc345d3535678ebfd52b24feddffb7ec7674d5d07564b4
                              • Instruction Fuzzy Hash: 06F0C9B4D40218DFCB44EFA9D944AADBBF4FB08310F1085AAE818A7311E771AA50DF91
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a592e5d4a26eb06f6bbcf21a65fe3afe09acd0086efbb69f102878a16ab6a17e
                              • Instruction ID: 1a565ebd85df43330ad71674e156d7d1976db2b298fe247dd16d67904fce82d3
                              • Opcode Fuzzy Hash: a592e5d4a26eb06f6bbcf21a65fe3afe09acd0086efbb69f102878a16ab6a17e
                              • Instruction Fuzzy Hash: 5FE0E5B0D00218EFCB44EFA9D8446ADBBF1FB48300F5086AAD824A3300EB719A51DF80
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ef25c456989dbaeea444a2ab6c3d3eeaa83c6640d126f2097666148d18276bc9
                              • Instruction ID: 733f013c01f3e527589e0bea9d1f16f6248177001c0003cd82139ad5bed83982
                              • Opcode Fuzzy Hash: ef25c456989dbaeea444a2ab6c3d3eeaa83c6640d126f2097666148d18276bc9
                              • Instruction Fuzzy Hash: 6EE0EDB4D4121CEFCB40EFA8D9056ADBBB5FB08310F1085A9E858A3300D7719661DF90
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f9e51240f7ffff210b718ecbb5f1feefdd055cb99eba02ce9ed162a00e8d8797
                              • Instruction ID: 82f131c07b2a080e19754417fee9d43aaeb49304aa341eb8b656acc1f72ff673
                              • Opcode Fuzzy Hash: f9e51240f7ffff210b718ecbb5f1feefdd055cb99eba02ce9ed162a00e8d8797
                              • Instruction Fuzzy Hash: FDE0ED70D00219DFCB44DFA8D4006ADBBB1FB08300F5085A9D818A3341D7719651DF81
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0026bd85d9ad70ace7e6189307f337f9a10c0c2ff29be8d484f3f9e7a1531885
                              • Instruction ID: d8f69a124a1e13bbc88688af1831f4818f591d2a6d90881e99cda558abfa1572
                              • Opcode Fuzzy Hash: 0026bd85d9ad70ace7e6189307f337f9a10c0c2ff29be8d484f3f9e7a1531885
                              • Instruction Fuzzy Hash: 14E01A71D45308AFCB91DFB8D80538DBBF4EB04301F1485A98448D2380EB759A50CB41
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2096857904.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_53a0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eb16ead6a5189e667b6db75e65cdcdebe416b3d20d47f533381b0366602df2f6
                              • Instruction ID: 404f18f20348c8061d192d8e0ca5d3b2cc416aae2daeebd6a29c182a0223b015
                              • Opcode Fuzzy Hash: eb16ead6a5189e667b6db75e65cdcdebe416b3d20d47f533381b0366602df2f6
                              • Instruction Fuzzy Hash: 1DF09274A012199FDB68CF24C984AA9FBB2FB49314F24D1D9981CA7212DB71EE81CF50
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 18cf9d8e8b32c31af847ea62dadb57787b706d31480609c9650273ff5cc80bbd
                              • Instruction ID: a046d648b6a999814ed117876288bb73c17ba4a9c8b64d26232f5ee57f96efea
                              • Opcode Fuzzy Hash: 18cf9d8e8b32c31af847ea62dadb57787b706d31480609c9650273ff5cc80bbd
                              • Instruction Fuzzy Hash: 67E07EB8E0031C8FDF10CF99C881AADBBB6AB49310F0450999A08AB340D334A985CF18
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: de416f1142b453767d380d1fcbc3a37c22d1b76140ad3c84a353fb2129e27fa3
                              • Instruction ID: a57ce39dc979000393c4141a0d77fdcc6a5511ca570c472ab7cd8e7e385d23db
                              • Opcode Fuzzy Hash: de416f1142b453767d380d1fcbc3a37c22d1b76140ad3c84a353fb2129e27fa3
                              • Instruction Fuzzy Hash: BCE09A749512699FCB54EF69D98079CB7B5FB88200F0055E6900DB7224DB349D89CF20
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d5b0c6dc4595639d51026a61929127d9f1fa3b13ea72732198e50c0a5fd8a527
                              • Instruction ID: e4dc5a09cd9427e5ada4f0de1f31ade2fc76e677aabe90c62abc4425ee3c888e
                              • Opcode Fuzzy Hash: d5b0c6dc4595639d51026a61929127d9f1fa3b13ea72732198e50c0a5fd8a527
                              • Instruction Fuzzy Hash: 9CE01774D0411E8FEB14CBA1CC40BAEF7B6BF84300F1494EA810AB7244E630AA82CF24
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 403f0fb3205a511338e035edee170c3e1cd820a989e41d2e4575ee3bf227e08f
                              • Instruction ID: 95e6833093da8b40c9a33fdceb538ebd870ace052eed0971be98a3e86f5866c4
                              • Opcode Fuzzy Hash: 403f0fb3205a511338e035edee170c3e1cd820a989e41d2e4575ee3bf227e08f
                              • Instruction Fuzzy Hash: 3AD09E7591422E8FDB54CB91C841BAEBAB6AB84340F1455E98219FB244D6349A828F24
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e347e7eb64de3475f3cfb5fa28fe709a5975e88e0f03c2e27502dc53837c641
                              • Instruction ID: 266f523461b49a55994b355e161ad1673c7f932911c104e317c45a8101a03d0f
                              • Opcode Fuzzy Hash: 3e347e7eb64de3475f3cfb5fa28fe709a5975e88e0f03c2e27502dc53837c641
                              • Instruction Fuzzy Hash: E8E012309142998FCB1ADF15CE40799B7B9FF84304F0459E69109A7128E7309F82CF20
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e858ce1946aa5aeb29267121d305216855a60f467b9ae769e16d1ca254c9e5e1
                              • Instruction ID: c6398c0d2677a107bc5cc275a732ac9e3618e5b4035c8d978730a8213cd57aad
                              • Opcode Fuzzy Hash: e858ce1946aa5aeb29267121d305216855a60f467b9ae769e16d1ca254c9e5e1
                              • Instruction Fuzzy Hash: 23D0C97490421E8BDB54DA50CC40BAEB776BB95300F005595814AB7380DA3499829B15
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4c0af6d5142db93ee78e17e5ddc0210ed8255b09a1e237b688b51124435d2e76
                              • Instruction ID: 1f572b8061e535866cd6e2a97cfd64b3a70258fa4fd7cb6999c32219b20f11a1
                              • Opcode Fuzzy Hash: 4c0af6d5142db93ee78e17e5ddc0210ed8255b09a1e237b688b51124435d2e76
                              • Instruction Fuzzy Hash: 1DD0C974D0021D8BDB10DF50CD40BAEB775BF44300F0490D98109B3240DB746D82CF18
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0c916677aad2304745289b3e7ebb836c38797b58d29083a9cdfa9e31521a299c
                              • Instruction ID: 2da75413536bfed86de6640a11a495d3f6ff5b985a9e4ceb42762dfd225feb9f
                              • Opcode Fuzzy Hash: 0c916677aad2304745289b3e7ebb836c38797b58d29083a9cdfa9e31521a299c
                              • Instruction Fuzzy Hash: 2AC002B4E0426D8FDB20DFA1C850BAEB67ABB55300F1456DA8609B7240E730A9839F19
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fb877ed5064c40500a8e891949442ef4e049a0fd5ae7fae474768a415ae4def1
                              • Instruction ID: aec30889e89d3369515fffaf3423fd79f457d69cb86a5c70449f16eab08e58b8
                              • Opcode Fuzzy Hash: fb877ed5064c40500a8e891949442ef4e049a0fd5ae7fae474768a415ae4def1
                              • Instruction Fuzzy Hash: BBC012B890022C8BDB10DFA0CC40BAEB776BB84300F0494D9810AB3240DA30AE829F15
                              Memory Dump Source
                              • Source File: 0000000D.00000002.2095132839.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_4cd0000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9ea0e50666c560fd37989b1453c979fff092cd8d713080d32a3789a27c7a0c82
                              • Instruction ID: c5e53608c1a51623b1df928d573b8d3e21fbe4acc14b23193656f5bf127b17f0
                              • Opcode Fuzzy Hash: 9ea0e50666c560fd37989b1453c979fff092cd8d713080d32a3789a27c7a0c82
                              • Instruction Fuzzy Hash: D5C08C61902912CBDB60C667CD0030AB9A2AB862A0F0897C1021AF91A4F274C9828E10
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2075241634.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_1220000_efthfxj.jbxd
                              Similarity
                              • API ID:
                              • String ID: daq
                              • API String ID: 0-1532007458
                              • Opcode ID: dd6c4e0bde177d62c3aefbf13465b6e8ce50a4614d33af36b607e9182dbe16ed
                              • Instruction ID: 724d9c3fbef35f874c8b81063b2f9a3cd75694014c6d31b89db0dee8f48a5440
                              • Opcode Fuzzy Hash: dd6c4e0bde177d62c3aefbf13465b6e8ce50a4614d33af36b607e9182dbe16ed
                              • Instruction Fuzzy Hash: DD82A174A10229CFCB24DF68D984BDDBBB5FF49304F1082AAD409AB265D770AE85CF50