Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IEW113_2311a.exe

Overview

General Information

Sample name:IEW113_2311a.exe
Analysis ID:1540035
MD5:1bb2447f9ae84781bcfa73eda1606d72
SHA1:6c875dd5404a67ceb1d3aee207be4286cbd8dd93
SHA256:45f839521bdf4ebfeb32d8dd17ea33133e3c7ae67c6859380bea02cf56cf30f6
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:20%

Compliance

Score:49
Range:0 - 100

Signatures

Creates files in the system32 config directory
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the driver directory
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Driver Install by pnputil.exe
Sigma detected: Suspicious Execution From GUID Like Folder Names
Stores files to the Windows start menu directory
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • IEW113_2311a.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\IEW113_2311a.exe" MD5: 1BB2447F9AE84781BCFA73EDA1606D72)
    • IEW113_2311a.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi MD5: 1BB2447F9AE84781BCFA73EDA1606D72)
      • msiexec.exe (PID: 7440 cmdline: "C:\Windows\System32\msiexec.exe" /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7536 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7580 cmdline: C:\Windows\System32\MsiExec.exe -Embedding 87308A77B4DC65560968A93A1904E71A C MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7824 cmdline: C:\Windows\System32\MsiExec.exe -Embedding 026172C647FCA3CC45C109DD1CF65201 MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7860 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 1F622DA67DE9472AD76099B184CCC342 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 7944 cmdline: C:\Windows\System32\MsiExec.exe -Embedding 41D4778385EEC697935AEB0EB737BBE8 E Global\MSI0000 MD5: E5DA170027542E25EDE42FC54C929077)
      • cmd.exe (PID: 7980 cmdline: cmd /c pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • pnputil.exe (PID: 8044 cmdline: pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install MD5: DE03AC6962C0655E6F769F881295DE3F)
  • drvinst.exe (PID: 8120 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.inf" "9" "40c79f59f" "000000000000015C" "WinSta0\Default" "0000000000000168" "208" "C:\Program Files\Sony\Imaging Edge Webcam\Driver" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • rundll32.exe (PID: 8152 cmdline: rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} Global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Hai Vaknin @LuxNoBulIshit, Avihay eldad @aloneliassaf, Austin Songer @austinsonger: Data: Command: pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install, CommandLine: pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install, CommandLine|base64offset|contains: zn), Image: C:\Windows\System32\pnputil.exe, NewProcessName: C:\Windows\System32\pnputil.exe, OriginalFileName: C:\Windows\System32\pnputil.exe, ParentCommandLine: cmd /c pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7980, ParentProcessName: cmd.exe, ProcessCommandLine: pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install, ProcessId: 8044, ProcessName: pnputil.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi, CommandLine: "C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\IEW113_2311a.exe, NewProcessName: C:\Users\user\Desktop\IEW113_2311a.exe, OriginalFileName: C:\Users\user\Desktop\IEW113_2311a.exe, ParentCommandLine: "C:\Users\user\Desktop\IEW113_2311a.exe", ParentImage: C:\Users\user\Desktop\IEW113_2311a.exe, ParentProcessId: 7324, ParentProcessName: IEW113_2311a.exe, ProcessCommandLine: "C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi, ProcessId: 7408, ProcessName: IEW113_2311a.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Compliance

barindex
Source: IEW113_2311a.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\SonyJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge WebcamJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\default.jpgJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\EULA.rtfJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\webcam_help.icoJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\DriverJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\imagingedgewebcam.catJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.infJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\ImagingEdgeWebcamLauncher.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\License.txtJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapterJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_USB.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\libusb-1.0.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_WIA.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjCore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\msvcp140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\mfc140u.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\mfcm140u.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\EULA.rtfJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\License.txtJump to behavior
Source: IEW113_2311a.exeStatic PE information: certificate valid
Source: IEW113_2311a.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\uica.pdb source: SetupIEW.msi.0.dr, 3b1c81.msi.3.dr
Source: Binary string: MFCM140U.amd64.pdb source: mfcm140u.dll.3.dr
Source: Binary string: msvcp140.amd64.pdb source: msvcp140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Installer\Installer\bin\x64\Release\IDCCustomProc\IDCCustomProc.pdb source: SetupIEW.msi.0.dr, MSI239A.tmp.3.dr, MSI1F71.tmp.3.dr, MSIF12C.tmp.2.dr, MSI1E56.tmp.3.dr, MSIF18A.tmp.2.dr, 3b1c81.msi.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_WIA.pdb source: Lja_PTP_WIA.dll.3.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.dr
Source: Binary string: msvcp140.amd64.pdbGCTL source: msvcp140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_WIA.pdb>*$GCTL source: Lja_PTP_WIA.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\obj\x64\Release\x64\Release\ImagingEdgeWebcamLauncher.pdb source: ImagingEdgeWebcamLauncher.exe.3.dr
Source: Binary string: mfc140u.amd64.pdb source: mfc140u.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Installer\Installer\bin\x64\Release\IDCCustomProc\IDCCustomProc.pdbG5#GCTL source: SetupIEW.msi.0.dr, MSI239A.tmp.3.dr, MSI1F71.tmp.3.dr, MSIF12C.tmp.2.dr, MSI1E56.tmp.3.dr, MSIF18A.tmp.2.dr, 3b1c81.msi.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\Driver\ImagingEdgeWebcam.pdb source: pnputil.exe, 0000000B.00000002.4180572792.0000023325EA7000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1880800954.000001DD9B391000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1876395031.000001DD9AE6D000.00000004.00000020.00020000.00000000.sdmp, ImagingEdgeWebcam.dll.3.dr, SET27EC.tmp.13.dr, SET2618.tmp.11.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_USB.pdb source: Lja_PTP_USB.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\Driver\ImagingEdgeWebcam_Driver.pdb source: pnputil.exe, 0000000B.00000002.4180572792.0000023325E2D000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000002.4180561913.000001DD9AEF0000.00000004.00000020.00020000.00000000.sdmp, ImagingEdgeWebcam_Driver.dll.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr
Source: Binary string: mfc140u.amd64.pdbGCTL source: mfc140u.dll.3.dr
Source: Binary string: vcruntime140.amd64.pdbGCTL source: vcruntime140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_USB.pdb?+#GCTL source: Lja_PTP_USB.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjCore.pdb source: LjCore.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\USBReset.pdb source: USBReset.exe.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\Webcam.pdb3.*GCTL source: Webcam.exe.3.dr
Source: Binary string: PackmanExtractor.pdb source: IEW113_2311a.exe
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\Driver\ImagingEdgeWebcam.pdbee source: pnputil.exe, 0000000B.00000002.4180572792.0000023325EA7000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1880800954.000001DD9B391000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1876395031.000001DD9AE6D000.00000004.00000020.00020000.00000000.sdmp, ImagingEdgeWebcam.dll.3.dr, SET27EC.tmp.13.dr, SET2618.tmp.11.dr
Source: Binary string: C:\Users\SDNA\Desktop\libusb\libusb\lib\Release\libusb-1.0.pdb source: libusb-1.0.dll.3.dr
Source: Binary string: vcruntime140.amd64.pdb source: vcruntime140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\Webcam.pdb source: Webcam.exe.3.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1B2C0 FindFirstFileW,FindClose,0_2_00D1B2C0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1E890 GetSystemTime,SystemTimeToFileTime,FindFirstFileW,FindNextFileW,FindClose,GetLastError,0_2_00D1E890
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D15BD0 FindFirstFileW,CompareStringW,FindNextFileW,GetLastError,FindClose,CompareStringW,0_2_00D15BD0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1B350 _wcsrchr,FindFirstFileW,DeleteFileW,GetLastError,GetFileAttributesW,SetFileAttributesW,DeleteFileW,FindNextFileW,GetLastError,FindClose,RemoveDirectoryW,0_2_00D1B350
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D24350 _wcsrchr,FindFirstFileW,FindNextFileW,GetLastError,0_2_00D24350
Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknownDNS traffic detected: query: 56.163.245.4.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: global trafficDNS traffic detected: DNS query: 56.163.245.4.in-addr.arpa
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: rundll32.exe, 0000000E.00000002.4181972577.00000221F9679000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0DO
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: drvinst.exe, 0000000D.00000003.1877018608.000001DD9AE6A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1876427804.000001DD9AE6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCer
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crlhttp://crl4.digicert.co
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.4180898661.00000221F9467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1876395031.000001DD9AE6D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1882608934.00000221F943D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.4180898661.00000221F9425000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.4180898661.00000221F9467000.00000004.00000020.00020000.00000000.sdmp, IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl:
Source: drvinst.exe, 0000000D.00000002.4180561913.000001DD9AE93000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crlB
Source: rundll32.exe, 0000000E.00000002.4180898661.00000221F93F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crlE4
Source: drvinst.exe, 0000000D.00000002.4180561913.000001DD9AE93000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crlH
Source: drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crlV
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crln
Source: drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crlt
Source: drvinst.exe, 0000000D.00000002.4180561913.000001DD9AE93000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
Source: LjCore.dll.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: drvinst.exe, 0000000D.00000002.4180561913.000001DD9AE93000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl9
Source: drvinst.exe, 0000000D.00000002.4180561913.000001DD9AE93000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crlH
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crlq
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: drvinst.exe, 0000000D.00000002.4180561913.000001DD9AE93000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: libusb-1.0.dll.3.drString found in binary or memory: http://libusb.info
Source: libusb-1.0.dll.3.drString found in binary or memory: http://libusb.infoneed
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
Source: drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxL
Source: drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxX
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://ocsp.digicert.com0
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://ocsp.digicert.com0A
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, MSI1F71.tmp.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0C
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://ocsp.digicert.com0K
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://ocsp.digicert.com0N
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://ocsp.digicert.com0O
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://ocsp.digicert.com0X
Source: drvinst.exe, 0000000D.00000002.4180561913.000001DD9AE93000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com1.3.6.1.5.5.7.48.2http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRS
Source: drvinst.exe, 0000000D.00000003.1879279442.000001DD9AEAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comB
Source: drvinst.exe, 0000000D.00000003.1881142044.000001DD9AEA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digice
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: http://wixtoolset.org
Source: IEW113_2311a.exe, libusb-1.0.dll.3.dr, SetupIEW.msi.0.dr, SET25F7.tmp.11.dr, ImagingEdgeWebcam_Driver.dll.3.dr, ImagingEdgeWebcam.dll.3.dr, imagingedgewebcam.cat.3.dr, SET27EC.tmp.13.dr, ImagingEdgeWebcamLauncher.exe.3.dr, Webcam.exe.3.dr, Lja_PTP_USB.dll.3.dr, SET27DC.tmp.13.dr, SET2618.tmp.11.dr, Lja_PTP_WIA.dll.3.dr, 3b1c81.msi.3.dr, USBReset.exe.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr, LjCore.dll.3.drString found in binary or memory: http://www.digicert.com/CPS0
Source: libusb-1.0.dll.3.drString found in binary or memory: http://www.gnu.org/licenses/lgpl-2.1.htmlF
Source: License.txt.3.drString found in binary or memory: https://github.com/microsoft/Windows-driver-samples)
Source: SetupIEW.msi.0.dr, 3b1c81.msi.3.drString found in binary or memory: https://oss.sony.net/Products/Linux/
Source: MSI1F71.tmp.3.drString found in binary or memory: https://support.d-imaging.sony.co.jp/app/webcam/l/instruction/index.php
Source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Windows\System32\pnputil.exeFile created: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET25F7.tmpJump to dropped file
Source: C:\Windows\System32\pnputil.exeFile created: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.cat (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27DC.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3b1c81.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1E56.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1EC5.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{77F8518A-144A-4DB2-80EB-C544B68375EE}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1F71.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1F92.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI239A.tmpJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\INF\c_camera.PNFJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\ExplorerJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_96.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_256.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_768.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1280.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1920.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_2560.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_sr.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_exif.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_custom_stream.dbJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI1E56.tmpJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D2A3600_2_00D2A360
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D154800_2_00D15480
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D20AC00_2_00D20AC0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D350700_2_00D35070
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D3A1720_2_00D3A172
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D3E27B0_2_00D3E27B
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D2BED00_2_00D2BED0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D32EAF0_2_00D32EAF
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: String function: 00D42480 appears 39 times
Source: IEW113_2311a.exe, 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePackmanExtractor.exe. vs IEW113_2311a.exe
Source: IEW113_2311a.exe, 00000001.00000002.4180804615.0000000000D57000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePackmanExtractor.exe. vs IEW113_2311a.exe
Source: IEW113_2311a.exeBinary or memory string: OriginalFilenamePackmanExtractor.exe. vs IEW113_2311a.exe
Source: IEW113_2311a.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus24.evad.winEXE@22/71@2/0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1A830 GetModuleHandleW,GetProcAddress,GetDiskFreeSpaceExW,GetModuleFileNameW,0_2_00D1A830
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D2BED0 ResetEvent,WaitForMultipleObjects,ResetEvent,CreateToolhelp32Snapshot,GetLastError,WaitForMultipleObjects,ResetEvent,WaitForSingleObject,Process32FirstW,Process32NextW,CloseHandle,__dtol3,__dtol3,EnterCriticalSection,CloseHandle,LeaveCriticalSection,WaitForMultipleObjects,EnterCriticalSection,LeaveCriticalSection,WaitForMultipleObjects,WaitForMultipleObjects,WaitForMultipleObjects,ResetEvent,EnterCriticalSection,LeaveCriticalSection,SetEvent,ResetEvent,ResetEvent,CloseHandle,0_2_00D2BED0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D21BF0 GetWindowLongW,SetWindowLongW,SetWindowLongW,SetWindowLongW,SetWindowPos,GetSystemMenu,EnableMenuItem,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,LoadImageW,LoadImageW,LoadImageW,SendMessageW,SendMessageW,SendMessageW,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetDlgItem,GetDlgItem,IsWindow,SendMessageW,SendMessageW,CoCreateInstance,KiUserCallbackDispatcher,SetTimer,ShowWindow,SetForegroundWindow,ResetEvent,0_2_00D21BF0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D235D0 CreateCompatibleDC,EnumFontFamiliesExW,DeleteDC,FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GlobalFree,GlobalUnlock,GlobalUnlock,0_2_00D235D0
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\SonyJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7988:120:WilError_03
Source: C:\Users\user\Desktop\IEW113_2311a.exeFile created: C:\Users\user\AppData\Local\Temp\SPackToolJump to behavior
Source: IEW113_2311a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\IEW113_2311a.exeFile read: C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Support\Settings.iniJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} Global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat
Source: C:\Users\user\Desktop\IEW113_2311a.exeFile read: C:\Users\user\Desktop\IEW113_2311a.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\IEW113_2311a.exe "C:\Users\user\Desktop\IEW113_2311a.exe"
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess created: C:\Users\user\Desktop\IEW113_2311a.exe "C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 87308A77B4DC65560968A93A1904E71A C
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 026172C647FCA3CC45C109DD1CF65201
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 1F622DA67DE9472AD76099B184CCC342
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 41D4778385EEC697935AEB0EB737BBE8 E Global\MSI0000
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\cmd.exe cmd /c pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\pnputil.exe pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
Source: unknownProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.inf" "9" "40c79f59f" "000000000000015C" "WinSta0\Default" "0000000000000168" "208" "C:\Program Files\Sony\Imaging Edge Webcam\Driver"
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} Global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess created: C:\Users\user\Desktop\IEW113_2311a.exe "C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msiJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 87308A77B4DC65560968A93A1904E71A CJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 026172C647FCA3CC45C109DD1CF65201Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 1F622DA67DE9472AD76099B184CCC342Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 41D4778385EEC697935AEB0EB737BBE8 E Global\MSI0000Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\cmd.exe cmd /c pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /installJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\pnputil.exe pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /installJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} Global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.catJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: riched20.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: usp10.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\pnputil.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\pnputil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\pnputil.exeSection loaded: drvstore.dllJump to behavior
Source: C:\Windows\System32\pnputil.exeSection loaded: drvsetup.dllJump to behavior
Source: C:\Windows\System32\pnputil.exeSection loaded: devrtl.dllJump to behavior
Source: C:\Windows\System32\pnputil.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: pnpui.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeFile written: C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Support\Settings.iniJump to behavior
Source: C:\Windows\System32\msiexec.exeAutomated click: Next
Source: C:\Windows\System32\msiexec.exeAutomated click: Agree
Source: C:\Windows\System32\msiexec.exeAutomated click: Next
Source: C:\Windows\System32\msiexec.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: C:\Windows\System32\rundll32.exeAutomated click: Install
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\SonyJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge WebcamJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\default.jpgJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\EULA.rtfJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\webcam_help.icoJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\DriverJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\imagingedgewebcam.catJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.infJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\ImagingEdgeWebcamLauncher.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\License.txtJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapterJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_USB.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\libusb-1.0.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_WIA.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\LjCore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\msvcp140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\vcruntime140.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\mfc140u.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\mfcm140u.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exeJump to behavior
Source: IEW113_2311a.exeStatic PE information: certificate valid
Source: IEW113_2311a.exeStatic file information: File size 5302512 > 1048576
Source: IEW113_2311a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: IEW113_2311a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: IEW113_2311a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: IEW113_2311a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: IEW113_2311a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: IEW113_2311a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: IEW113_2311a.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: IEW113_2311a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\uica.pdb source: SetupIEW.msi.0.dr, 3b1c81.msi.3.dr
Source: Binary string: MFCM140U.amd64.pdb source: mfcm140u.dll.3.dr
Source: Binary string: msvcp140.amd64.pdb source: msvcp140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Installer\Installer\bin\x64\Release\IDCCustomProc\IDCCustomProc.pdb source: SetupIEW.msi.0.dr, MSI239A.tmp.3.dr, MSI1F71.tmp.3.dr, MSIF12C.tmp.2.dr, MSI1E56.tmp.3.dr, MSIF18A.tmp.2.dr, 3b1c81.msi.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_WIA.pdb source: Lja_PTP_WIA.dll.3.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: MSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.dr
Source: Binary string: msvcp140.amd64.pdbGCTL source: msvcp140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_WIA.pdb>*$GCTL source: Lja_PTP_WIA.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\obj\x64\Release\x64\Release\ImagingEdgeWebcamLauncher.pdb source: ImagingEdgeWebcamLauncher.exe.3.dr
Source: Binary string: mfc140u.amd64.pdb source: mfc140u.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Installer\Installer\bin\x64\Release\IDCCustomProc\IDCCustomProc.pdbG5#GCTL source: SetupIEW.msi.0.dr, MSI239A.tmp.3.dr, MSI1F71.tmp.3.dr, MSIF12C.tmp.2.dr, MSI1E56.tmp.3.dr, MSIF18A.tmp.2.dr, 3b1c81.msi.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\Driver\ImagingEdgeWebcam.pdb source: pnputil.exe, 0000000B.00000002.4180572792.0000023325EA7000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1880800954.000001DD9B391000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1876395031.000001DD9AE6D000.00000004.00000020.00020000.00000000.sdmp, ImagingEdgeWebcam.dll.3.dr, SET27EC.tmp.13.dr, SET2618.tmp.11.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_USB.pdb source: Lja_PTP_USB.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\Driver\ImagingEdgeWebcam_Driver.pdb source: pnputil.exe, 0000000B.00000002.4180572792.0000023325E2D000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000002.4180561913.000001DD9AEF0000.00000004.00000020.00020000.00000000.sdmp, ImagingEdgeWebcam_Driver.dll.3.dr, SET27FD.tmp.13.dr, SET2638.tmp.11.dr
Source: Binary string: mfc140u.amd64.pdbGCTL source: mfc140u.dll.3.dr
Source: Binary string: vcruntime140.amd64.pdbGCTL source: vcruntime140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjAdapter\Lja_PTP_USB.pdb?+#GCTL source: Lja_PTP_USB.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\LjCore.pdb source: LjCore.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\USBReset.pdb source: USBReset.exe.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\Webcam.pdb3.*GCTL source: Webcam.exe.3.dr
Source: Binary string: PackmanExtractor.pdb source: IEW113_2311a.exe
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\Driver\ImagingEdgeWebcam.pdbee source: pnputil.exe, 0000000B.00000002.4180572792.0000023325EA7000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1880800954.000001DD9B391000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.1876395031.000001DD9AE6D000.00000004.00000020.00020000.00000000.sdmp, ImagingEdgeWebcam.dll.3.dr, SET27EC.tmp.13.dr, SET2618.tmp.11.dr
Source: Binary string: C:\Users\SDNA\Desktop\libusb\libusb\lib\Release\libusb-1.0.pdb source: libusb-1.0.dll.3.dr
Source: Binary string: vcruntime140.amd64.pdb source: vcruntime140.dll.3.dr
Source: Binary string: D:\ohshima\sony\iew\IEW_win\Application\bin\x64\Release\App\Webcam.pdb source: Webcam.exe.3.dr
Source: IEW113_2311a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: IEW113_2311a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: IEW113_2311a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: IEW113_2311a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: IEW113_2311a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: ImagingEdgeWebcamLauncher.exe.3.drStatic PE information: 0xE7A7E0D0 [Fri Feb 27 02:09:20 2093 UTC]
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D11120 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,0_2_00D11120
Source: ImagingEdgeWebcam.dll.3.drStatic PE information: section name: _RDATA
Source: ImagingEdgeWebcam_Driver.dll.3.drStatic PE information: section name: _RDATA
Source: msvcp140.dll.3.drStatic PE information: section name: .didat
Source: mfc140u.dll.3.drStatic PE information: section name: .didat
Source: mfcm140u.dll.3.drStatic PE information: section name: .nep
Source: SET2618.tmp.11.drStatic PE information: section name: _RDATA
Source: SET2638.tmp.11.drStatic PE information: section name: _RDATA
Source: SET27EC.tmp.13.drStatic PE information: section name: _RDATA
Source: SET27FD.tmp.13.drStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D424C6 push ecx; ret 0_2_00D424D9

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\ExplorerJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_96.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_256.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_768.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1280.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1920.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_2560.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_sr.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_exif.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.dbJump to behavior
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_custom_stream.dbJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_USB.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\LjCore.dllJump to dropped file
Source: C:\Windows\System32\pnputil.exeFile created: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2638.tmpJump to dropped file
Source: C:\Windows\System32\pnputil.exeFile created: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.dll (copy)Jump to dropped file
Source: C:\Windows\System32\pnputil.exeFile created: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.dll (copy)Jump to dropped file
Source: C:\Windows\System32\pnputil.exeFile created: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2618.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF12C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF18A.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\mfc140u.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\libusb-1.0.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27FD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_WIA.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\msvcp140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI239A.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\ImagingEdgeWebcamLauncher.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.dll (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1E56.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1F92.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\mfcm140u.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\vcruntime140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1EC5.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27EC.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI239A.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.dll (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1E56.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1F92.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1EC5.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27EC.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27FD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\EULA.rtfJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Sony\Imaging Edge Webcam\License.txtJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Imaging Edge WebcamJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D20AC0 KiUserCallbackDispatcher,ShowWindow,IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetModuleHandleW,GetProcAddress,GetCommandLineW,SetEvent,SetWindowTextW,SetDlgItemTextW,SetDlgItemTextW,SendMessageW,KillTimer,IsWindow,KiUserCallbackDispatcher,GetSystemMenu,EnableMenuItem,SetDlgItemTextW,ShowWindow,ShowWindow,IsWindow,EnableWindow,GetSystemMenu,EnableMenuItem,SetDlgItemTextW,IsWindow,EnableWindow,GetSystemMenu,EnableMenuItem,SetDlgItemTextW,ShowWindow,SetEvent,0_2_00D20AC0
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\pnputil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\pnputil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: IEW113_2311a.exeBinary or memory string: UA0UALPK.DLLUSP10.DLLVERSION.DLLUSER32.DLLOLE32.DLLOLEAUT32.DLLMSVCRT.DLLSHLWAPI.DLLGDI32.DLLURLMON.DLLWININET.DLLIMAGEHLP.DLLWLDAP32.DLLCRYPT32.DLLIMM32.DLLCOMRES.DLLXPSP2RES.DLLWS2HELP.DLLCABINET.DLLSAMLIB.DLLUXTHEME.DLLMSCTF.DLLMSASN1.DLLCLBCATQ.DLLNETAPI32.DLLRSAENH.DLLAPPHELP.DLLMSXML3.DLLSETUPAPI.DLLMSCTFIME.IMEIMJP81.IMEIMJP81K.DLLIMJP9K.DLLIMJP10K.DLLIMJP12K.DLLIMJP14K.DLL..\IME\IMJP8_1\DICTS\IMJPCD.DICWINTRUST.DLLRICHED20.DLLCRYPTUI.DLLSHDOCVW.DLLMLANG.DLLWS2_32.DLLUSERENV.DLLPSAPI.DLLSENSAPI.DLLWINHTTP.DLLCRYPTNET.DLLWBEM\WBEMCOMN.DLLWBEM\WBEMPROX.DLLWBEM\WBEMSVC.DLLMSVCP60.DLLDNSAPI.DLLNTDSAPI.DLLHNETCFG.DLLWINMM.DLLRTUTILS.DLLTAPI32.DLLRASMAN.DLLRASAPI32.DLLWBEM\FASTPROX.DLLNTMARTA.DLLRASADHLP.DLLMPR.DLLCOMDLG32.DLLSHDOCLC.DLLCSCDLL.DLLBROWSEUI.DLLATL.DLLNTSHRUI.DLLLINKINFO.DLLDRPROV.DLLMYDOCS.DLLCSCUI.DLLNETRAP.DLLNETUI0.DLLNETUI1.DLLNTLANMAN.DLLDAVCLNT.DLLSHGINA.DLLODBCINT.DLLODBC32.DLLMSGINA.DLLWINSTA.DLLMSTASK.DLLWSOCK32.DLLWEBCHECK.DLLOCCACHE.DLLADSLDPC.DLLACTIVEDS.DLLTWEXT.DLLWIASHEXT.DLLBCRYPT.DLLNSI.DLLIME\SHARED\IMETIP.DLLIME\SHARED\IMECFM.DLLIME\IMEJP10\IMJPAPI.DLLIME\SHARED\IMJKAPI.DLLIME\SHARED\IMEAPIS.DLLIERTUTIL.DLLPROPSYS.DLLOLEACC.DLLIME\IMEJP10\IMJPTIP.DLLSLC.DLLGPAPI.DLLNCRYPT.DLLWINNSI.DLLDHCPCSVC6.DLLDHCPCSVC.DLLIPHLPAPI.DLLNORMALIZ.DLLWINDOWSCODECS.DLLDUSER.DLLXMLLITE.DLLCSCAPI.DLLPORTABLEDEVICEAPI.DLLWMASF.DLLNETWORKITEMFACTORY.DLLNPMPROXY.DLLACTXPRXY.DLLMSSPRXY.DLLNETWORKEXPLORER.DLLWPDSHEXT.DLLWMVCORE.DLLAUDIODEV.DLLFIREWALLAPI.DLLDTSH.DLLSXS.DLLEXPLORERFRAME.DLLIEFRAME.DLLDWMAPI.DLLCRYPTBASE.DLLCRYPTSP.DLLRPCRTREMOTE.DLLWBEMCOMN.DLLPROFAPI.DLLSSPICLI.DLLDUI70.DLLEXPLORERFRAME.DLLDEVOBJ.DLLCFGMGR32.DLLAUTHZ.DLLPEERDIST.DLLWEBIO.DLLSECUR32.DLLEHSTORSHELL.DLLNETUTILS.DLLMSXML6.DLLWKSCLI.DLLEHSTORAPI.DLLSRVCLI.DLLSAMCLI.DLLSEARCHFOLDER.DLLSTRUCTUREDQUERY.DLLMAPI32.DLLTQUERY.DLLDAVHLPR.DLLMSSVP.DLLAPI-MS-WIN-CORE-SYNCH-L1-2-0.DLLAPI-MS-WIN-CORE-FIBERS-L1-1-1.DLLAPI-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLLAPI-MS-WIN-APPMODEL-RUNTIME-L1-1-1.DLLEXT-MS-WIN-KERNEL32-PACKAGE-CURRENT-L1-1-0.DLLIMAGERES.DLLMSFTE.DLLMSTRACER.DLLSETDEFAULTDLLDIRECTORIES
Source: IEW113_2311a.exe, 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmp, IEW113_2311a.exe, 00000000.00000000.1705523045.0000000000D47000.00000002.00000001.01000000.00000003.sdmp, IEW113_2311a.exe, 00000001.00000000.1729480468.0000000000D47000.00000002.00000001.01000000.00000003.sdmp, IEW113_2311a.exe, 00000001.00000002.4180630000.0000000000D47000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LPK.DLLUSP10.DLLVERSION.DLLUSER32.DLLOLE32.DLLOLEAUT32.DLLMSVCRT.DLLSHLWAPI.DLLGDI32.DLLURLMON.DLLWININET.DLLIMAGEHLP.DLLWLDAP32.DLLCRYPT32.DLLIMM32.DLLCOMRES.DLLXPSP2RES.DLLWS2HELP.DLLCABINET.DLLSAMLIB.DLLUXTHEME.DLLMSCTF.DLLMSASN1.DLLCLBCATQ.DLLNETAPI32.DLLRSAENH.DLLAPPHELP.DLLMSXML3.DLLSETUPAPI.DLLMSCTFIME.IMEIMJP81.IMEIMJP81K.DLLIMJP9K.DLLIMJP10K.DLLIMJP12K.DLLIMJP14K.DLL..\IME\IMJP8_1\DICTS\IMJPCD.DICWINTRUST.DLLRICHED20.DLLCRYPTUI.DLLSHDOCVW.DLLMLANG.DLLWS2_32.DLLUSERENV.DLLPSAPI.DLLSENSAPI.DLLWINHTTP.DLLCRYPTNET.DLLWBEM\WBEMCOMN.DLLWBEM\WBEMPROX.DLLWBEM\WBEMSVC.DLLMSVCP60.DLLDNSAPI.DLLNTDSAPI.DLLHNETCFG.DLLWINMM.DLLRTUTILS.DLLTAPI32.DLLRASMAN.DLLRASAPI32.DLLWBEM\FASTPROX.DLLNTMARTA.DLLRASADHLP.DLLMPR.DLLCOMDLG32.DLLSHDOCLC.DLLCSCDLL.DLLBROWSEUI.DLLATL.DLLNTSHRUI.DLLLINKINFO.DLLDRPROV.DLLMYDOCS.DLLCSCUI.DLLNETRAP.DLLNETUI0.DLLNETUI1.DLLNTLANMAN.DLLDAVCLNT.DLLSHGINA.DLLODBCINT.DLLODBC32.DLLMSGINA.DLLWINSTA.DLLMSTASK.DLLWSOCK32.DLLWEBCHECK.DLLOCCACHE.DLLADSLDPC.DLLACTIVEDS.DLLTWEXT.DLLWIASHEXT.DLLBCRYPT.DLLNSI.DLLIME\SHARED\IMETIP.DLLIME\SHARED\IMECFM.DLLIME\IMEJP10\IMJPAPI.DLLIME\SHARED\IMJKAPI.DLLIME\SHARED\IMEAPIS.DLLIERTUTIL.DLLPROPSYS.DLLOLEACC.DLLIME\IMEJP10\IMJPTIP.DLLSLC.DLLGPAPI.DLLNCRYPT.DLLWINNSI.DLLDHCPCSVC6.DLLDHCPCSVC.DLLIPHLPAPI.DLLNORMALIZ.DLLWINDOWSCODECS.DLLDUSER.DLLXMLLITE.DLLCSCAPI.DLLPORTABLEDEVICEAPI.DLLWMASF.DLLNETWORKITEMFACTORY.DLLNPMPROXY.DLLACTXPRXY.DLLMSSPRXY.DLLNETWORKEXPLORER.DLLWPDSHEXT.DLLWMVCORE.DLLAUDIODEV.DLLFIREWALLAPI.DLLDTSH.DLLSXS.DLLEXPLORERFRAME.DLLIEFRAME.DLLDWMAPI.DLLCRYPTBASE.DLLCRYPTSP.DLLRPCRTREMOTE.DLLWBEMCOMN.DLLPROFAPI.DLLSSPICLI.DLLDUI70.DLLEXPLORERFRAME.DLLDEVOBJ.DLLCFGMGR32.DLLAUTHZ.DLLPEERDIST.DLLWEBIO.DLLSECUR32.DLLEHSTORSHELL.DLLNETUTILS.DLLMSXML6.DLLWKSCLI.DLLEHSTORAPI.DLLSRVCLI.DLLSAMCLI.DLLSEARCHFOLDER.DLLSTRUCTUREDQUERY.DLLMAPI32.DLLTQUERY.DLLDAVHLPR.DLLMSSVP.DLLAPI-MS-WIN-CORE-SYNCH-L1-2-0.DLLAPI-MS-WIN-CORE-FIBERS-L1-1-1.DLLAPI-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLLAPI-MS-WIN-APPMODEL-RUNTIME-L1-1-1.DLLEXT-MS-WIN-KERNEL32-PACKAGE-CURRENT-L1-1-0.DLLIMAGERES.DLLMSFTE.DLLMSTRACER.DLLSETDEFAULTDLLDIRECTORIES
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_USB.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\LjCore.dllJump to dropped file
Source: C:\Windows\System32\pnputil.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2638.tmpJump to dropped file
Source: C:\Windows\System32\pnputil.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.dll (copy)Jump to dropped file
Source: C:\Windows\System32\pnputil.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.dll (copy)Jump to dropped file
Source: C:\Windows\System32\pnputil.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2618.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF12C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF18A.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\mfc140u.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.dll (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\libusb-1.0.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27FD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_WIA.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI239A.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\ImagingEdgeWebcamLauncher.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.dll (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1E56.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1F92.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\mfcm140u.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1EC5.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27EC.tmpJump to dropped file
Source: C:\Users\user\Desktop\IEW113_2311a.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-23399
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1B2C0 FindFirstFileW,FindClose,0_2_00D1B2C0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1E890 GetSystemTime,SystemTimeToFileTime,FindFirstFileW,FindNextFileW,FindClose,GetLastError,0_2_00D1E890
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D15BD0 FindFirstFileW,CompareStringW,FindNextFileW,GetLastError,FindClose,CompareStringW,0_2_00D15BD0
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1B350 _wcsrchr,FindFirstFileW,DeleteFileW,GetLastError,GetFileAttributesW,SetFileAttributesW,DeleteFileW,FindNextFileW,GetLastError,FindClose,RemoveDirectoryW,0_2_00D1B350
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D24350 _wcsrchr,FindFirstFileW,FindNextFileW,GetLastError,0_2_00D24350
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D42E23 VirtualQuery,GetSystemInfo,0_2_00D42E23
Source: setupapi.dev.log.11.drBinary or memory string: sig: Key = vmci.inf
Source: setupapi.dev.log.11.drBinary or memory string: dvs: {Driver Setup Import Driver Package: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.178
Source: setupapi.dev.log.11.drBinary or memory string: idb: Activating driver package 'vmci.inf_amd64_68ed49469341f563'.
Source: setupapi.dev.log.11.drBinary or memory string: cpy: Published 'vmci.inf_amd64_68ed49469341f563\vmci.inf' to 'oem2.inf'.
Source: setupapi.dev.log.11.drBinary or memory string: inf: {Add Service: vmci}
Source: setupapi.dev.log.11.drBinary or memory string: inf: Created new service 'vmci'.
Source: setupapi.dev.log.11.drBinary or memory string: inf: Display Name = VMware VMCI Bus Driver
Source: setupapi.dev.log.11.drBinary or memory string: inf: Service Name = vmci
Source: setupapi.dev.log.11.drBinary or memory string: idb: {Publish Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf} 11:48:39.707
Source: setupapi.dev.log.11.drBinary or memory string: idb: Indexed 4 device IDs for 'vmci.inf_amd64_68ed49469341f563'.
Source: setupapi.dev.log.11.drBinary or memory string: utl: Driver INF - oem2.inf (C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf)
Source: setupapi.dev.log.11.drBinary or memory string: sto: {Configure Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf}
Source: setupapi.dev.log.11.drBinary or memory string: sto: {Stage Driver Package: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.634
Source: setupapi.dev.log.11.drBinary or memory string: sig: Installed catalog 'vmci.cat' as 'oem2.cat'.
Source: setupapi.dev.log.11.drBinary or memory string: cpy: Target Path = C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563
Source: setupapi.dev.log.11.drBinary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.inf' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.inf'.
Source: IEW113_2311a.exe, 00000000.00000002.4180646421.00000000007CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\iasQ
Source: setupapi.dev.log.11.drBinary or memory string: sig: FilePath = C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.inf
Source: setupapi.dev.log.11.drBinary or memory string: inf: {Configure Driver Configuration: vmci.install.x64.NT}
Source: setupapi.dev.log.11.drBinary or memory string: idb: Created driver package object 'vmci.inf_amd64_68ed49469341f563' in SYSTEM database node.
Source: setupapi.dev.log.11.drBinary or memory string: inf: Image Path = System32\drivers\vmci.sys
Source: setupapi.dev.log.11.drBinary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.cat' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.cat'.
Source: setupapi.dev.log.11.drBinary or memory string: sig: Catalog = C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.cat
Source: setupapi.dev.log.11.drBinary or memory string: inf: Section Name = vmci.install.x64.NT
Source: setupapi.dev.log.11.drBinary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.sys' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.sys'.
Source: setupapi.dev.log.11.drBinary or memory string: idb: Registered driver package 'vmci.inf_amd64_68ed49469341f563' with 'oem2.inf'.
Source: setupapi.dev.log.11.drBinary or memory string: inf: Driver package 'vmci.inf' is configurable.
Source: setupapi.dev.log.11.drBinary or memory string: inf: {Configure Driver: VMware VMCI Bus Device}
Source: setupapi.dev.log.11.drBinary or memory string: inf: {Query Configurability: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.636
Source: setupapi.dev.log.11.drBinary or memory string: sto: {Core Driver Package Import: vmci.inf_amd64_68ed49469341f563} 11:48:39.704
Source: setupapi.dev.log.11.drBinary or memory string: idb: {Register Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf} 11:48:39.707
Source: setupapi.dev.log.11.drBinary or memory string: flq: Copying 'C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.sys' to 'C:\Windows\System32\drivers\vmci.sys'.
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D42292 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D42292
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D11120 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,0_2_00D11120
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D38357 mov eax, dword ptr fs:[00000030h]0_2_00D38357
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D2E688 mov esi, dword ptr fs:[00000030h]0_2_00D2E688
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D2E57D GetProcessHeap,HeapAlloc,InterlockedPopEntrySList,VirtualAlloc,RaiseException,InterlockedPopEntrySList,VirtualFree,InterlockedPushEntrySList,0_2_00D2E57D
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D42292 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D42292
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D42428 SetUnhandledExceptionFilter,0_2_00D42428
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D41CAC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D41CAC
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D2ED34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D2ED34
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1B740 CreateEventW,PathFindExtensionW,CompareStringW,CompareStringW,CompareStringW,GetModuleFileNameW,PostMessageW,ShellExecuteExW,GetProcessId,AllowSetForegroundWindow,WaitForInputIdle,AllowSetForegroundWindow,PostMessageW,WaitForMultipleObjects,SetEvent,GetLastError,GetExitCodeProcess,CloseHandle,GetLastError,PostMessageW,CloseHandle,0_2_00D1B740
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess created: C:\Users\user\Desktop\IEW113_2311a.exe "C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msiJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msiJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\pnputil.exe pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /installJump to behavior
Source: unknownProcess created: C:\Windows\System32\drvinst.exe drvinst.exe "4" "0" "c:\users\user\appdata\local\temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\imagingedgewebcam_driver.inf" "9" "40c79f59f" "000000000000015c" "winsta0\default" "0000000000000168" "208" "c:\program files\sony\imaging edge webcam\driver"
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe c:\windows\system32\pnpui.dll,installsecuritypromptrundllw 20 global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} c:\windows\system32\driverstore\temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\imagingedgewebcam_driver.inf c:\windows\system32\driverstore\temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\imagingedgewebcam.cat
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe c:\windows\system32\pnpui.dll,installsecuritypromptrundllw 20 global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} c:\windows\system32\driverstore\temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\imagingedgewebcam_driver.inf c:\windows\system32\driverstore\temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\imagingedgewebcam.catJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D2A360 OpenEventW,GetCurrentProcessId,InitializeCriticalSectionAndSpinCount,GetLastError,CreateEventW,CreateEventW,CreateEventW,CreateEventW,GetModuleFileNameW,ResetEvent,GetLastError,GetLastError,GetLastError,ShellExecuteExW,GetLastError,GetProcAddress,FreeLibrary,GetProcessId,AllowSetForegroundWindow,WaitForInputIdle,AllowSetForegroundWindow,GetTickCount,WaitForMultipleObjects,GetExitCodeProcess,CloseHandle,WaitForSingleObject,WaitForSingleObject,SetEvent,WaitForSingleObject,GetTickCount,WaitForSingleObject,WaitForSingleObject,GetTickCount,SetEvent,SetEvent,SetEvent,SetEvent,SetEvent,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,DeleteCriticalSection,GetModuleFileNameW,GetTimeFormatW,GetDateFormatW,GetCurrentProcess,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,GlobalAlloc,GetTokenInformation,AllocateAndInitializeSid,EqualSid,LookupAccountSidW,GetLastError,FreeSid,GlobalFree,GetCurrentProcess,CloseHandle,CoInitializeEx,GetActiveWindow,SetLastError,GetCurrentProcess,FlushInstructionCache,GetCurrentThreadId,EnterCriticalSection,LeaveCriticalSection,GlobalLock,DialogBoxIndirectParamW,GlobalUnlock,GlobalFree,GlobalFree,0_2_00D2A360
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D420FB cpuid 0_2_00D420FB
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: GetLocaleInfoW,GetLocaleInfoW,0_2_00D27420
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D1E890 GetSystemTime,SystemTimeToFileTime,FindFirstFileW,FindNextFileW,FindClose,GetLastError,0_2_00D1E890
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D15730 GetSecurityDescriptorDacl,CreateWellKnownSid,CreateWellKnownSid,CreateWellKnownSid,GetUserNameW,LookupAccountNameW,GetAce,EqualSid,LocalFree,0_2_00D15730
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D26160 GetVersionExW,GetModuleFileNameW,PathFileExistsW,0_2_00D26160
Source: C:\Windows\System32\drvinst.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\IEW113_2311a.exeCode function: 0_2_00D12BA0 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,0_2_00D12BA0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
2
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Deobfuscate/Decode Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
2
Obfuscated Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
Process Injection
1
Timestomp
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
NTDS3
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets37
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts132
Masquerading
Cached Domain Credentials121
Security Software Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Process Injection
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Rundll32
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1540035 Sample: IEW113_2311a.exe Startdate: 23/10/2024 Architecture: WINDOWS Score: 24 68 56.163.245.4.in-addr.arpa 2->68 70 198.187.3.20.in-addr.arpa 2->70 72 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->72 9 msiexec.exe 39 44 2->9         started        12 drvinst.exe 9 2->12         started        14 IEW113_2311a.exe 9 2->14         started        signatures3 process4 file5 52 C:\Windows\Installer\MSI239A.tmp, PE32+ 9->52 dropped 54 C:\Windows\Installer\MSI1F92.tmp, PE32 9->54 dropped 56 C:\Windows\Installer\MSI1EC5.tmp, PE32 9->56 dropped 66 14 other files (none is malicious) 9->66 dropped 17 msiexec.exe 9->17         started        19 msiexec.exe 9->19         started        21 msiexec.exe 9->21         started        23 msiexec.exe 9->23         started        58 C:\Windows\System32\...\SET27FD.tmp, PE32+ 12->58 dropped 60 C:\Windows\System32\...\SET27EC.tmp, PE32+ 12->60 dropped 62 C:\...\ImagingEdgeWebcam_Driver.dll (copy), PE32+ 12->62 dropped 64 C:\Windows\...\ImagingEdgeWebcam.dll (copy), PE32+ 12->64 dropped 25 rundll32.exe 22 12->25         started        76 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->76 28 IEW113_2311a.exe 1 14->28         started        signatures6 process7 signatures8 30 cmd.exe 1 17->30         started        74 Creates files in the system32 config directory 25->74 32 msiexec.exe 7 28->32         started        process9 file10 35 pnputil.exe 1 10 30->35         started        38 conhost.exe 30->38         started        40 C:\Users\user\AppData\Local\...\MSIF18A.tmp, PE32+ 32->40 dropped 42 C:\Users\user\AppData\Local\...\MSIF12C.tmp, PE32+ 32->42 dropped process11 file12 44 C:\Users\user\AppData\Local\...\SET2638.tmp, PE32+ 35->44 dropped 46 C:\Users\user\AppData\Local\...\SET2618.tmp, PE32+ 35->46 dropped 48 C:\...\ImagingEdgeWebcam_Driver.dll (copy), PE32+ 35->48 dropped 50 C:\Users\...\ImagingEdgeWebcam.dll (copy), PE32+ 35->50 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IEW113_2311a.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\ImagingEdgeWebcamLauncher.exe0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_USB.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_WIA.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\libusb-1.0.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\LjCore.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exe0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exe0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\mfc140u.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\mfcm140u.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\msvcp140.dll0%ReversingLabs
C:\Program Files\Sony\Imaging Edge Webcam\vcruntime140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIF12C.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIF18A.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2618.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2638.tmp0%ReversingLabs
C:\Windows\Installer\MSI1E56.tmp0%ReversingLabs
C:\Windows\Installer\MSI1EC5.tmp0%ReversingLabs
C:\Windows\Installer\MSI1F92.tmp0%ReversingLabs
C:\Windows\Installer\MSI239A.tmp0%ReversingLabs
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.dll (copy)0%ReversingLabs
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.dll (copy)0%ReversingLabs
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27EC.tmp0%ReversingLabs
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27FD.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
56.163.245.4.in-addr.arpa
unknown
unknownfalse
    unknown
    198.187.3.20.in-addr.arpa
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://libusb.infoneedlibusb-1.0.dll.3.drfalse
        unknown
        http://wixtoolset.orgMSI1F92.tmp.3.dr, SetupIEW.msi.0.dr, MSI1F71.tmp.3.dr, MSI1EC5.tmp.3.dr, 3b1c81.msi.3.drfalse
          unknown
          https://github.com/microsoft/Windows-driver-samples)License.txt.3.drfalse
            unknown
            http://www.gnu.org/licenses/lgpl-2.1.htmlFlibusb-1.0.dll.3.drfalse
              unknown
              https://oss.sony.net/Products/Linux/SetupIEW.msi.0.dr, 3b1c81.msi.3.drfalse
                unknown
                http://libusb.infolibusb-1.0.dll.3.drfalse
                  unknown
                  https://support.d-imaging.sony.co.jp/app/webcam/l/instruction/index.phpMSI1F71.tmp.3.drfalse
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1540035
                    Start date and time:2024-10-23 11:19:38 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 19s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:18
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:IEW113_2311a.exe
                    Detection:SUS
                    Classification:sus24.evad.winEXE@22/71@2/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 64
                    • Number of non-executed functions: 67
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240s for rundll32
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: IEW113_2311a.exe
                    TimeTypeDescription
                    05:20:33API Interceptor1x Sleep call for process: IEW113_2311a.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):9567
                    Entropy (8bit):5.204644986861534
                    Encrypted:false
                    SSDEEP:192:8dpx/ed1sgyi3yc5BFW29i9kk/YxGEdl9gt2/gnpMFpWF6yeEB3hTlc0Ai0mm2bq:8Tx/eDsti3yc5BFW29i9kk/YxGEdl9gK
                    MD5:B4641DC0A8F04443529CE1C4F22C7139
                    SHA1:3DE35BA8620926F7B3AD603A75735C3042CB89D0
                    SHA-256:1464D2B0435A67CB4DCF09B161AEFF674CA25928867EF06524BF73A461C37AFC
                    SHA-512:4DE26AE0B573FE35152A468DDF82E9C9DE050C29F89D25D1BDF84F1F7AE0EE99CD5CFE7A68D03937C6F9906B71C799BD875EB4EBC5CDE2BB0349C4C4EE6A279E
                    Malicious:false
                    Preview:...@IXOS.@.....@.*WY.@.....@.....@.....@.....@.....@......&.{77F8518A-144A-4DB2-80EB-C544B68375EE}..Imaging Edge Webcam..SetupIEW.msi.@.....@.....@.....@......IEAppIcon..&.{C2734D1F-96B7-436D-B504-71D79D323D6F}.....@.....@.....@.....@.......@.....@.....@.......@......Imaging Edge Webcam......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{4C93B565-41C9-48B2-B862-116FEF58ECC1}&.{77F8518A-144A-4DB2-80EB-C544B68375EE}.@......&.{54C6D863-4FC1-4FE5-A9B7-46A720CCF24A}&.{77F8518A-144A-4DB2-80EB-C544B68375EE}.@......&.{D53B1643-8E2E-447D-B669-61B1D8B43CD8}&.{77F8518A-144A-4DB2-80EB-C544B68375EE}.@......&.{4BD875C8-7141-4C72-A4DD-A0672A296295}&.{77F8518A-144A-4DB2-80EB-C544B68375EE}.@......&.{05F329B1-BCBC-4B95-8ABA-74790F785F23}&.{77F8518A-144A-4DB2-80EB-C544B68375EE}.@......&.{EE2D374F-C492-4D73-8F30-588B5766D92F}&.{77F8518A-144A-4DB2-80EB-C544B68375EE}.@......&.{5E02ED23-7EC9-41BE-BA69-1BB8068DB5
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):269832
                    Entropy (8bit):6.601133670257957
                    Encrypted:false
                    SSDEEP:3072:N/HJDlyWARYazWLkQc3UUMGag32TwVVzJ2F2aFPjVCTxnIko7sU2Cp135qTCm:N/JlyKkQcThCwVVzfaFPY7Kn2CpCum
                    MD5:D54CE0AC27BFB7E5854BF0F3F2141987
                    SHA1:76F987FA9DA987D330C0F50327D2C7E88B2073A7
                    SHA-256:5ACAF60D46D5E456AD8B414467D9C66DE3C41CDAE4E136902F3F1B61DCBBEB5B
                    SHA-512:B1D31B706F44CB5E5795DA442BEB5D53F2475390827AA32B322D0A160B82858EBEA0AA69970EF7DA59FD00ABE14AABA77AEB83AA11EDE00CDD0A3D3CDA9DB344
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................................................y....u.......u.......uk......u......Rich............PE..d...o..e.........." ...%............ ........................................`............`A...........................................t...T........@...................(...P...... H..p............................F..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....0......."..................@....pdata..............................@..@_RDATA.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):36368
                    Entropy (8bit):6.435140914980148
                    Encrypted:false
                    SSDEEP:768:mgfeLgDor29cA10SlHRxtqEpYinAMxUrd4/W:mgY29cAqsL7HxUrd4+
                    MD5:0624BDCA7C1E1BF264234BE33FD12FF4
                    SHA1:F458D3E7300724EE88D21475B1E6A02E85FE2E82
                    SHA-256:B73D7118E561CB099551FB2E902295381075E4BDF07732D13C3A3580D30210C7
                    SHA-512:5DBD15EAC5628445AC9C79ECB108B71D22BBB68D54A0D9D874BBEF8581963ADA3C58E09D78DEF61B293B9EB23033F45712797B2D762A6144F90584C0556F5912
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\i..\i..\i..I...Ci..I...Ui..I...Yi..U...Li......_i..\i...i......^i......^i......^i..d.._i..d..]i..d..]i..Rich\i..................PE..d...w..e.........." ...%.2...8......."...............................................5....`A.........................................m..`....n.......................f...(......0....f..8............................d..@............P...............................text....0.......2.................. ..`.rdata..d$...P...&...6..............@..@.data................\..............@....pdata...............^..............@..@_RDATA...............b..............@..@.reloc..0............d..............@..B........................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Windows setup INFormation
                    Category:dropped
                    Size (bytes):4253
                    Entropy (8bit):5.639653386929951
                    Encrypted:false
                    SSDEEP:96:5vAUyYLUOMnTXI4vj4vi4vN5mbQ5iXhug5JcoQy654gzuf/9ADGAIKDUDddECahl:xAUJzMnTXI4vj4vi4vN5mbQ5iXhug5Jc
                    MD5:CF4188B255F5EF62D58B8EDA3E7BE0B8
                    SHA1:7628031BD425A5DD1AA21DC5689961FBD5456690
                    SHA-256:4CB21C2E5D885673F5993DE513A32D04AC01E6E26C38EB394BC237D3DD39AB64
                    SHA-512:518C567A5E7073AED0981775FF53A6AA383F22204ACAF734C1765DAC4CFF28310412A9152F15790F4198281A71A765004B699723DB13782D0546DED983A0497E
                    Malicious:false
                    Preview:;..; SimpleMediaSourceDriver.inf..;....[Version]..Signature="$WINDOWS NT$"..Class=Camera..ClassGuid={ca3e7ab9-b4c3-4ae6-8251-579ef933890f} ;.E.J.E..E..E..E..E.f.E.o.E.C.E.X.E..L.E..E.GUID //.E..X.E..E..E.....PnpLockdown=1..Provider=%ProviderString%..DriverVer = 10/06/2023,13.13.41.473..CatalogFile=ImagingEdgeWebcam.cat....[DestinationDirs]..UMDriverCopy=12,UMDF ; copy to driversMdf..CustomCaptureSourceCopy=11....[SourceDisksNames]..1 = %DiskId1%,,,""....[SourceDisksFiles]..ImagingEdgeWebcam_Driver.dll = 1,,..ImagingEdgeWebcam.dll = 1,,....;*****************************************..; SimpleMFSource Install Section..;*****************************************....[Manufacturer]..%StdMfg%=Standard,NTamd64....[Standard.NTamd64]..%ImagingEdgeWebcam.DeviceDesc%=ImagingEdgeWebcam, root\ImagingEdgeWebcam....;---------------- copy files..[ImagingEdgeWebcam.NT]..CopyFiles=UMDriverCopy, CustomCaptureSourceCopy..AddReg = CustomCaptureSource.ComRegistration....;-------------------------------
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):11824
                    Entropy (8bit):7.486155218369192
                    Encrypted:false
                    SSDEEP:192:1/hzypINyby2sE9jBF6IYiYF8pA5K+oBf1hZFqrrvxwiRE:VNyb8E9VF6IYinAM+oZinvDE
                    MD5:9BC95EAB4A2B29AEC769D9A217F5A736
                    SHA1:E3D42ECDCEFC29FCCC56A366749A5149C2BF14F9
                    SHA-256:344DB9816BA7794DBF3AEBF4C4F5E6C9A2CF9CE0CD0ACBF24D14167E85D5711D
                    SHA-512:99795FBB4282F3E56F2B2824A6822C1A1A643B0879A96250B2DBA23A7916387EDC2EFAE70918A02E0155BE8B4E0A37635854908AA9F275A093A6ADE0D96463C1
                    Malicious:false
                    Preview:0..,..*.H..........0......1.0...`.H.e......0.....+.....7......0..~0...+.....7.....no.<CxsH.,.)(.|0..231006041348Z0...+.....7.....0...0....+.........q.,+...]1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0..+. 5...E.%..B.....)..;\;.@..R...1...0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0\..+.....7...1N0L...F.i.l.e.......:i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m._.d.r.i.v.e.r...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 5...E.%..B.....)..;\;.@..R...0.... 67.k.],@A.q...1E....S(..~z..G.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 67.k.],@A.q...1E....S(..~z..G.0..". L...].Vs..=...-.....l8.9K.7..9.d1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r.....
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Rich Text Format data, version 1, ANSI
                    Category:dropped
                    Size (bytes):61847
                    Entropy (8bit):5.164925920562807
                    Encrypted:false
                    SSDEEP:768:e7SZpWsROwOrP4niiIIH37FkitkFa/VnA7hYmZW9n6l7xvLKc4Q2/UPcfNBosJ33:e7IZOBrP6FkEpT6/Dt0/UPcfNBj33
                    MD5:53D2666A14F94F5B07B6C63159C01C13
                    SHA1:EE5D2654A331E802C21B3AADB29C2F4F7A2385B6
                    SHA-256:9599E086450A32816BC355ABF95473681064A117096210CA802631CDFC19A473
                    SHA-512:4743AA1489A02B2ADECF7870F3218AC141BFEF8AEF496C5F2CABF435B132388A75CFC279A61C4BF692A957EAED9FD8341E7602937C3B4DBCC711BEBCBC5E6778
                    Malicious:false
                    Preview:{\rtf1\ansi\deff0{\fonttbl{\f0\fcharset0 Times New Roman;}{\f128\fcharset128 \'82\'6c\'82\'72 \'96\'be\'92\'a9{\*\falt MS Mincho};}{\f129\fcharset129 Gulim;}{\f134\fcharset134 SimSun;}{\f136\fcharset136 MingLiU;}{\f161\fcharset161 Times New Roman Greek;}{\f162\fcharset162 Times New Roman Tur;}{\f177\fcharset177 Times New Roman (Hebrew);}{\f178\fcharset178 Times New Roman (Arabic);}{\f186\fcharset186 Times New Roman Baltic;}{\f204\fcharset204 Times New Roman Cyr;}{\f222\fcharset0 Tahoma;}{\f238\fcharset238 Times New Roman CE;}}..{\lang1033 \fs21\loch\af0\hich\f0 CONTRAT DE LICENCE D\'92UTILISATEUR FINAL..\par Date de derni\'e8re mise \'e0 jour : 2021-08..\par ..\par IMPORTANT : ..\par VEUILLEZ LIRE ATTENTIVEMENT LE PR\'c9SENT CONTRAT DE LICENCE D\'92UTILISATEUR FINAL (\'ab CLUF \'bb) AVANT D\'92UTILISER LE LOGICIEL. EN UTILISANT LE LOGICIEL, VOUS ACCEPTEZ LES CONDITIONS DU PR\'c9SENT CLUF. VOUS NE POUVEZ PAS UTILISER LE LOGICIEL SI VOUS N\'92ACCEPTEZ PAS LES CONDITIONS DU PR\'c9SENT CLU
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):25096
                    Entropy (8bit):6.5207327334887175
                    Encrypted:false
                    SSDEEP:384:94MSei5pIojlO+J4EpcdtZoFf/wyvl9ptor30/flH0CNyb8E9VF6IYinAM+oZinS:9P0pIoXNaK/wq9RH0CEpYinAMxUZvc
                    MD5:0B243B143BA934AF6444CDFC63D8B96C
                    SHA1:7602A6CA10FEA0536CC328E58999167CB86E9457
                    SHA-256:5EFB448988178A1091F2A7221C41FB59F072ACBADEF56A6885ADF7C413FB1862
                    SHA-512:CA76E4E5F35B64CB01CB500744B930569B3FE22F03EDE1C0D70DA68E1481337128DA3744629B4576B80C92C828A41E74BE35CDDADF3C5B5DFE1D43FD3C1CF4F3
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................"...0..............M... ...`....@.. ....................................`.................................rM..O....`...............:...(...........L..8............................................ ............... ..H............text....-... ...................... ..`.rsrc........`.......0..............@..@.reloc...............8..............@..B.................M......H........)...!..........PK..p...........................................6.(.....(....*.*z.,..{....,..{....o......(....*..0...........s....}.....s....}.....{.....o.....{.....o.....{.....o.....{...........s....o.....{....r...po.....{....r...po ....{.....o!....(".........%..{.....%..{.....o#...*....0..S........($....(.....s%...} ...r...p(&...-.r...pr5..p('....{ ...r...po(....{ ...r5..po)...*..0..K.......s....%.}#....{ ...rM..p.o*....s+...}....%.{....o,...}$.........s-...(....&*.
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (760), with CRLF line terminators
                    Category:dropped
                    Size (bytes):31402
                    Entropy (8bit):4.720323716440828
                    Encrypted:false
                    SSDEEP:384:GrswrsdZv1xjUBIk+x/vIqk0TkX6sT6AATeINgKP+nHQ41fgcmmItyOQeM9YfWEA:GJYv1xoBJsFkOTeDnLqFXTfleHBfuoag
                    MD5:A63BE57A8626EB0EA448B52D63AE4933
                    SHA1:D6E888DA5101232F65968A4C0667C9502D0FD666
                    SHA-256:1667F731E21727F698AC28AF4B0595A24DA1DC46A56C822919D01020D62C8680
                    SHA-512:71733EEDF5276AB46950AD5A4F2FF8C2321D7750801894E429C6F69028FA72D41479C75C64CD6D301A0081319A1CFC663E843EDCD5A18C06D703198059F90915
                    Malicious:false
                    Preview:.- This software is based in part on the work of the Independent JPEG Group.....- libjpeg-turbo.. Copyright (C)2009-2015, 2017 D. R. Commander. All Rights Reserved.....Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:....- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer...- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution...- Neither the name of the libjpeg-turbo Project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.....THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS", AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):81408
                    Entropy (8bit):6.1323415463419115
                    Encrypted:false
                    SSDEEP:1536:Auuhtteo9R99rLsBdRCyjZe8Fn6pC+Oca1837HxU4p:ANeYpMWyjZn6pCRc93q4p
                    MD5:C246784644EC7FACF68E32F0380D6AC3
                    SHA1:69E4CD74596B1685251EC04D8B8A748D6D1A4047
                    SHA-256:8943E5666D099B5DD8ED762674B0EF3E6505E697B016AE3263CA6FCB11E90750
                    SHA-512:D90E7D7C0968F7FF66B2BC362428E69F2704B6721BE604E8A1582E3006EB91B17BE029ABD3E188E8052A5B7E0CCBD1533ECC84B4E766D83260E7F398F4E28666
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........h)...G^..G^..G^.q.^..G^.|C_..G^.|D_..G^.|B_..G^.|F_..G^.qA_..G^.qF_..G^..F^,.G^X|N_..G^X|G_..G^X|.^..G^...^..G^X|E_..G^Rich..G^................PE..d...v..e.........." .........v......X........................................`............`.........................................P.......4........@.......0..x........(...P..........p.......................(...@...8...............P............................text...4........................... ..`.rdata..FS.......T..................@..@.data...0.... ......................@....pdata..x....0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):55808
                    Entropy (8bit):6.287059165860081
                    Encrypted:false
                    SSDEEP:768:emnv5s45PgQZzBT+7ImOANzzwvmyJHu/2Jq+6EpYinAMxUyo+QT:rvhNANHAm92Jp77HxUy4
                    MD5:9E401A1E45F175F4E43EA2BCC79B05D0
                    SHA1:CACE6C2C81A34718D0B3B500A1C0123DF82FE4ED
                    SHA-256:36DD3AB5222E12FC3F24EA1A684CC62884F5DBCBD7D7381DB8F9B3D4351E6306
                    SHA-512:A372319504D5D4AEE02F50A3C0DC038851282AC9896B92D092E5EBCD9E497FCBC9051378877E76650D3B33171332B553037D309F638F8AEF4E90E3F3D76EA426
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......E.....g...g...g......g.S.c...g.S.d...g.S.b...g.S.f...g.J.a...g.J.f...g...f..g.J.c...g...n...g...g...g.....g.......g...e...g.Rich..g.........................PE..d...v..e.........." .....j...N.......f...............................................A....`......................................... ....................................(..........(...p.......................(.......8............................................text....i.......j.................. ..`.rdata...........0...n..............@..@.data...0...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):174592
                    Entropy (8bit):6.443608180442681
                    Encrypted:false
                    SSDEEP:3072:oAy//eHV0Hxc/H96nJpIsnM5B0SGgvDO73kW4qp7:O21vP+JpIsnMc739R
                    MD5:5EDC69FFFF0C79370081BF200AC5944A
                    SHA1:04BCBE57B6CE1B5FFD52A776F4C5369CEB4F2426
                    SHA-256:36FC52743475E3376E76D725E8552944075536CE0426EB5F7F85706FA2711ABB
                    SHA-512:B1C9CC309A557DA675BA1B2419D7C55DD81CF377FD1F0DABFADB82C85FE54A17712E9F46EBC170AB8FD5F5584F90BDA047A717431702456A8C327FC21417B091
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n(.[*I..*I..*I..#1!.$I..x!..(I..x!..(I..x!..!I..x!.."I..E-../I..*I..uI..L!..!I..L!..+I..L!M.+I..*I%.+I..L!..+I..Rich*I..........PE..d......^.........." ................................................................LA....`.........................................PD.......^..........H.......\........(..........@...p...............................................H............................text.............................. ..`.rdata..............................@..@.data........p.......\..............@....pdata..\............^..............@..@.rsrc...H............x..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):774112
                    Entropy (8bit):6.236040711109025
                    Encrypted:false
                    SSDEEP:12288:jWLg0rgshUjh32e9F+tMV2kwbGhQ67VySpfgK3EDhd+W5L:jWkogsyh3JF+mVmbGiEVxpfghDOe
                    MD5:1671E39C1567AF68CCB49746D528317C
                    SHA1:9092C69DBD4CADB467ACEB45305E5772FE1EFFC8
                    SHA-256:62F4A8FE6AFAB3CC8175608F6B5EEC6E3F7CFF4E6E899C40398F569278B54263
                    SHA-512:93C67FEF28917B45CF082E5388992D3A9E5A1C502ADF7A9534255D9589C7B19F7F813F0EE74435BB03A98C48CC8721FF5FF3110988AA2B86BD68E107DD12DC24
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$.......8..#|..p|..p|..pu.1pj..p.._p}..p...qt..p...qx..p...qz..p...qR..p|..pl..p7..q~..p7..q}..p7..qm..p|..p...p...q\..p...q,..p...q}..p..]p}..p|.5p}..p...q}..pRich|..p........................PE..d...|..e.........." .................`....................................................`......................................... ...................x....p...L.......'......|....A..p....................D..(...PB..8............................................text.............................. ..`.rdata..............................@..@.data....(...@.......&..............@....pdata...L...p...N...D..............@..@.rsrc...x...........................@..@.reloc..|...........................@..B........................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (console) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):45544
                    Entropy (8bit):5.901420118362686
                    Encrypted:false
                    SSDEEP:768:G12yZ/HoT3AaciE7wiLQ1Iiq/jHlm6asWEpYinAMxURbv:S5cE7wH/OjHlm617HxURb
                    MD5:8647F611F88FB538F7E0E76427DF856F
                    SHA1:FBE6A6ACD8B610AE15B769432AEBD78D8FE7440F
                    SHA-256:FA063474F425E13C5910EA51AC4B519788877A0330F6D8352AA0412B593AE2AD
                    SHA-512:165B4AF25736FF1C90BC7A5315D0F7C09466071D660F4B7479DBB58E112DDC60648D53AB09BB1FC05FFF1847686A6A9D9901A4F94CB3880793FEFD5B081A811E
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......p...4...4...4...=.g.>...f...6...f...&...f...>...f...7.......1...4...........6.......5...4.c.5.......5...Rich4...........PE..d...g..e.........."..........|.................@..........................................`..................................................(.......P...^...@...........'......,...."..T............................"..8............ ...............................text...l........................... ..`.rdata....... ......................@..@.data...H....0.......$..............@....pdata.......@.......&..............@..@.rsrc....^...P...`...(..............@..@.reloc..,...........................@..B........................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):81888
                    Entropy (8bit):6.582104250803885
                    Encrypted:false
                    SSDEEP:1536:M4aZAjx4hH2jr5Pto5ZxQQmG8gbz6ofEzM7HxUWW4:3aZI4hWdtorObhgym0MqWF
                    MD5:506E55E0C984D20687F0FB146DD7A8CA
                    SHA1:D8806807F9F65DAEFF36CB862D02BBD1B138649F
                    SHA-256:00CF501BA36A343915731648AA4AA244C0E05A6EBEE3C1B68401AC22965AB66D
                    SHA-512:B8647C0719E50C2F327BA248935DD2ECFE1F1CFB0ED7F21E4D3B95C6B4FBF0FA33899CF8DD6C289E8CC931C085A1233A2D64B6F154520B6B58EEACD54C213525
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........;r.]Z..]Z..]Z..T"..MZ..."..SZ.../..WZ.../..YZ.../..}Z.../..UZ../..^Z..]Z..Z../..TZ../..\Z../..\Z..]Z..\Z../..\Z..Rich]Z..........................PE..d......e.........."......F...........E.........@.............................`......ul....`.........................................p.......x...@........................'...P..L...0w..p....................y..(....w..8............`.. ............................text...pE.......F.................. ..`.rdata...<...`...>...J..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..L....P......................@..B........................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1, orientation=upper-left], baseline, precision 8, 1024x576, components 3
                    Category:dropped
                    Size (bytes):47599
                    Entropy (8bit):7.10350692525856
                    Encrypted:false
                    SSDEEP:768:4YyAkC3ghVmcVVwn4IdthShDbkwra83kSMU1KGPM8Ctaok:4M/whVmwVw4ITxwrapS3PM8Nok
                    MD5:0CEC08F356D38D018F321CCF271809D3
                    SHA1:6258801F192C05A6985355517C4416FCD88185CC
                    SHA-256:DF14BBF48921A3A6661D8E2E10293CECB679F7CC2505E0C6FFD31398527F07D6
                    SHA-512:E81C1682D9448927392854416C3570B36B9410B17DA6E30575E240210A56936F2203D06DDF2C24AB447ADCEDCE73ED6334A6E0DBF184AEA812CD8D8CD8F6B75F
                    Malicious:false
                    Preview:......JFIF.....H.H....."Exif..MM.*.........................XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewi
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):6060704
                    Entropy (8bit):6.647398713360677
                    Encrypted:false
                    SSDEEP:49152:ShuDOWOTjuL2QM9xVj078/VHcNG5yd9yKjCHFJnHu83026uSwIbFLOAkGy3zdnEN:OL3uAnUduREXFLOAkGkzdnEVomFHKnPE
                    MD5:8C8C985ABA75CEE21C586157FCA8BA87
                    SHA1:8F143C210DCFD89CD27D9BFED66C1A8985E6EC2E
                    SHA-256:B06C3DFAA40F637769AA43CDD6A8B02F96A5F2EBCA7FA82E6FDE8C41DD063CFC
                    SHA-512:56AA91FC744141CD5A0143C0C1411BF5E9DB1EFBE2132417763543D9DC7735CD94586BC7A45194BB8EFF145CFEE907D7B99D549B6C7FF8C5E85C7F66EF6031FF
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......t1.u0P.&0P.&0P.&..M&1P.&..K&1P.&..J&'P.&9(-&$P.&.0.'2P.&.0.'<P.&.0.'&P.&..Q&#P.&0P.&.S.&.0.'6P.&.0.'.Q.&.0.'1P.&.0A&1P.&.0.'1P.&Rich0P.&........................PE..d...5E.X.........." .....B0...,.............................................. ].......\...`A..........................................@.....X.A.......F.......C..N...<\..>....[..o...c5.8....................c5.(....e1..............`0.H.....@......................text....A0......B0................. ..`.rdata.......`0......F0.............@..@.data...xi...0B.......B.............@....pdata...N....C..P....B.............@..@.didat..H.....E......,E.............@....tls..........F......2E.............@....rsrc.........F......4E.............@..@.reloc...o....[..p....Z.............@..B................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):105640
                    Entropy (8bit):6.304388791460154
                    Encrypted:false
                    SSDEEP:3072:UIfi5TJmjzGxUthGyV1dQC8mh6HYfT6Yb:UD1SzGxUpV16Eh6HO6Yb
                    MD5:8828D20386AADFC266AE2228ACF53FB9
                    SHA1:EA315A972BD7E827D4AF5909022207DFAFE3B6D0
                    SHA-256:CEED247C74F1BC03E2FAB406F8C419FA3D679CFE7831AD37FDEB6609EE76369B
                    SHA-512:33A0CAE3CA69BD510186F1AB9A7CE5FD5507DD5FEBF255E04A63152BE3EC8E6CCF65AF1752BBFB54C0938DE7CA4B76132B95B018377EDB28AE896D623852C564
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........r.....O...O...OS.1O...O.AVO...Ots.N...Ots.N...Ots.N...O.kVO...OS.*O...O...OT..Ots.N...Ots.N...Ots:O...Ots.N...ORich...O........PE..d....D.X.........." .....L...........U..............................................{.....`..........................................[.......\.......................^...>...........z..8...................`M..(... z...............p...............v..H............text....F.......H.................. ..`.nep.........`.......L.............. ..`.rdata..~....p.......P..............@..@.data........p.......H..............@....pdata...............P..............@..@.tls.................T..............@....rsrc................V..............@..@.reloc...............\..............@..B................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):627368
                    Entropy (8bit):6.346631066226722
                    Encrypted:false
                    SSDEEP:12288:fkfR9wkQfEAB8RKE1ujKQEKZm+jWodEEV1EB3C:CAB8RdQEKZm+jWodEEbEY
                    MD5:D1BD63F4BB6D9565AF5F82137ACDB434
                    SHA1:AEEFDA48D04AE9402EF2424BA8181C38DE14D60A
                    SHA-256:7A222F091FDD8A8E6026C24E652396519103E982571370C8740F10778BC9AC43
                    SHA-512:4342AB267B18B9FE9C69CDF373DE7DB5569B5CD4207F87C8C1276CFE2BC8FE5303838E090E78A65B5608568801E090F198476DD8D080B881D97D92D61FD8DC35
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........o...<...<...</x.<...<..n<...<...=...<...<\..<...=...<...=...<...=...<...=...<...=...<...<...<...=...<Rich...<........PE..d......X.........." ................`.....................................................`A............................................h...x...,............@...A...T...>..............8...........................0 ......................D...@....................text............................... ..`.rdata..L...........................@..@.data...\9..........................@....pdata...A...@...B..................@..@.didat..h............B..............@....rsrc................D..............@..@.reloc...............H..............@..B................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):87224
                    Entropy (8bit):6.538885960605395
                    Encrypted:false
                    SSDEEP:1536:fFABA4oLT6MkFVpO0VW4iA6AHpg7otfG0TwecbhTWV1vqbGva:f2FITY7v6Cpg7wG0TwecbhKnvqiS
                    MD5:9CEF848DD7026D2626B35032A7B21E6D
                    SHA1:321AD662F45F5C601AE4D55F726D075A97D80734
                    SHA-256:56DE253172B2FF70BA89CC0544E09C6DD34D6793231C09AA6DFAAC755535F45F
                    SHA-512:38034FE11DC69EFE81022EEB0599F3FF3AF315CCA186D4A2C8F41E06C442039F665E420EEEFCB7FCEA7B0FE2F5CAE55C29E10533517286EE9CD09FF9DC1F2835
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......kR.a/3.2/3.2/3.2..)2-3.2&KU2$3.2/3.2.3.2.S.3,3.2.S.3%3.2.S.3$3.2.S.313.2.S.3.3.2.S92.3.2.S.3.3.2Rich/3.2........................PE..d......X.........." .........R...............................................`............`A............................................4............@.......0...........>...P..d.......8............................................................................text............................... ..`.rdata...5.......6..................@..@.data...x.... ......................@....pdata.......0......................@..@.rsrc........@......................@..@.reloc..d....P......................@..B................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:MS Windows icon resource - 5 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 64x64, 32 bits/pixel
                    Category:dropped
                    Size (bytes):95850
                    Entropy (8bit):7.378187029601007
                    Encrypted:false
                    SSDEEP:1536:BK6n3E1/NX82E3A4OkjqE3wN/K5LrLVyfuQ3GB3bzF29pbWf3A:Lw/d82kfOkjqHRK5PA5GBl2CfQ
                    MD5:A77225BFD33E7BA20268B85D9D04367E
                    SHA1:BDDD5D68501431A1C9EBB94699A47123B1E6E478
                    SHA-256:64A6FC8F05B610E68CF3B5D110129F9FF278772AF1963C0050D78768A9C9BD63
                    SHA-512:89BFCE50EC0717F4C5964F44213233C84747B2419DF591B9E678F257960B3018B188BC40C4F50D801EBEA5FCEB6B971325696B0B38517E68E67BD62B87D86FF6
                    Malicious:false
                    Preview:............ .4...V...@@.... .(B......00.... ..%...;.. .... .....Za........ .h....r...PNG........IHDR.............\r.f....IDATx..]...E.>{......N.%.).*M@J.."E.J..)bD@.....RH.!......K^..[..93..%..4./w..-.3s..23...nG.......pt;.....(.|..g.L...._...&.d..L..........'....q./@.|.m../L..._..........7....~....F....:..W....7}.upt;r.Q...nT.Y......0....._?*.}RSS...Grss.i...))).I....?>.....e.H....E...a.I.S.'...|>.......|."$.&$....#.HwwWWWGgGgk[[gScCwmmm.......|.....~....H$R.c...[..~..Wf;.._....P.1...p*.C...A....8pP.W.^)ii.iIII).@ ..~.....~.`..?......G..\..e.O.~.MM.:0P...h$.T.._8.>.....P(L..........o$..DB...Z.[.Zjkj...JC...0P(............;.;.._..(.|....1.c....y..#...241.O..4....S....8...L.. ..O&.....n..... .1...!*.L....T.CT..\..............;>......... .&{..g.uuvA.}v'.d.........p$...jkinn...j*,,h/=PRH......j>.......( |I....9lT....T.&..q...9b....y}....2......T.._.-..SAcB./..Nhk..-....,6........~S..m..O.-_jZ*$%&Brr"$&&@BB..)*..A...........F...............e..|
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):123904
                    Entropy (8bit):6.019348446512073
                    Encrypted:false
                    SSDEEP:3072:qC2+1/jC6wmMJjS42JOhbdgf2373x8Yyrpb:qCnl6mM9x26bOmx8YK
                    MD5:DE475943D21409F1372093D37FC0A0C8
                    SHA1:3B634C2A2470718A23EEFA3386C8AF724EA2D1AE
                    SHA-256:EB6100F6194060C59C979B470795336F1ECD59757F131A7B7EBA9A6B3B829677
                    SHA-512:6F42A1CC2B097A8C6498C03AA5E5E538CF6B4D1420734A7CCD7A21C45EE0B5867E06F8DB8E58987C9BA792864104B11C911C6775295781133CFAFB0DF897C08D
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........s.s.s..~..s....s....s....s....s....s.2..s....s.s..r.l..s.l..s.l....s.l..s.Rich.s.................PE..d...j..e.........." .....>...........4.......................................0............`.........................................`.......\...h...............0............ ..0.......p.......................(.......8............P..P............................text....<.......>.................. ..`.rdata..T}...P...~...B..............@..@.data...`...........................@....pdata..0...........................@..@.rsrc...............................@..@.reloc..0.... ......................@..B................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):123904
                    Entropy (8bit):6.019348446512073
                    Encrypted:false
                    SSDEEP:3072:qC2+1/jC6wmMJjS42JOhbdgf2373x8Yyrpb:qCnl6mM9x26bOmx8YK
                    MD5:DE475943D21409F1372093D37FC0A0C8
                    SHA1:3B634C2A2470718A23EEFA3386C8AF724EA2D1AE
                    SHA-256:EB6100F6194060C59C979B470795336F1ECD59757F131A7B7EBA9A6B3B829677
                    SHA-512:6F42A1CC2B097A8C6498C03AA5E5E538CF6B4D1420734A7CCD7A21C45EE0B5867E06F8DB8E58987C9BA792864104B11C911C6775295781133CFAFB0DF897C08D
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........s.s.s..~..s....s....s....s....s....s.2..s....s.s..r.l..s.l..s.l....s.l..s.Rich.s.................PE..d...j..e.........." .....>...........4.......................................0............`.........................................`.......\...h...............0............ ..0.......p.......................(.......8............P..P............................text....<.......>.................. ..`.rdata..T}...P...~...B..............@..@.data...`...........................@....pdata..0...........................@..@.rsrc...............................@..@.reloc..0.... ......................@..B................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\IEW113_2311a.exe
                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Imaging Edge Webcam, Author: Sony Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Imaging Edge Webcam., Create Time/Date: Fri Oct 6 08:39:02 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2, Template: x64;0, Last Saved By: x64;0, Revision Number: {77F8518A-144A-4DB2-80EB-C544B68375EE}1.1.03.10061;{95690A63-A7AD-4F7B-8CD3-F94BF8573A8E}1.1.03.10061;{28FB0552-E7A4-4193-ACA1-2CA8F06EC841}, Number of Pages: 300, Number of Characters: 0
                    Category:dropped
                    Size (bytes):7835648
                    Entropy (8bit):7.491189626154171
                    Encrypted:false
                    SSDEEP:196608:+eziaII6eYf7Rl7NyygJ7xzNc4qeQm/e:+e2Ei7P7NydJ1Nc4Um
                    MD5:DF408B38D2630AAA6CC578F1020C9B05
                    SHA1:D017A4DB82EC7F459DD5669FF73ED55DFC442E47
                    SHA-256:EFF867158BDE9EE33DA8E313E93F1E49E3EFA329AC0EE9397744D2DA2C7E650A
                    SHA-512:6E8E1E9F6933BDD9623760DF64AE102EBF56A053162310A7EA3649670053084BFEA58769ABE7145227BAB003DC2C767FF4A8F8FFE82BF0E9BC6BF71FB4F17C45
                    Malicious:false
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\IEW113_2311a.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4828811 bytes, 1 file, at 0x2c +AUtf? "SetupIEW.msi", number 1, 240 datablocks, 0x1503 compression
                    Category:dropped
                    Size (bytes):4828811
                    Entropy (8bit):7.9990462765095804
                    Encrypted:true
                    SSDEEP:98304:OCF8Jwd+2/HK+4k6JcOGtAg6YcCIwq5YxtNoObY9s4p:PqJwocA1Jc8g6Ylrq5CEObYTp
                    MD5:4B274D01B22995836D1CE9A441B3E7B7
                    SHA1:0438943ACAE87522A5DCEF942D1EAD165EDEABC4
                    SHA-256:43608D06A7214FFE17893BFEBB835DA4D9FC3880288A6FCF808D56DFB1C4224E
                    SHA-512:DD29D7618088FA18E28F6583D750E1301DE5441A25C84A3F84CC56CE4782D238E9D512AA696CCF33576834D9FC3D6ECBB44EE1AE7A2E495B195FE0BDA5C32AC7
                    Malicious:false
                    Preview:MSCF......I.....,...................I.........w.......FW.C..SetupIEW.msi.r9+.&H..[..... .........".+.w.ww........."...........".UD.g.pf....0......q'3.@/.u.-5tM.....77..........%B...]....0@ZB.@.d.........r}./#~D.... ......h..o.wwf..M...4..-.Q..}@.b?S{......:...f.'....^..a?._....._...........O..?..'..?....|..........?|.....>....t..........,.H...@.......<...@....L.@.@\...@....4....<........D....L.8......T.X..\.x......d....l.....@{.9....=........A...0E...p....I.(..M.8......Q.H.0U.X.p....Y.h..].x......a...0e...p....i....m........q...0u...p....y....}...p....@....B`..0....D...."...4....#...D$ ..T.`..%...d&.........@|....(.....P..)....*........+....,..........[.n..] v...0.@/......`........b...8d...X....f...x}..@H.0..5...X6p..h....7......p.....`..r....9`.......:....;..... ..<..........p..(... =.....p=..` ...@....(....0..........p...........#...P'........+..../........3...P7...h. ....v....~... ..!... #...@. ..%...`'..... ..)....+..... ..-..../..... ..1... 3...@. ..5...`7..... ..9...
                    Process:C:\Users\user\Desktop\IEW113_2311a.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1542
                    Entropy (8bit):3.60804255875879
                    Encrypted:false
                    SSDEEP:48:3ro3kzNlrH89poF+7EWAz0Ug3Fh8nM7hGNeyGNev:3E3kxhu7Elz/nM1tytv
                    MD5:EAAC4B67F55D7363993F1AC326172141
                    SHA1:70EBD67A68A18595D2FD8B94606555659E50F741
                    SHA-256:882F197D5002FF35873C2CAF5169B61137E0BB12642AA05B930C26A2D8EA019F
                    SHA-512:2D17B827CA4B10E108003C9C53E6A4DFE8B2E48B07AE94108555321AE4672FB2904DADD2768B6998EF8626DCFE0687F10991FFE0D6AE2012D2C7F4A4925854B8
                    Malicious:false
                    Preview:......[.P.a.c.k.a.g.e.].....P.r.o.d.u.c.t.N.a.m.e.=.I.m.a.g.i.n.g. .E.d.g.e. .W.e.b.c.a.m.....W.i.n.d.o.w.T.i.t.l.e.=.I.m.a.g.i.n.g. .E.d.g.e. .W.e.b.c.a.m.....P.a.c.k.a.g.e.D.a.t.e.T.i.m.e.=.2.0.2.3.-.1.0.-.0.6.T.1.0.:.1.2.:.1.7...3.3.1.Z.....C.o.m.p.r.e.s.s.i.o.n.=.T.r.u.e.....T.o.t.a.l.F.i.l.e.S.i.z.e.=.7.8.3.5.6.4.8.....A.u.t.o.C.l.o.s.e.W.i.n.d.o.w.W.h.e.n.S.u.c.c.e.s.s.=.T.r.u.e.....V.A.I.O.U.p.d.a.t.e.M.o.d.e.=.F.a.l.s.e.....[.M.e.s.s.a.g.e.].....S.h.o.w.M.e.s.s.a.g.e.B.o.x.=.F.a.l.s.e.....S.h.o.w.M.e.s.s.a.g.e.B.o.x.W.h.e.n.S.i.l.e.n.t.=.F.a.l.s.e.....D.i.a.l.o.g.B.u.t.t.o.n.T.y.p.e.=.0.....[.R.e.s.t.r.i.c.t.i.o.n.].....C.h.e.c.k.M.a.n.u.f.a.c.t.u.r.e.r.=.F.a.l.s.e.....O.S.V.e.r.s.i.o.n.M.i.n.=.0.x.0.0.0.6.0.0.0.3.....O.S.B.u.i.l.d.M.i.n.=.0.x.2.5.8.0.0.0.0.0.....A.l.l.o.w.P.r.o.g.r.a.m.C.o.m.p.a.t.i.b.i.l.i.t.y.A.s.s.i.s.t.a.n.t.M.o.d.e.=.T.r.u.e.....C.h.e.c.k.D.i.g.i.t.a.l.S.i.g.n.a.t.u.r.e.=.F.a.l.s.e.....[.E.x.t.r.a.c.t.i.o.n.].....S.p.e.c.i.f.i.e.d.E.x.t.r.a.c.t.F.o.l.d.e.
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):11824
                    Entropy (8bit):7.486155218369192
                    Encrypted:false
                    SSDEEP:192:1/hzypINyby2sE9jBF6IYiYF8pA5K+oBf1hZFqrrvxwiRE:VNyb8E9VF6IYinAM+oZinvDE
                    MD5:9BC95EAB4A2B29AEC769D9A217F5A736
                    SHA1:E3D42ECDCEFC29FCCC56A366749A5149C2BF14F9
                    SHA-256:344DB9816BA7794DBF3AEBF4C4F5E6C9A2CF9CE0CD0ACBF24D14167E85D5711D
                    SHA-512:99795FBB4282F3E56F2B2824A6822C1A1A643B0879A96250B2DBA23A7916387EDC2EFAE70918A02E0155BE8B4E0A37635854908AA9F275A093A6ADE0D96463C1
                    Malicious:false
                    Preview:0..,..*.H..........0......1.0...`.H.e......0.....+.....7......0..~0...+.....7.....no.<CxsH.,.)(.|0..231006041348Z0...+.....7.....0...0....+.........q.,+...]1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0..+. 5...E.%..B.....)..;\;.@..R...1...0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0\..+.....7...1N0L...F.i.l.e.......:i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m._.d.r.i.v.e.r...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 5...E.%..B.....)..;\;.@..R...0.... 67.k.],@A.q...1E....S(..~z..G.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 67.k.],@A.q...1E....S(..~z..G.0..". L...].Vs..=...-.....l8.9K.7..9.d1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r.....
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):269832
                    Entropy (8bit):6.601133670257957
                    Encrypted:false
                    SSDEEP:3072:N/HJDlyWARYazWLkQc3UUMGag32TwVVzJ2F2aFPjVCTxnIko7sU2Cp135qTCm:N/JlyKkQcThCwVVzfaFPY7Kn2CpCum
                    MD5:D54CE0AC27BFB7E5854BF0F3F2141987
                    SHA1:76F987FA9DA987D330C0F50327D2C7E88B2073A7
                    SHA-256:5ACAF60D46D5E456AD8B414467D9C66DE3C41CDAE4E136902F3F1B61DCBBEB5B
                    SHA-512:B1D31B706F44CB5E5795DA442BEB5D53F2475390827AA32B322D0A160B82858EBEA0AA69970EF7DA59FD00ABE14AABA77AEB83AA11EDE00CDD0A3D3CDA9DB344
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................................................y....u.......u.......uk......u......Rich............PE..d...o..e.........." ...%............ ........................................`............`A...........................................t...T........@...................(...P...... H..p............................F..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....0......."..................@....pdata..............................@..@_RDATA.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):36368
                    Entropy (8bit):6.435140914980148
                    Encrypted:false
                    SSDEEP:768:mgfeLgDor29cA10SlHRxtqEpYinAMxUrd4/W:mgY29cAqsL7HxUrd4+
                    MD5:0624BDCA7C1E1BF264234BE33FD12FF4
                    SHA1:F458D3E7300724EE88D21475B1E6A02E85FE2E82
                    SHA-256:B73D7118E561CB099551FB2E902295381075E4BDF07732D13C3A3580D30210C7
                    SHA-512:5DBD15EAC5628445AC9C79ECB108B71D22BBB68D54A0D9D874BBEF8581963ADA3C58E09D78DEF61B293B9EB23033F45712797B2D762A6144F90584C0556F5912
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\i..\i..\i..I...Ci..I...Ui..I...Yi..U...Li......_i..\i...i......^i......^i......^i..d.._i..d..]i..d..]i..Rich\i..................PE..d...w..e.........." ...%.2...8......."...............................................5....`A.........................................m..`....n.......................f...(......0....f..8............................d..@............P...............................text....0.......2.................. ..`.rdata..d$...P...&...6..............@..@.data................\..............@....pdata...............^..............@..@_RDATA...............b..............@..@.reloc..0............d..............@..B........................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:Windows setup INFormation
                    Category:dropped
                    Size (bytes):4253
                    Entropy (8bit):5.639653386929951
                    Encrypted:false
                    SSDEEP:96:5vAUyYLUOMnTXI4vj4vi4vN5mbQ5iXhug5JcoQy654gzuf/9ADGAIKDUDddECahl:xAUJzMnTXI4vj4vi4vN5mbQ5iXhug5Jc
                    MD5:CF4188B255F5EF62D58B8EDA3E7BE0B8
                    SHA1:7628031BD425A5DD1AA21DC5689961FBD5456690
                    SHA-256:4CB21C2E5D885673F5993DE513A32D04AC01E6E26C38EB394BC237D3DD39AB64
                    SHA-512:518C567A5E7073AED0981775FF53A6AA383F22204ACAF734C1765DAC4CFF28310412A9152F15790F4198281A71A765004B699723DB13782D0546DED983A0497E
                    Malicious:false
                    Preview:;..; SimpleMediaSourceDriver.inf..;....[Version]..Signature="$WINDOWS NT$"..Class=Camera..ClassGuid={ca3e7ab9-b4c3-4ae6-8251-579ef933890f} ;.E.J.E..E..E..E..E.f.E.o.E.C.E.X.E..L.E..E.GUID //.E..X.E..E..E.....PnpLockdown=1..Provider=%ProviderString%..DriverVer = 10/06/2023,13.13.41.473..CatalogFile=ImagingEdgeWebcam.cat....[DestinationDirs]..UMDriverCopy=12,UMDF ; copy to driversMdf..CustomCaptureSourceCopy=11....[SourceDisksNames]..1 = %DiskId1%,,,""....[SourceDisksFiles]..ImagingEdgeWebcam_Driver.dll = 1,,..ImagingEdgeWebcam.dll = 1,,....;*****************************************..; SimpleMFSource Install Section..;*****************************************....[Manufacturer]..%StdMfg%=Standard,NTamd64....[Standard.NTamd64]..%ImagingEdgeWebcam.DeviceDesc%=ImagingEdgeWebcam, root\ImagingEdgeWebcam....;---------------- copy files..[ImagingEdgeWebcam.NT]..CopyFiles=UMDriverCopy, CustomCaptureSourceCopy..AddReg = CustomCaptureSource.ComRegistration....;-------------------------------
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):11824
                    Entropy (8bit):7.486155218369192
                    Encrypted:false
                    SSDEEP:192:1/hzypINyby2sE9jBF6IYiYF8pA5K+oBf1hZFqrrvxwiRE:VNyb8E9VF6IYinAM+oZinvDE
                    MD5:9BC95EAB4A2B29AEC769D9A217F5A736
                    SHA1:E3D42ECDCEFC29FCCC56A366749A5149C2BF14F9
                    SHA-256:344DB9816BA7794DBF3AEBF4C4F5E6C9A2CF9CE0CD0ACBF24D14167E85D5711D
                    SHA-512:99795FBB4282F3E56F2B2824A6822C1A1A643B0879A96250B2DBA23A7916387EDC2EFAE70918A02E0155BE8B4E0A37635854908AA9F275A093A6ADE0D96463C1
                    Malicious:false
                    Preview:0..,..*.H..........0......1.0...`.H.e......0.....+.....7......0..~0...+.....7.....no.<CxsH.,.)(.|0..231006041348Z0...+.....7.....0...0....+.........q.,+...]1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0..+. 5...E.%..B.....)..;\;.@..R...1...0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0\..+.....7...1N0L...F.i.l.e.......:i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m._.d.r.i.v.e.r...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 5...E.%..B.....)..;\;.@..R...0.... 67.k.],@A.q...1E....S(..~z..G.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 67.k.],@A.q...1E....S(..~z..G.0..". L...].Vs..=...-.....l8.9K.7..9.d1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r.....
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):269832
                    Entropy (8bit):6.601133670257957
                    Encrypted:false
                    SSDEEP:3072:N/HJDlyWARYazWLkQc3UUMGag32TwVVzJ2F2aFPjVCTxnIko7sU2Cp135qTCm:N/JlyKkQcThCwVVzfaFPY7Kn2CpCum
                    MD5:D54CE0AC27BFB7E5854BF0F3F2141987
                    SHA1:76F987FA9DA987D330C0F50327D2C7E88B2073A7
                    SHA-256:5ACAF60D46D5E456AD8B414467D9C66DE3C41CDAE4E136902F3F1B61DCBBEB5B
                    SHA-512:B1D31B706F44CB5E5795DA442BEB5D53F2475390827AA32B322D0A160B82858EBEA0AA69970EF7DA59FD00ABE14AABA77AEB83AA11EDE00CDD0A3D3CDA9DB344
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................................................y....u.......u.......uk......u......Rich............PE..d...o..e.........." ...%............ ........................................`............`A...........................................t...T........@...................(...P...... H..p............................F..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....0......."..................@....pdata..............................@..@_RDATA.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):36368
                    Entropy (8bit):6.435140914980148
                    Encrypted:false
                    SSDEEP:768:mgfeLgDor29cA10SlHRxtqEpYinAMxUrd4/W:mgY29cAqsL7HxUrd4+
                    MD5:0624BDCA7C1E1BF264234BE33FD12FF4
                    SHA1:F458D3E7300724EE88D21475B1E6A02E85FE2E82
                    SHA-256:B73D7118E561CB099551FB2E902295381075E4BDF07732D13C3A3580D30210C7
                    SHA-512:5DBD15EAC5628445AC9C79ECB108B71D22BBB68D54A0D9D874BBEF8581963ADA3C58E09D78DEF61B293B9EB23033F45712797B2D762A6144F90584C0556F5912
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\i..\i..\i..I...Ci..I...Ui..I...Yi..U...Li......_i..\i...i......^i......^i......^i..d.._i..d..]i..d..]i..Rich\i..................PE..d...w..e.........." ...%.2...8......."...............................................5....`A.........................................m..`....n.......................f...(......0....f..8............................d..@............P...............................text....0.......2.................. ..`.rdata..d$...P...&...6..............@..@.data................\..............@....pdata...............^..............@..@_RDATA...............b..............@..@.reloc..0............d..............@..B........................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:Windows setup INFormation
                    Category:dropped
                    Size (bytes):4253
                    Entropy (8bit):5.639653386929951
                    Encrypted:false
                    SSDEEP:96:5vAUyYLUOMnTXI4vj4vi4vN5mbQ5iXhug5JcoQy654gzuf/9ADGAIKDUDddECahl:xAUJzMnTXI4vj4vi4vN5mbQ5iXhug5Jc
                    MD5:CF4188B255F5EF62D58B8EDA3E7BE0B8
                    SHA1:7628031BD425A5DD1AA21DC5689961FBD5456690
                    SHA-256:4CB21C2E5D885673F5993DE513A32D04AC01E6E26C38EB394BC237D3DD39AB64
                    SHA-512:518C567A5E7073AED0981775FF53A6AA383F22204ACAF734C1765DAC4CFF28310412A9152F15790F4198281A71A765004B699723DB13782D0546DED983A0497E
                    Malicious:false
                    Preview:;..; SimpleMediaSourceDriver.inf..;....[Version]..Signature="$WINDOWS NT$"..Class=Camera..ClassGuid={ca3e7ab9-b4c3-4ae6-8251-579ef933890f} ;.E.J.E..E..E..E..E.f.E.o.E.C.E.X.E..L.E..E.GUID //.E..X.E..E..E.....PnpLockdown=1..Provider=%ProviderString%..DriverVer = 10/06/2023,13.13.41.473..CatalogFile=ImagingEdgeWebcam.cat....[DestinationDirs]..UMDriverCopy=12,UMDF ; copy to driversMdf..CustomCaptureSourceCopy=11....[SourceDisksNames]..1 = %DiskId1%,,,""....[SourceDisksFiles]..ImagingEdgeWebcam_Driver.dll = 1,,..ImagingEdgeWebcam.dll = 1,,....;*****************************************..; SimpleMFSource Install Section..;*****************************************....[Manufacturer]..%StdMfg%=Standard,NTamd64....[Standard.NTamd64]..%ImagingEdgeWebcam.DeviceDesc%=ImagingEdgeWebcam, root\ImagingEdgeWebcam....;---------------- copy files..[ImagingEdgeWebcam.NT]..CopyFiles=UMDriverCopy, CustomCaptureSourceCopy..AddReg = CustomCaptureSource.ComRegistration....;-------------------------------
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1728 "Signature", at 0x68 WinDirPath, LanguageID 809, at 0x80 language en-GB
                    Category:dropped
                    Size (bytes):8948
                    Entropy (8bit):3.4431898976758726
                    Encrypted:false
                    SSDEEP:96:hc1OCKsKeUCB0fWpFRsyzHg5e20cNy01HR3T6gYq2vyvVATCG5qyxJw5W/39rdeS:iN0fORsU6NIgEnq5WxZ
                    MD5:D63EB1A7143819CB93D75E1C698D008C
                    SHA1:D3811F84B8B86ED7C415518031D8CDCC19169699
                    SHA-256:75291E77802A6C169123AE7CE9E636A67E2B093E1F2BEAA0302CDF695C3A5D8D
                    SHA-512:2A09198F8C2173D825B4F2AF53F708EFE8D87F06A3EF9177D4BC320C8B99562B62D1A7E04DBD8D06418430765B53E201CE0BD5F35A6DD022465011A2B941E27F
                    Malicious:false
                    Preview:....................(.....x........................(...............P....... ...h................"......C.:.\.W.i.n.d.o.w.s.....e.n.-.G.B.......................................................................................................................................................................................................h............... ...................................................,...........................<.......................0...............................................................H...............................d...........................................................................<...............................,...........................................L...........................................4.......................................................................@...........................................................................................................(.......................................................................
                    Process:C:\Windows\System32\pnputil.exe
                    File Type:Generic INItialization configuration [BeginLog]
                    Category:dropped
                    Size (bytes):36600
                    Entropy (8bit):5.207132503833556
                    Encrypted:false
                    SSDEEP:384:OGdni80C/8g0atRf7yr14ujuNY9AZi3Z/oUtwr05hauNzvIbO6:Own95cdyYloiwQ+KvZ6
                    MD5:4FB09918B316DA35E22BACCE3AEA9475
                    SHA1:E8AC5276E6C95CEDDBFFC0489CE788A33561B635
                    SHA-256:7E17A4F4734614757A384A28D6D26C9F68162318459658A354EA6BB550A7FA5E
                    SHA-512:8F4CF9D4DFD08441AB2CF460A3A1D17C12A746F016708A253E9ADE36B74A32B84E8D88B586B10BD665589001D4E27FF4FFF20CB08E5BF59D0E0F6B6AF55586A2
                    Malicious:false
                    Preview:[Device Install Log].. OS Version = 10.0.19045.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2023/10/03 09:57:02.288]....>>> [Setup Import Driver Package - C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2023/10/03 09:57:37.904.. cmd: C:\Windows\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1806.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 09:57:37.920.. pol: {Driver package policy check - exit(0x00000000)} 09:57:37.920.. sto: {Stage Driver Package: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf: {Query Configurability: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf:
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Imaging Edge Webcam, Author: Sony Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Imaging Edge Webcam., Create Time/Date: Fri Oct 6 08:39:02 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2, Template: x64;0, Last Saved By: x64;0, Revision Number: {77F8518A-144A-4DB2-80EB-C544B68375EE}1.1.03.10061;{95690A63-A7AD-4F7B-8CD3-F94BF8573A8E}1.1.03.10061;{28FB0552-E7A4-4193-ACA1-2CA8F06EC841}, Number of Pages: 300, Number of Characters: 0
                    Category:dropped
                    Size (bytes):7835648
                    Entropy (8bit):7.491189626154171
                    Encrypted:false
                    SSDEEP:196608:+eziaII6eYf7Rl7NyygJ7xzNc4qeQm/e:+e2Ei7P7NydJ1Nc4Um
                    MD5:DF408B38D2630AAA6CC578F1020C9B05
                    SHA1:D017A4DB82EC7F459DD5669FF73ED55DFC442E47
                    SHA-256:EFF867158BDE9EE33DA8E313E93F1E49E3EFA329AC0EE9397744D2DA2C7E650A
                    SHA-512:6E8E1E9F6933BDD9623760DF64AE102EBF56A053162310A7EA3649670053084BFEA58769ABE7145227BAB003DC2C767FF4A8F8FFE82BF0E9BC6BF71FB4F17C45
                    Malicious:false
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):123904
                    Entropy (8bit):6.019348446512073
                    Encrypted:false
                    SSDEEP:3072:qC2+1/jC6wmMJjS42JOhbdgf2373x8Yyrpb:qCnl6mM9x26bOmx8YK
                    MD5:DE475943D21409F1372093D37FC0A0C8
                    SHA1:3B634C2A2470718A23EEFA3386C8AF724EA2D1AE
                    SHA-256:EB6100F6194060C59C979B470795336F1ECD59757F131A7B7EBA9A6B3B829677
                    SHA-512:6F42A1CC2B097A8C6498C03AA5E5E538CF6B4D1420734A7CCD7A21C45EE0B5867E06F8DB8E58987C9BA792864104B11C911C6775295781133CFAFB0DF897C08D
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........s.s.s..~..s....s....s....s....s....s.2..s....s.s..r.l..s.l..s.l....s.l..s.Rich.s.................PE..d...j..e.........." .....>...........4.......................................0............`.........................................`.......\...h...............0............ ..0.......p.......................(.......8............P..P............................text....<.......>.................. ..`.rdata..T}...P...~...B..............@..@.data...`...........................@....pdata..0...........................@..@.rsrc...............................@..@.reloc..0.... ......................@..B................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):216496
                    Entropy (8bit):6.646208142644182
                    Encrypted:false
                    SSDEEP:3072:/Jz/kyKA1X1dxbOZU32KndB4GLvyui2lhQtEaY4IDflQn0xHuudQ+cxEHSiZxaQ:/t/kE1jOZy2KL4GBiwQtEa4L2sV
                    MD5:A3AE5D86ECF38DB9427359EA37A5F646
                    SHA1:EB4CB5FF520717038ADADCC5E1EF8F7C24B27A90
                    SHA-256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
                    SHA-512:96ECB3BC00848EEB2836E289EF7B7B2607D30790FFD1AE0E0ACFC2E14F26A991C6E728B8DC67280426E478C70231F9E13F514E52C8CE7D956C1FAD0E322D98E0
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........................^.......\......].........................,.......<.........L...'.....'.....'.P.......8.....'.....Rich............................PE..L...Ap.]...........!.........P............................................................@.........................@................P..x....................`..........T...............................@...............<............................text...[........................... ..`.rdata..............................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):759959
                    Entropy (8bit):6.618384452341439
                    Encrypted:false
                    SSDEEP:12288:9ilVM9xkm/BilVM9xkm/s/m4/mXt3jOZy2KsGU6a4KsFt3jOZy2KsGU6a4KsD:9GCHBGCHALAzOE2Z34K4zOE2Z34KA
                    MD5:193D78F1C54582BE386624DD6B492A8B
                    SHA1:D617990431D9AED20D26E33FD6A66765EC722F80
                    SHA-256:ECE5DCAF6792EE5FB41782CB9C18ACE98A38B52211B92D06BF02CB5B97CD931E
                    SHA-512:608DC7FC56C244B0996E84216530BDDB9CE8662B57758A5D585545D8050F7FBEA9B7C319870585A8E5458BD4F7E81E58970D6D23CAA39AE7E874D43DA8DAFCCF
                    Malicious:false
                    Preview:...@IXOS.@.....@.*WY.@.....@.....@.....@.....@.....@......&.{77F8518A-144A-4DB2-80EB-C544B68375EE}..Imaging Edge Webcam..SetupIEW.msi.@.....@.....@.....@......IEAppIcon..&.{C2734D1F-96B7-436D-B504-71D79D323D6F}.....@.....@.....@.....@.......@.....@.....@.......@......Imaging Edge Webcam......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@T....@.....@.]....&.{4C93B565-41C9-48B2-B862-116FEF58ECC1}A.22:\Software\Sony Corporation\Imaging Edge Webcam\InstallLocation.@.......@.....@.....@......&.{54C6D863-4FC1-4FE5-A9B7-46A720CCF24A}4.C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exe.@.......@.....@.....@......&.{D53B1643-8E2E-447D-B669-61B1D8B43CD8}9.C:\Program Files\Sony\Imaging Edge Webcam\webcam_help.ico.@.......@.....@.....@......&.{4BD875C8-7141-4C72-A4DD-A0672A296295}6.C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exe.@.......@.....@.....@......&.{05F329B1-BCBC-4B
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):216496
                    Entropy (8bit):6.646208142644182
                    Encrypted:false
                    SSDEEP:3072:/Jz/kyKA1X1dxbOZU32KndB4GLvyui2lhQtEaY4IDflQn0xHuudQ+cxEHSiZxaQ:/t/kE1jOZy2KL4GBiwQtEa4L2sV
                    MD5:A3AE5D86ECF38DB9427359EA37A5F646
                    SHA1:EB4CB5FF520717038ADADCC5E1EF8F7C24B27A90
                    SHA-256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
                    SHA-512:96ECB3BC00848EEB2836E289EF7B7B2607D30790FFD1AE0E0ACFC2E14F26A991C6E728B8DC67280426E478C70231F9E13F514E52C8CE7D956C1FAD0E322D98E0
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........................^.......\......].........................,.......<.........L...'.....'.....'.P.......8.....'.....Rich............................PE..L...Ap.]...........!.........P............................................................@.........................@................P..x....................`..........T...............................@...............<............................text...[........................... ..`.rdata..............................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:modified
                    Size (bytes):123904
                    Entropy (8bit):6.019348446512073
                    Encrypted:false
                    SSDEEP:3072:qC2+1/jC6wmMJjS42JOhbdgf2373x8Yyrpb:qCnl6mM9x26bOmx8YK
                    MD5:DE475943D21409F1372093D37FC0A0C8
                    SHA1:3B634C2A2470718A23EEFA3386C8AF724EA2D1AE
                    SHA-256:EB6100F6194060C59C979B470795336F1ECD59757F131A7B7EBA9A6B3B829677
                    SHA-512:6F42A1CC2B097A8C6498C03AA5E5E538CF6B4D1420734A7CCD7A21C45EE0B5867E06F8DB8E58987C9BA792864104B11C911C6775295781133CFAFB0DF897C08D
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........s.s.s..~..s....s....s....s....s....s.2..s....s.s..r.l..s.l..s.l....s.l..s.Rich.s.................PE..d...j..e.........." .....>...........4.......................................0............`.........................................`.......\...h...............0............ ..0.......p.......................(.......8............P..P............................text....<.......>.................. ..`.rdata..T}...P...~...B..............@..@.data...`...........................@....pdata..0...........................@..@.rsrc...............................@..@.reloc..0.... ......................@..B................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):49152
                    Entropy (8bit):0.7688271611489322
                    Encrypted:false
                    SSDEEP:12:JSbX72FjhAGiLIlHVRpfh/7777777777777777777777777vDHFlyRtpwl0i8Q:JnQI5b/yDF
                    MD5:C8141C2BE48DDF3430AB93C7CE5C628A
                    SHA1:55314BB1CAB90C022BCD0DB3F05CA63763384D0F
                    SHA-256:99BABF0868461D0F6FBE9C7F8C2E5B8203AD699865F4FF5B0B8B7D9D285F0C4D
                    SHA-512:38B07D6432A6034FAE3C6041AC6591C6B2B8D9DEE5281FDE2B678FF1B088166B61A60A854A0461E126F11BE4231E4FD427437716C2918EF387D0F08C4738F9AC
                    Malicious:false
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):1.2869139659306428
                    Encrypted:false
                    SSDEEP:48:lcPuOBth8FXz1T5e9385JN92bQ1d9hSJ6Ad94o9385JNRQ/PEK+d9hSI1jm:iPe7T6sskrgfskc7A
                    MD5:F7C97F482027CDAD99B30D2E4BAEFBCC
                    SHA1:668EC174360AD95AB0B9E39193B48C71181745F8
                    SHA-256:BF86A23C1D4807DE518A2D357330ED9E740623AE82FA19F7862BA896047440B5
                    SHA-512:C9FC797F22B065575D310A4682203FC1CEF6520516942E6318ABAD63D1231001562B2FD722E748DD7233D73731B7C29C35A6A96C53795457FE30131B57BF9A8E
                    Malicious:false
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):432221
                    Entropy (8bit):5.375171344080192
                    Encrypted:false
                    SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauv:zTtbmkExhMJCIpErG
                    MD5:4155E424122C972B4DA48C6BEC026A36
                    SHA1:95C6EB2F988E1DB6F58744D5BDFE40CE4EA22BB3
                    SHA-256:F8AD1317050C2B3FA44F22056677A9E76ECD237AC2AE0EBD735AAB3D0DF025D4
                    SHA-512:9DD96D806B8B038E4B3ABCFE42F83897703268DE20CAAA583B4749BF8BE780478D9A6859D593539A01B3AE8E4F512FEF2302188DFF169874563409D0DBD0B7C1
                    Malicious:false
                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):11824
                    Entropy (8bit):7.486155218369192
                    Encrypted:false
                    SSDEEP:192:1/hzypINyby2sE9jBF6IYiYF8pA5K+oBf1hZFqrrvxwiRE:VNyb8E9VF6IYinAM+oZinvDE
                    MD5:9BC95EAB4A2B29AEC769D9A217F5A736
                    SHA1:E3D42ECDCEFC29FCCC56A366749A5149C2BF14F9
                    SHA-256:344DB9816BA7794DBF3AEBF4C4F5E6C9A2CF9CE0CD0ACBF24D14167E85D5711D
                    SHA-512:99795FBB4282F3E56F2B2824A6822C1A1A643B0879A96250B2DBA23A7916387EDC2EFAE70918A02E0155BE8B4E0A37635854908AA9F275A093A6ADE0D96463C1
                    Malicious:false
                    Preview:0..,..*.H..........0......1.0...`.H.e......0.....+.....7......0..~0...+.....7.....no.<CxsH.,.)(.|0..231006041348Z0...+.....7.....0...0....+.........q.,+...]1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0..+. 5...E.%..B.....)..;\;.@..R...1...0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0\..+.....7...1N0L...F.i.l.e.......:i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m._.d.r.i.v.e.r...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 5...E.%..B.....)..;\;.@..R...0.... 67.k.],@A.q...1E....S(..~z..G.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 67.k.],@A.q...1E....S(..~z..G.0..". L...].Vs..=...-.....l8.9K.7..9.d1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r.....
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):269832
                    Entropy (8bit):6.601133670257957
                    Encrypted:false
                    SSDEEP:3072:N/HJDlyWARYazWLkQc3UUMGag32TwVVzJ2F2aFPjVCTxnIko7sU2Cp135qTCm:N/JlyKkQcThCwVVzfaFPY7Kn2CpCum
                    MD5:D54CE0AC27BFB7E5854BF0F3F2141987
                    SHA1:76F987FA9DA987D330C0F50327D2C7E88B2073A7
                    SHA-256:5ACAF60D46D5E456AD8B414467D9C66DE3C41CDAE4E136902F3F1B61DCBBEB5B
                    SHA-512:B1D31B706F44CB5E5795DA442BEB5D53F2475390827AA32B322D0A160B82858EBEA0AA69970EF7DA59FD00ABE14AABA77AEB83AA11EDE00CDD0A3D3CDA9DB344
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................................................y....u.......u.......uk......u......Rich............PE..d...o..e.........." ...%............ ........................................`............`A...........................................t...T........@...................(...P...... H..p............................F..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....0......."..................@....pdata..............................@..@_RDATA.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):36368
                    Entropy (8bit):6.435140914980148
                    Encrypted:false
                    SSDEEP:768:mgfeLgDor29cA10SlHRxtqEpYinAMxUrd4/W:mgY29cAqsL7HxUrd4+
                    MD5:0624BDCA7C1E1BF264234BE33FD12FF4
                    SHA1:F458D3E7300724EE88D21475B1E6A02E85FE2E82
                    SHA-256:B73D7118E561CB099551FB2E902295381075E4BDF07732D13C3A3580D30210C7
                    SHA-512:5DBD15EAC5628445AC9C79ECB108B71D22BBB68D54A0D9D874BBEF8581963ADA3C58E09D78DEF61B293B9EB23033F45712797B2D762A6144F90584C0556F5912
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\i..\i..\i..I...Ci..I...Ui..I...Yi..U...Li......_i..\i...i......^i......^i......^i..d.._i..d..]i..d..]i..Rich\i..................PE..d...w..e.........." ...%.2...8......."...............................................5....`A.........................................m..`....n.......................f...(......0....f..8............................d..@............P...............................text....0.......2.................. ..`.rdata..d$...P...&...6..............@..@.data................\..............@....pdata...............^..............@..@_RDATA...............b..............@..@.reloc..0............d..............@..B........................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:Windows setup INFormation
                    Category:dropped
                    Size (bytes):4253
                    Entropy (8bit):5.639653386929951
                    Encrypted:false
                    SSDEEP:96:5vAUyYLUOMnTXI4vj4vi4vN5mbQ5iXhug5JcoQy654gzuf/9ADGAIKDUDddECahl:xAUJzMnTXI4vj4vi4vN5mbQ5iXhug5Jc
                    MD5:CF4188B255F5EF62D58B8EDA3E7BE0B8
                    SHA1:7628031BD425A5DD1AA21DC5689961FBD5456690
                    SHA-256:4CB21C2E5D885673F5993DE513A32D04AC01E6E26C38EB394BC237D3DD39AB64
                    SHA-512:518C567A5E7073AED0981775FF53A6AA383F22204ACAF734C1765DAC4CFF28310412A9152F15790F4198281A71A765004B699723DB13782D0546DED983A0497E
                    Malicious:false
                    Preview:;..; SimpleMediaSourceDriver.inf..;....[Version]..Signature="$WINDOWS NT$"..Class=Camera..ClassGuid={ca3e7ab9-b4c3-4ae6-8251-579ef933890f} ;.E.J.E..E..E..E..E.f.E.o.E.C.E.X.E..L.E..E.GUID //.E..X.E..E..E.....PnpLockdown=1..Provider=%ProviderString%..DriverVer = 10/06/2023,13.13.41.473..CatalogFile=ImagingEdgeWebcam.cat....[DestinationDirs]..UMDriverCopy=12,UMDF ; copy to driversMdf..CustomCaptureSourceCopy=11....[SourceDisksNames]..1 = %DiskId1%,,,""....[SourceDisksFiles]..ImagingEdgeWebcam_Driver.dll = 1,,..ImagingEdgeWebcam.dll = 1,,....;*****************************************..; SimpleMFSource Install Section..;*****************************************....[Manufacturer]..%StdMfg%=Standard,NTamd64....[Standard.NTamd64]..%ImagingEdgeWebcam.DeviceDesc%=ImagingEdgeWebcam, root\ImagingEdgeWebcam....;---------------- copy files..[ImagingEdgeWebcam.NT]..CopyFiles=UMDriverCopy, CustomCaptureSourceCopy..AddReg = CustomCaptureSource.ComRegistration....;-------------------------------
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):11824
                    Entropy (8bit):7.486155218369192
                    Encrypted:false
                    SSDEEP:192:1/hzypINyby2sE9jBF6IYiYF8pA5K+oBf1hZFqrrvxwiRE:VNyb8E9VF6IYinAM+oZinvDE
                    MD5:9BC95EAB4A2B29AEC769D9A217F5A736
                    SHA1:E3D42ECDCEFC29FCCC56A366749A5149C2BF14F9
                    SHA-256:344DB9816BA7794DBF3AEBF4C4F5E6C9A2CF9CE0CD0ACBF24D14167E85D5711D
                    SHA-512:99795FBB4282F3E56F2B2824A6822C1A1A643B0879A96250B2DBA23A7916387EDC2EFAE70918A02E0155BE8B4E0A37635854908AA9F275A093A6ADE0D96463C1
                    Malicious:false
                    Preview:0..,..*.H..........0......1.0...`.H.e......0.....+.....7......0..~0...+.....7.....no.<CxsH.,.)(.|0..231006041348Z0...+.....7.....0...0....+.........q.,+...]1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0..+. 5...E.%..B.....)..;\;.@..R...1...0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0\..+.....7...1N0L...F.i.l.e.......:i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m._.d.r.i.v.e.r...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 5...E.%..B.....)..;\;.@..R...0.... 67.k.],@A.q...1E....S(..~z..G.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,i.m.a.g.i.n.g.e.d.g.e.w.e.b.c.a.m...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 67.k.],@A.q...1E....S(..~z..G.0..". L...].Vs..=...-.....l8.9K.7..9.d1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r.....
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):269832
                    Entropy (8bit):6.601133670257957
                    Encrypted:false
                    SSDEEP:3072:N/HJDlyWARYazWLkQc3UUMGag32TwVVzJ2F2aFPjVCTxnIko7sU2Cp135qTCm:N/JlyKkQcThCwVVzfaFPY7Kn2CpCum
                    MD5:D54CE0AC27BFB7E5854BF0F3F2141987
                    SHA1:76F987FA9DA987D330C0F50327D2C7E88B2073A7
                    SHA-256:5ACAF60D46D5E456AD8B414467D9C66DE3C41CDAE4E136902F3F1B61DCBBEB5B
                    SHA-512:B1D31B706F44CB5E5795DA442BEB5D53F2475390827AA32B322D0A160B82858EBEA0AA69970EF7DA59FD00ABE14AABA77AEB83AA11EDE00CDD0A3D3CDA9DB344
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................................................y....u.......u.......uk......u......Rich............PE..d...o..e.........." ...%............ ........................................`............`A...........................................t...T........@...................(...P...... H..p............................F..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....0......."..................@....pdata..............................@..@_RDATA.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):36368
                    Entropy (8bit):6.435140914980148
                    Encrypted:false
                    SSDEEP:768:mgfeLgDor29cA10SlHRxtqEpYinAMxUrd4/W:mgY29cAqsL7HxUrd4+
                    MD5:0624BDCA7C1E1BF264234BE33FD12FF4
                    SHA1:F458D3E7300724EE88D21475B1E6A02E85FE2E82
                    SHA-256:B73D7118E561CB099551FB2E902295381075E4BDF07732D13C3A3580D30210C7
                    SHA-512:5DBD15EAC5628445AC9C79ECB108B71D22BBB68D54A0D9D874BBEF8581963ADA3C58E09D78DEF61B293B9EB23033F45712797B2D762A6144F90584C0556F5912
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\i..\i..\i..I...Ci..I...Ui..I...Yi..U...Li......_i..\i...i......^i......^i......^i..d.._i..d..]i..d..]i..Rich\i..................PE..d...w..e.........." ...%.2...8......."...............................................5....`A.........................................m..`....n.......................f...(......0....f..8............................d..@............P...............................text....0.......2.................. ..`.rdata..d$...P...&...6..............@..@.data................\..............@....pdata...............^..............@..@_RDATA...............b..............@..@.reloc..0............d..............@..B........................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\drvinst.exe
                    File Type:Windows setup INFormation
                    Category:dropped
                    Size (bytes):4253
                    Entropy (8bit):5.639653386929951
                    Encrypted:false
                    SSDEEP:96:5vAUyYLUOMnTXI4vj4vi4vN5mbQ5iXhug5JcoQy654gzuf/9ADGAIKDUDddECahl:xAUJzMnTXI4vj4vi4vN5mbQ5iXhug5Jc
                    MD5:CF4188B255F5EF62D58B8EDA3E7BE0B8
                    SHA1:7628031BD425A5DD1AA21DC5689961FBD5456690
                    SHA-256:4CB21C2E5D885673F5993DE513A32D04AC01E6E26C38EB394BC237D3DD39AB64
                    SHA-512:518C567A5E7073AED0981775FF53A6AA383F22204ACAF734C1765DAC4CFF28310412A9152F15790F4198281A71A765004B699723DB13782D0546DED983A0497E
                    Malicious:false
                    Preview:;..; SimpleMediaSourceDriver.inf..;....[Version]..Signature="$WINDOWS NT$"..Class=Camera..ClassGuid={ca3e7ab9-b4c3-4ae6-8251-579ef933890f} ;.E.J.E..E..E..E..E.f.E.o.E.C.E.X.E..L.E..E.GUID //.E..X.E..E..E.....PnpLockdown=1..Provider=%ProviderString%..DriverVer = 10/06/2023,13.13.41.473..CatalogFile=ImagingEdgeWebcam.cat....[DestinationDirs]..UMDriverCopy=12,UMDF ; copy to driversMdf..CustomCaptureSourceCopy=11....[SourceDisksNames]..1 = %DiskId1%,,,""....[SourceDisksFiles]..ImagingEdgeWebcam_Driver.dll = 1,,..ImagingEdgeWebcam.dll = 1,,....;*****************************************..; SimpleMFSource Install Section..;*****************************************....[Manufacturer]..%StdMfg%=Standard,NTamd64....[Standard.NTamd64]..%ImagingEdgeWebcam.DeviceDesc%=ImagingEdgeWebcam, root\ImagingEdgeWebcam....;---------------- copy files..[ImagingEdgeWebcam.NT]..CopyFiles=UMDriverCopy, CustomCaptureSourceCopy..AddReg = CustomCaptureSource.ComRegistration....;-------------------------------
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:5l:7
                    MD5:2DD3F3C33E7100EC0D4DBBCA9774B044
                    SHA1:B254D47F2B9769F13B033CAE2B0571D68D42E5EB
                    SHA-256:5A00CC998E0D0285B729964AFD20618CBAECFA7791FECDB843B535491A83AE21
                    SHA-512:C719D8C54A3A749A41B8FC430405DB7FCDE829C150F27C89015793CA06018AD9D6833F20AB7E0CFDA99E16322B52A19C080E8C618F996FC8923488819E6E14BB
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):1048576
                    Entropy (8bit):0.011583993782604628
                    Encrypted:false
                    SSDEEP:24:6nwWs0UqdnP8VafYH434zXtUEzZ5Y0ncR3ZgtvnQIl:MwWf7YK4zXtUEzZ5Y0E3OyI
                    MD5:B6ABCA0DEB50E5CE4E5869070B6ED178
                    SHA1:10187043BFAB3DB482803E6420DAB5F5970824ED
                    SHA-256:88BE8CEB1EC1282BBCD9418D687E302361A3CEAFB79639AC529B92D0EBBF143E
                    SHA-512:A42E386458AB798CFE8E2CB2E0F63842C1717BB3119057183785CFA45A92C76E27C0BDB8D84A0FC1E3294EFCEA31DE4E04E8FA1B0D33D8E432A4143EBA32140C
                    Malicious:false
                    Preview:CMMM ...................CMMM......dJ.... .......................5C..-g...r..p;!#e.5.d.7.c.7.a.a.4.a.6.4.f.3.1.c...BM............|............. ......................................... niW.........................................................................................................i.P.i.P.................................................i...i...i...i...i...i.......................................i.0.i...t..+...+....t...i...i.0.............................i.0.i......6...:...9...5....y...i...i.0.....................i.0.i......;...;...........9...9........i...i.0.................i...y..8...;...;...........:...9...5....y...i...............i.`.i..1...<...<...;...;...;...:...:...9........i...i.`.........i......=...=...<...<...........;...:...:...9........i...........i..+...>...=...=...<...........;...;...:...:...'....i...........i../...>...>...=...=...........;...;...;...:...,....i...........i..?...>...>...>...=...........<...;...;...;...:....i...........i..?...?...>...>...>.......
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:A/lll:A/
                    MD5:635E15CB045FF4CF0E6A31C827225767
                    SHA1:F1EAAA628678441481309261FABC9D155C0DD6CB
                    SHA-256:67219E5AD98A31E8FA8593323CD2024C1CA54D65985D895E8830AE356C7BDF1D
                    SHA-512:81172AE72153B24391C19556982A316E16E638F5322B11569D76B28E154250D0D2F31E83E9E832180E34ADD0D63B24D36DD8A0CEE80E8B46D96639BFF811FA58
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:7/lll:x
                    MD5:F6B463BE7B50F3CC5D911B76002A6B36
                    SHA1:C94920D1E0207B0F53D623A96F48D635314924D2
                    SHA-256:16E4D1B41517B48CE562349E3895013C6D6A0DF4FCFFC2DA752498E33C4D9078
                    SHA-512:4D155DFEDD3D44EDFBBE7AC84D3E81141D4BB665399C2A5CF01605C24BD12E6FAF87BB5B666EA392E1B246005DFABDE2208ED515CD612D34BAC7F965FD6CC57E
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:lX:1
                    MD5:2D84AD5CFDF57BD4E3656BCFD9A864EA
                    SHA1:B7B82E72891E16D837A54F94960F9B3C83DC5552
                    SHA-256:D241584A3FD4A91976FAFD5EC427E88F6E60998954DEC39E388AF88316AF3552
                    SHA-512:0D9BC1EE51A4FB91B24E37F85AFBF88376C88345483D686C6CFF84066544287C98534AA701D7D4D52E53F10A3BEA73EE8BC38D18425FDE6D66352F8B76C0CBB5
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:2/l/:S/
                    MD5:60476A101249AEDFF09A43E047040191
                    SHA1:DE5B6A0ADC7DE7180E19286CF0F13567278CDB64
                    SHA-256:35BC77A06BFDDE8C8F3A474C88520262B88C7B8992EE6B2D5CF41DDDC77A83FB
                    SHA-512:F1D2DCC562A36434C6C6405EC4EAC7ECFA76FC5A940114DA6F94495B77584A132D5D82AD3556DF749490BE096CFD238FA8B484B7C734CBC4D074E963E5D451F4
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:3X:n
                    MD5:AE6FBDED57F9F7D048B95468DDEE47CA
                    SHA1:C4473EA845BE2FB5D28A61EFD72F19D74D5FC82E
                    SHA-256:D3C9D1FF7B54B653C6A1125CAC49F52070338A2DD271817BBA8853E99C0F33A9
                    SHA-512:F119D5AD9162F0F5D376E03A9EA15E30658780E18DD86E81812DDA8DDF59ADDD1DAA0706B2F5486DF8F17429C2C60AA05D4F041A2082FD2EC6EA8CC9469FADE3
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:Wtl:WX
                    MD5:D192F7C343602D02E3E020807707006E
                    SHA1:82259C6CB5B1F31CC2079A083BC93C726BFC4FBF
                    SHA-256:BB4D233C90BDBEE6EF83E40BFF1149EA884EFA790B3BEF496164DF6F90297C48
                    SHA-512:AEC90CF52646B5B0EF00CEB2A8D739BEFE456D08551C031E8DEC6E1F549A6535C1870ADB62EEC0A292787AE6A7876388DD1B2C884CBA8CC6E2D7993790102F43
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:s:s
                    MD5:2A8875D2AF46255DB8324AAD9687D0B7
                    SHA1:7A066FA7B69FB5450C26A1718B79AD27A9021CA9
                    SHA-256:54097CCCAE0CFCE5608466BA5A5CA2A3DFEAC536964EEC532540F3B837F5A7C7
                    SHA-512:2C39F05A4DFFD30800BB7FBB3FF2018CF4CC96398460B7492F05CE6AFD59079FD6E3EB7C4F8384A35A954A22B4934C162A38534AD76CFB2FD772BCF10E211F7C
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:a/l/:e/
                    MD5:F732BF1006B6529CFFBA2B9F50C4B07F
                    SHA1:D3E8D4AF812BBC4F4013C53C4FFAB992D1D714E3
                    SHA-256:77739084A27CB320F208AC1927D3D9C3CAC42748DBDF6229684EF18352D95067
                    SHA-512:064D56217AEB2980A3BFAA1E252404613624D600C3A08B5CF0ADCB259596A1C60EE903FDC2650972785E5AE9B7B51890DED01EC4DA7B4DE94EBDA08AEAF662DF
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:EX:EX
                    MD5:FC94FE7BD3975E75CEFAD79F5908F7B3
                    SHA1:78E7DA8D08E8898E956521D3B1BABBF6524E1DCA
                    SHA-256:EE1ED3B49720B22D5FDA63D3C46D62A96CA8838C76AB2D2F580B1E7745521AA5
                    SHA-512:4CEAF9021B30734F4CE8B4D4A057539472E68C0ADD199CF9C3D1C1C95320DA3884CAF46943FC9F7281607AB7FA6476027860EBED8BBAA9C44B3F4056B5E074D3
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):7416
                    Entropy (8bit):0.1225205706908585
                    Encrypted:false
                    SSDEEP:3:tn6lBlll9/l9elgBy7EtJR1//:0BtEgBy7EtD1X
                    MD5:F66C1E91A38A47F00091D2F19BD30334
                    SHA1:1B75D4E1D72D01B86A8D7FE356A90F3BF98C6768
                    SHA-256:D8410DD3940576405A5E5F0E0A970AFC67497AD195F02665A2BD819217BB1C64
                    SHA-512:0F169CCA72A8804F9AD37424569A0B1DA1FB8CB4FC77313251926261F1C19063ABB3333499DB8D7BD932BD80F57037EFAD846AE39863C37B74214AF81FD2788A
                    Malicious:false
                    Preview:..0 IMMM ...............e...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:6:6
                    MD5:379523B9F5D5B954E719B664846DBF8F
                    SHA1:930823EC80B85EDD22BAF555CAD21CDF48F066AA
                    SHA-256:3C9002CAEDF0C007134A7E632C72588945A4892B6D7AD3977224A6A5A7457BF4
                    SHA-512:ECA44DE86BBC3309FA6EAB400154D123DCD97DC1DB79554CE58CE2426854197E2365F5EEE42BAC6E6E9455561B206F592E159EF82FAF229212864894E6021E98
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:V/l/:/
                    MD5:5F243BF7CC0A348B6D31460A91173E71
                    SHA1:5696B34625F027EC01765FC2BE49EFCFD882BF8E
                    SHA-256:1B1AED169F2ACFAE4CF230701BDA91229CB582FF2CE29A413C5B8FE3B890D289
                    SHA-512:9E08DFBBF20668B86DF696A0D5969E04E6EE4A67E997FF392099BC7FF184B1B8965502215744BE7FE423668B69099242BBA54DF3F0BFE4E70ACDC7CAD8195B02
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):24
                    Entropy (8bit):1.6368421881310118
                    Encrypted:false
                    SSDEEP:3:J:J
                    MD5:DB7C049E5E4E336D76D5A744C28C54C8
                    SHA1:A4DB9C8586B9E4FA24416EB0D00F06A9EBD16B02
                    SHA-256:E8830E7AC4088CF3DD464CAEC33A0035D966A7DE5AE4EFC3580D59A41916FF7B
                    SHA-512:B614037FB1C7D19D704BF15F355672114D25080223E7EE4424AD2CB7B89782219E7877B373BBC7FA44F3AD8DF8A27EEF4E8CCC765D44EC02A61E3B7FAE88AE69
                    Malicious:false
                    Preview:CMMM ...................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):512
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3::
                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                    Malicious:false
                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):1.2869139659306428
                    Encrypted:false
                    SSDEEP:48:lcPuOBth8FXz1T5e9385JN92bQ1d9hSJ6Ad94o9385JNRQ/PEK+d9hSI1jm:iPe7T6sskrgfskc7A
                    MD5:F7C97F482027CDAD99B30D2E4BAEFBCC
                    SHA1:668EC174360AD95AB0B9E39193B48C71181745F8
                    SHA-256:BF86A23C1D4807DE518A2D357330ED9E740623AE82FA19F7862BA896047440B5
                    SHA-512:C9FC797F22B065575D310A4682203FC1CEF6520516942E6318ABAD63D1231001562B2FD722E748DD7233D73731B7C29C35A6A96C53795457FE30131B57BF9A8E
                    Malicious:false
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):0.07062011336967261
                    Encrypted:false
                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOHFxIudYllt4Vky6lw:2F0i8n0itFzDHFlyJw
                    MD5:74A01024EEB87C03F05C16180485D378
                    SHA1:247F3EA508CDBC04EBABA583AE2BE0C20647AA5A
                    SHA-256:08DE02A9083CB12438EEB321E45B4DB3DC360B2AC81A4082724754B5F8792BA8
                    SHA-512:BCFF47E0FC7EF3E6BA5AB8D88BF558AEFE2A8E441C58CD1C0AF58C22129EFF9140AAA33B07C896A8BD9E47D0249A8BE67CC63A7E9DE25481AC30EBA0C74EC7D4
                    Malicious:false
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):81920
                    Entropy (8bit):0.1401776336813471
                    Encrypted:false
                    SSDEEP:48:Qjm5md9hSPd9hSJ6Ad94o9385JNRQ/PEK6bQk9385JN9:RswgfskcZkys
                    MD5:2414446BD3860DCE4C60DA542F3BB4D0
                    SHA1:5FB7FBADB83C8493057B0D7451564A5361ECC1C2
                    SHA-256:194BB4EC4D02FCDF119464076CFDB627A0AC5851E61C6E37853744B8273AA042
                    SHA-512:8548ABA64C64308D7913D92E0151EAFD63A32AE1A2B683D1456FA9E4782EBDAA5131F6589F89AEF041E8FD1607E80FE73E6DFC384EFF7666E3338D1202250173
                    Malicious:false
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.955261679278543
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:IEW113_2311a.exe
                    File size:5'302'512 bytes
                    MD5:1bb2447f9ae84781bcfa73eda1606d72
                    SHA1:6c875dd5404a67ceb1d3aee207be4286cbd8dd93
                    SHA256:45f839521bdf4ebfeb32d8dd17ea33133e3c7ae67c6859380bea02cf56cf30f6
                    SHA512:fed923b0bb7f303b721f374f677ff61ce588d40c08a839436f82bf27c10638b4a5a1ad9ef5d518d05450cd308bd1dbdaf079bc840c81adfeeba3397986f67f9c
                    SSDEEP:98304:cp2gHRKe350tDLaAaPgmprQy19r0J8rk4Dn+7UU+My/UsvUl:qZHRK/aomK69r0irkqz/UKUl
                    TLSH:5536222123FA8124F5F3AA35E8B45AA0497EBF61DB31C18F028471599DB0AD2D674F37
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................u.i.....u.k.Q...u.j.....................................i.......i.g.............i.......Rich...
                    Icon Hash:c486d8e8c898bec6
                    Entrypoint:0x416600
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x62C64C93 [Thu Jul 7 03:01:39 2022 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:625fd66a582e409127cd1cdc0a7095d1
                    Signature Valid:true
                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                    Signature Validation Error:The operation completed successfully
                    Error Number:0
                    Not Before, Not After
                    • 27/02/2023 00:00:00 10/03/2024 23:59:59
                    Subject Chain
                    • CN=Sony Corporation, OU=IP&S Business Group System Software Technology Center, O=Sony Corporation, L=Minato-ku, S=Tokyo, C=JP
                    Version:3
                    Thumbprint MD5:92284C5D1109515A6668BC680ACAF759
                    Thumbprint SHA-1:2819D44235A9F7AC57AFBE2F1D230A263678F0A7
                    Thumbprint SHA-256:3DCC9955BED85FA0D50737C3D3ED1B761BB7238AA8508B9E85BA0751041A41F6
                    Serial:0A8EAA1450F2739E6FD55CAC142144F3
                    Instruction
                    push ebp
                    mov ebp, esp
                    push ecx
                    lea ecx, dword ptr [ebp-04h]
                    call 00007F02F87E0CA9h
                    lea eax, dword ptr [ebp-04h]
                    mov dword ptr [00446B54h], eax
                    call 00007F02F87FCE4Dh
                    mov dword ptr [00446B54h], 00000000h
                    mov esp, ebp
                    pop ebp
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    mov ebp, esp
                    push FFFFFFFFh
                    push 00435E41h
                    mov eax, dword ptr fs:[00000000h]
                    push eax
                    sub esp, 2Ch
                    push ebx
                    push esi
                    push edi
                    mov eax, dword ptr [00445880h]
                    xor eax, ebp
                    push eax
                    lea eax, dword ptr [ebp-0Ch]
                    mov dword ptr fs:[00000000h], eax
                    mov ebx, ecx
                    mov dword ptr [ebp-38h], ebx
                    xor edi, edi
                    xor ecx, ecx
                    mov dword ptr [ebp-20h], edi
                    mov eax, dword ptr [ebx+04h]
                    mov dword ptr [ebp-24h], ecx
                    test eax, eax
                    je 00007F02F87E15E3h
                    cmp ecx, eax
                    jnc 00007F02F87E1641h
                    mov eax, dword ptr [ebx]
                    lea ebx, dword ptr [eax+ecx*4]
                    mov eax, dword ptr [ebx]
                    cmp dword ptr [eax-0Ch], 00000000h
                    jng 00007F02F87E15DCh
                    push 0000002Dh
                    push eax
                    call 00007F02F87F9AB3h
                    mov esi, eax
                    add esp, 08h
                    mov eax, dword ptr [ebx]
                    test esi, esi
                    je 00007F02F87E15C5h
                    sub esi, eax
                    sar esi, 1
                    js 00007F02F87E15BBh
                    push esi
                    lea eax, dword ptr [ebp-18h]
                    mov ecx, ebx
                    push eax
                    call 00007F02F87DAC1Dh
                    mov dword ptr [ebp-04h], 00000000h
                    lea ecx, dword ptr [esi+01h]
                    mov eax, dword ptr [ebx]
                    mov eax, dword ptr [eax-0Ch]
                    Programming Language:
                    • [ C ] VS2008 SP1 build 30729
                    • [IMP] VS2008 SP1 build 30729
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x437180x3c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000x29a58.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x50c1900x2760
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x710000x2b48.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x3fda00x70.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x3fe100x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3ceb80x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x370000x2b8.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x42c940x180.rdata
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x357b90x358007800336e3463abd4add27c8b381ad955False0.5227895005841121data6.540898105421263IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x370000xd6b40xd800f07ff23f4d77b09d8b78b27d4d86a4d6False0.41793258101851855data4.903709562228883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x450000x1bac0x10002551ff99d8da06111e8cbce4e0b0e0d1False0.243896484375data3.772861734586296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x470000x29a580x29c005a7f13f4c55cd3d0d5b5a33ed85ca787False0.3163360778443114data5.296790756874419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x710000x2b480x2c007310dc31beb535029e13ce013bf44e41False0.7433416193181818data6.589484783372459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x485100x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.46365248226950356
                    RT_ICON0x489780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.29080675422138835
                    RT_ICON0x49a200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.22593360995850623
                    RT_ICON0x4bfc80x4076PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9940613258998909
                    RT_DIALOG0x500400x106data0.6984732824427481
                    RT_DIALOG0x501480x108dataEnglishUnited States0.6553030303030303
                    RT_DIALOG0x502500x10edata0.6925925925925925
                    RT_DIALOG0x503600x110dataEnglishUnited States0.6544117647058824
                    RT_STRING0x504700x6edataBulgarianBulgaria0.7
                    RT_STRING0x504e00x8edataChineseTaiwan0.528169014084507
                    RT_STRING0x505700x6edataCzechCzech Republic0.7
                    RT_STRING0x505e00x6edataGermanGermany0.7
                    RT_STRING0x506500x6edataGreekGreece0.7
                    RT_STRING0x506c00x6edataEnglishUnited States0.7
                    RT_STRING0x507300x6edataFrenchFrance0.7
                    RT_STRING0x507a00x6edataHungarianHungary0.7
                    RT_STRING0x508100x6edataItalianItaly0.7
                    RT_STRING0x508800x70dataJapaneseJapan0.7053571428571429
                    RT_STRING0x508f00x7adataKoreanNorth Korea0.5573770491803278
                    RT_STRING0x508f00x7adataKoreanSouth Korea0.5573770491803278
                    RT_STRING0x5096c0x6edataDutchNetherlands0.7
                    RT_STRING0x509dc0x6edataPolishPoland0.7
                    RT_STRING0x50a4c0x6edataPortugueseBrazil0.7
                    RT_STRING0x50abc0x6edataRomanianRomania0.7
                    RT_STRING0x50b2c0x6edataRussianRussia0.7
                    RT_STRING0x50b9c0x6edataSlovakSlovakia0.7
                    RT_STRING0x50c0c0x6edataThaiThailand0.5545454545454546
                    RT_STRING0x50c7c0x6edataTurkishTurkey0.7
                    RT_STRING0x50cec0x82dataChineseChina0.5538461538461539
                    RT_STRING0x50d700x6edata0.7
                    RT_STRING0x50de00x1c2dataBulgarianBulgaria0.5022222222222222
                    RT_STRING0x50fa40xaedataChineseTaiwan0.8275862068965517
                    RT_STRING0x510540x1a0dataCzechCzech Republic0.5889423076923077
                    RT_STRING0x511f40x208dataGermanGermany0.48653846153846153
                    RT_STRING0x513fc0x1d2dataGreekGreece0.5472103004291845
                    RT_STRING0x515d00x190dataEnglishUnited States0.505
                    RT_STRING0x517600x1bedataFrenchFrance0.5089686098654709
                    RT_STRING0x519200x194dataHungarianHungary0.5767326732673267
                    RT_STRING0x51ab40x1d8dataItalianItaly0.4766949152542373
                    RT_STRING0x51c8c0x106dataJapaneseJapan0.7175572519083969
                    RT_STRING0x51d940xd6dataKoreanNorth Korea0.8598130841121495
                    RT_STRING0x51d940xd6dataKoreanSouth Korea0.8598130841121495
                    RT_STRING0x51e6c0x1ccdataDutchNetherlands0.4826086956521739
                    RT_STRING0x520380x1c4dataPolishPoland0.5398230088495575
                    RT_STRING0x521fc0x1aadataPortugueseBrazil0.5023474178403756
                    RT_STRING0x523a80x1c4dataRomanianRomania0.5265486725663717
                    RT_STRING0x5256c0x1c4dataRussianRussia0.4889380530973451
                    RT_STRING0x527300x1aedataSlovakSlovakia0.5767441860465117
                    RT_STRING0x528e00x17edataThaiThailand0.56282722513089
                    RT_STRING0x52a600x1acdataTurkishTurkey0.544392523364486
                    RT_STRING0x52c0c0xa8dataChineseChina0.8392857142857143
                    RT_STRING0x52cb40x1badata0.497737556561086
                    RT_STRING0x52e700xf0dataBulgarianBulgaria0.5416666666666666
                    RT_STRING0x52f600x74dataChineseTaiwan0.6810344827586207
                    RT_STRING0x52fd40x10adataCzechCzech Republic0.5375939849624061
                    RT_STRING0x530e00x12cdataGermanGermany0.49333333333333335
                    RT_STRING0x5320c0xe8dataGreekGreece0.5431034482758621
                    RT_STRING0x532f40xf8dataEnglishUnited States0.4798387096774194
                    RT_STRING0x533ec0x12cdataFrenchFrance0.47
                    RT_STRING0x535180x132dataHungarianHungary0.5
                    RT_STRING0x5364c0x12cdataItalianItaly0.45
                    RT_STRING0x537780xa8dataJapaneseJapan0.6904761904761905
                    RT_STRING0x538200x98dataKoreanNorth Korea0.7302631578947368
                    RT_STRING0x538200x98dataKoreanSouth Korea0.7302631578947368
                    RT_STRING0x538b80x10adataDutchNetherlands0.49624060150375937
                    RT_STRING0x539c40x108dataPolishPoland0.5113636363636364
                    RT_STRING0x53acc0xf6dataPortugueseBrazil0.45934959349593496
                    RT_STRING0x53bc40x110dataRomanianRomania0.49264705882352944
                    RT_STRING0x53cd40xf4dataRussianRussia0.5573770491803278
                    RT_STRING0x53dc80x132dataSlovakSlovakia0.5261437908496732
                    RT_STRING0x53efc0xd0dataThaiThailand0.5913461538461539
                    RT_STRING0x53fcc0x104dataTurkishTurkey0.5076923076923077
                    RT_STRING0x540d00x72dataChineseChina0.6754385964912281
                    RT_STRING0x541440x12cdata0.43333333333333335
                    RT_STRING0x542700x1f0dataBulgarianBulgaria0.48185483870967744
                    RT_STRING0x544600xf4dataChineseTaiwan0.6639344262295082
                    RT_STRING0x545540x1f0dataCzechCzech Republic0.4778225806451613
                    RT_STRING0x547440x250dataGermanGermany0.42567567567567566
                    RT_STRING0x549940x228dataGreekGreece0.4963768115942029
                    RT_STRING0x54bbc0x204dataEnglishUnited States0.4127906976744186
                    RT_STRING0x54dc00x21edataFrenchFrance0.4151291512915129
                    RT_STRING0x54fe00x1c2dataHungarianHungary0.4688888888888889
                    RT_STRING0x551a40x250dataItalianItaly0.40033783783783783
                    RT_STRING0x553f40x14edataJapaneseJapan0.6137724550898204
                    RT_STRING0x555440x152dataKoreanNorth Korea0.6183431952662722
                    RT_STRING0x555440x152dataKoreanSouth Korea0.6183431952662722
                    RT_STRING0x556980x220dataDutchNetherlands0.41911764705882354
                    RT_STRING0x558b80x204dataPolishPoland0.4689922480620155
                    RT_STRING0x55abc0x1eedataPortugueseBrazil0.43724696356275305
                    RT_STRING0x55cac0x20adataRomanianRomania0.4329501915708812
                    RT_STRING0x55eb80x1d8dataRussianRussia0.5063559322033898
                    RT_STRING0x560900x218dataSlovakSlovakia0.4664179104477612
                    RT_STRING0x562a80x1c6dataThaiThailand0.4911894273127753
                    RT_STRING0x564700x1c6dataTurkishTurkey0.48237885462555063
                    RT_STRING0x566380xf4dataChineseChina0.6598360655737705
                    RT_STRING0x5672c0x248data0.4143835616438356
                    RT_STRING0x569740x464dataBulgarianBulgaria0.39679715302491103
                    RT_STRING0x56dd80x162dataChineseTaiwan0.807909604519774
                    RT_STRING0x56f3c0x3d4dataCzechCzech Republic0.43673469387755104
                    RT_STRING0x573100x4fedataGermanGermany0.38184663536776214
                    RT_STRING0x578100x506dataGreekGreece0.41135303265940903
                    RT_STRING0x57d180x42cdataEnglishUnited States0.38108614232209737
                    RT_STRING0x581440x4a6dataFrenchFrance0.3815126050420168
                    RT_STRING0x585ec0x45edataHungarianHungary0.43202146690518783
                    RT_STRING0x58a4c0x49adataItalianItaly0.3735144312393888
                    RT_STRING0x58ee80x240dataJapaneseJapan0.6215277777777778
                    RT_STRING0x591280x23edataKoreanNorth Korea0.6393728222996515
                    RT_STRING0x591280x23edataKoreanSouth Korea0.6393728222996515
                    RT_STRING0x593680x4f6dataDutchNetherlands0.3606299212598425
                    RT_STRING0x598600x4aaOpenPGP Public KeyPolishPoland0.4103852596314908
                    RT_STRING0x59d0c0x486dataPortugueseBrazil0.3756476683937824
                    RT_STRING0x5a1940x46cdataRomanianRomania0.3931095406360424
                    RT_STRING0x5a6000x46cdataRussianRussia0.4204946996466431
                    RT_STRING0x5aa6c0x406dataSlovakSlovakia0.43592233009708736
                    RT_STRING0x5ae740x378dataThaiThailand0.4380630630630631
                    RT_STRING0x5b1ec0x3dedataTurkishTurkey0.4171717171717172
                    RT_STRING0x5b5cc0x16edataChineseChina0.7759562841530054
                    RT_STRING0x5b73c0x4a2data0.35328836424957843
                    RT_STRING0x5bbe00x258dataBulgarianBulgaria0.4033333333333333
                    RT_STRING0x5be380xc0dataChineseTaiwan0.7552083333333334
                    RT_STRING0x5bef80x218dataCzechCzech Republic0.4085820895522388
                    RT_STRING0x5c1100x2f2dataGermanGermany0.36074270557029176
                    RT_STRING0x5c4040x204dataGreekGreece0.4496124031007752
                    RT_STRING0x5c6080x212dataEnglishUnited States0.41132075471698115
                    RT_STRING0x5c81c0x256dataFrenchFrance0.4297658862876254
                    RT_STRING0x5ca740x1f4dataHungarianHungary0.474
                    RT_STRING0x5cc680x25adataItalianItaly0.39368770764119604
                    RT_STRING0x5cec40x130dataJapaneseJapan0.6085526315789473
                    RT_STRING0x5cff40x11adataKoreanNorth Korea0.6595744680851063
                    RT_STRING0x5cff40x11adataKoreanSouth Korea0.6595744680851063
                    RT_STRING0x5d1100x1fedataDutchNetherlands0.4176470588235294
                    RT_STRING0x5d3100x26adataPolishPoland0.42718446601941745
                    RT_STRING0x5d57c0x274dataPortugueseBrazil0.39012738853503187
                    RT_STRING0x5d7f00x212dataRomanianRomania0.4075471698113208
                    RT_STRING0x5da040x1f8dataRussianRussia0.43253968253968256
                    RT_STRING0x5dbfc0x212dataSlovakSlovakia0.4509433962264151
                    RT_STRING0x5de100x1cadataThaiThailand0.4672489082969432
                    RT_STRING0x5dfdc0x1eedataTurkishTurkey0.4716599190283401
                    RT_STRING0x5e1cc0xbedataChineseChina0.7526315789473684
                    RT_STRING0x5e28c0x280data0.371875
                    RT_STRING0x5e50c0x51aMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0BulgarianBulgaria0.34686064318529863
                    RT_STRING0x5ea280x1c2Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0ChineseTaiwan0.6822222222222222
                    RT_STRING0x5ebec0x4ceMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0CzechCzech Republic0.35040650406504065
                    RT_STRING0x5f0bc0x608Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0GermanGermany0.31411917098445596
                    RT_STRING0x5f6c40x5c4Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0GreekGreece0.3611111111111111
                    RT_STRING0x5fc880x4f6Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0EnglishUnited States0.3283464566929134
                    RT_STRING0x601800x5d4Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0FrenchFrance0.30831099195710454
                    RT_STRING0x607540x4f6Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0HungarianHungary0.3590551181102362
                    RT_STRING0x60c4c0x574Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0ItalianItaly0.3216332378223496
                    RT_STRING0x611c00x308Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0JapaneseJapan0.49355670103092786
                    RT_STRING0x614c80x2c6Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0KoreanNorth Korea0.5464788732394367
                    RT_STRING0x614c80x2c6Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0KoreanSouth Korea0.5464788732394367
                    RT_STRING0x617900x572Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0DutchNetherlands0.30631276901004306
                    RT_STRING0x61d040x5c6Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0PolishPoland0.3301759133964817
                    RT_STRING0x622cc0x5b6Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0PortugueseBrazil0.320109439124487
                    RT_STRING0x628840x628Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0RomanianRomania0.3039340101522843
                    RT_STRING0x62eac0x586Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0RussianRussia0.371994342291372
                    RT_STRING0x634340x504Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0SlovakSlovakia0.35046728971962615
                    RT_STRING0x639380x4a6Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0ThaiThailand0.3831932773109244
                    RT_STRING0x63de00x4f8Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0TurkishTurkey0.35062893081761004
                    RT_STRING0x642d80x1c2Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0ChineseChina0.66
                    RT_STRING0x6449c0x5ccMatlab v4 mat-file (little endian) , numeric, rows 0, columns 00.3005390835579515
                    RT_STRING0x64a680x524dataBulgarianBulgaria0.26595744680851063
                    RT_STRING0x64f8c0x170dataChineseTaiwan0.529891304347826
                    RT_STRING0x650fc0x466dataCzechCzech Republic0.28507992895204265
                    RT_STRING0x655640x57edataGermanGermany0.2496443812233286
                    RT_STRING0x65ae40x56cdataGreekGreece0.2845821325648415
                    RT_STRING0x660500x494dataEnglishUnited States0.25597269624573377
                    RT_STRING0x664e40x548dataFrenchFrance0.2492603550295858
                    RT_STRING0x66a2c0x48cdataHungarianHungary0.26890034364261167
                    RT_STRING0x66eb80x590dataItalianItaly0.23595505617977527
                    RT_STRING0x674480x24cdataJapaneseJapan0.45068027210884354
                    RT_STRING0x676940x282dataKoreanNorth Korea0.42990654205607476
                    RT_STRING0x676940x282dataKoreanSouth Korea0.42990654205607476
                    RT_STRING0x679180x57edataDutchNetherlands0.24182076813655762
                    RT_STRING0x67e980x4ccdataPolishPoland0.28257328990228014
                    RT_STRING0x683640x4f8dataPortugueseBrazil0.25
                    RT_STRING0x6885c0x550dataRomanianRomania0.2639705882352941
                    RT_STRING0x68dac0x4f6dataRussianRussia0.29448818897637796
                    RT_STRING0x692a40x478dataSlovakSlovakia0.2928321678321678
                    RT_STRING0x6971c0x3d6dataThaiThailand0.31262729124236255
                    RT_STRING0x69af40x3d0dataTurkishTurkey0.3094262295081967
                    RT_STRING0x69ec40x188dataChineseChina0.5178571428571429
                    RT_STRING0x6a04c0x524data0.23708206686930092
                    RT_STRING0x6a5700x464dataBulgarianBulgaria0.25889679715302494
                    RT_STRING0x6a9d40x290dataChineseTaiwan0.36128048780487804
                    RT_STRING0x6ac640x488dataCzechCzech Republic0.2672413793103448
                    RT_STRING0x6b0ec0x4f4dataGermanGermany0.23422712933753942
                    RT_STRING0x6b5e00x48adataGreekGreece0.2882960413080895
                    RT_STRING0x6ba6c0x40edataEnglishUnited States0.20809248554913296
                    RT_STRING0x6be7c0x48edataFrenchFrance0.22898799313893653
                    RT_STRING0x6c30c0x432dataHungarianHungary0.24953445065176907
                    RT_STRING0x6c7400x552dataItalianItaly0.21218795888399414
                    RT_STRING0x6cc940x302dataJapaneseJapan0.35194805194805195
                    RT_STRING0x6cf980x2d0dataKoreanNorth Korea0.3819444444444444
                    RT_STRING0x6cf980x2d0dataKoreanSouth Korea0.3819444444444444
                    RT_STRING0x6d2680x400dataDutchNetherlands0.2373046875
                    RT_STRING0x6d6680x4f6dataPolishPoland0.2251968503937008
                    RT_STRING0x6db600x418dataPortugueseBrazil0.258587786259542
                    RT_STRING0x6df780x53adataRomanianRomania0.2085201793721973
                    RT_STRING0x6e4b40x4c2dataRussianRussia0.2660098522167488
                    RT_STRING0x6e9780x4a4dataSlovakSlovakia0.23905723905723905
                    RT_STRING0x6ee1c0x440dataThaiThailand0.27941176470588236
                    RT_STRING0x6f25c0x408dataTurkishTurkey0.24709302325581395
                    RT_STRING0x6f6640x29edataChineseChina0.35074626865671643
                    RT_STRING0x6f9040x4ccdata0.22149837133550487
                    RT_GROUP_ICON0x6fdd00x3edataEnglishUnited States0.7903225806451613
                    RT_VERSION0x6fe100x490dataEnglishUnited States0.3886986301369863
                    RT_MANIFEST0x702a00x7b6XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1914), with CRLF line terminatorsEnglishUnited States0.32269503546099293
                    DLLImport
                    ADVAPI32.dllGetSecurityDescriptorDacl, GetAce, InitializeAcl, BuildExplicitAccessWithNameW, SetEntriesInAclW, CreateWellKnownSid, GetUserNameW, EqualSid, LookupAccountSidW, LookupAccountNameW, GetNamedSecurityInfoW, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, RegDeleteValueW, OpenThreadToken, OpenProcessToken, DuplicateTokenEx, MapGenericMask, AccessCheck, GetTokenInformation, AllocateAndInitializeSid, FreeSid
                    KERNEL32.dllGetSystemDirectoryW, LoadLibraryW, GetProcAddress, FreeLibrary, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, TlsAlloc, GetCurrentThreadId, SetFileAttributesW, WaitForSingleObject, DeleteFileW, TlsSetValue, TlsGetValue, GetTickCount, CreateFileW, DosDateTimeToFileTime, LocalFileTimeToFileTime, SetFileTime, CloseHandle, MultiByteToWideChar, WideCharToMultiByte, GetLastError, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, GetFileSizeEx, SetFilePointerEx, WriteFile, CompareStringW, CreateDirectoryW, SetFilePointer, SetEndOfFile, LocalFree, LocalAlloc, GetModuleHandleW, FindFirstFileW, FindNextFileW, FindClose, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, EnterCriticalSection, LeaveCriticalSection, GetCurrentProcess, SetEvent, VerSetConditionMask, VerifyVersionInfoW, CreateEventW, GetVersionExW, GetNativeSystemInfo, GetTempPathW, GetModuleFileNameW, GetFileAttributesW, RemoveDirectoryW, GetProcessId, WaitForMultipleObjects, GetExitCodeProcess, ExpandEnvironmentStringsW, GetLocalTime, GetSystemTime, SystemTimeToFileTime, ResetEvent, GetExitCodeThread, TerminateThread, RaiseException, FlushInstructionCache, GlobalAlloc, GetCurrentProcessId, GetCommandLineW, InterlockedIncrement, InterlockedDecrement, GetCurrentThread, GlobalLock, GlobalFree, GlobalUnlock, SetLastError, lstrlenW, lstrcmpW, FormatMessageW, ExitProcess, SetDllDirectoryW, LoadLibraryExW, LCMapStringW, GetThreadLocale, GetUserDefaultUILanguage, GetUserDefaultLCID, GetLocaleInfoW, GetPrivateProfileStringW, GetFileTime, FileTimeToSystemTime, FileTimeToLocalFileTime, OpenEventW, GetTimeFormatW, GetDateFormatW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, OpenProcess, DuplicateHandle, CreateThread, DecodePointer, IsDebuggerPresent, OutputDebugStringW, EncodePointer, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, GetFileType, ReadFile, GetConsoleMode, ReadConsoleW, GetConsoleCP, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, SetStdHandle, GetStdHandle, GetStartupInfoW, WriteConsoleW, GetACP, GetStringTypeW, TlsFree, GetSystemTimeAsFileTime, IsValidCodePage, GetOEMCP, GetCPInfo, FlushFileBuffers, WaitForSingleObjectEx, RtlUnwind, QueryPerformanceCounter, GetSystemInfo, VirtualProtect, VirtualQuery, FindFirstFileExW, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    BulgarianBulgaria
                    ChineseTaiwan
                    CzechCzech Republic
                    GermanGermany
                    GreekGreece
                    FrenchFrance
                    HungarianHungary
                    ItalianItaly
                    JapaneseJapan
                    KoreanNorth Korea
                    KoreanSouth Korea
                    DutchNetherlands
                    PolishPoland
                    PortugueseBrazil
                    RomanianRomania
                    RussianRussia
                    SlovakSlovakia
                    ThaiThailand
                    TurkishTurkey
                    ChineseChina
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 23, 2024 11:21:07.672267914 CEST5352815162.159.36.2192.168.2.4
                    Oct 23, 2024 11:21:08.306536913 CEST5401853192.168.2.41.1.1.1
                    Oct 23, 2024 11:21:08.318250895 CEST53540181.1.1.1192.168.2.4
                    Oct 23, 2024 11:21:10.507673979 CEST5590753192.168.2.41.1.1.1
                    Oct 23, 2024 11:21:10.515588045 CEST53559071.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 23, 2024 11:21:08.306536913 CEST192.168.2.41.1.1.10xd3f9Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                    Oct 23, 2024 11:21:10.507673979 CEST192.168.2.41.1.1.10x4940Standard query (0)56.163.245.4.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 23, 2024 11:21:08.318250895 CEST1.1.1.1192.168.2.40xd3f9Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                    Oct 23, 2024 11:21:10.515588045 CEST1.1.1.1192.168.2.40x4940Name error (3)56.163.245.4.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:05:20:33
                    Start date:23/10/2024
                    Path:C:\Users\user\Desktop\IEW113_2311a.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\IEW113_2311a.exe"
                    Imagebase:0xd10000
                    File size:5'302'512 bytes
                    MD5 hash:1BB2447F9AE84781BCFA73EDA1606D72
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Target ID:1
                    Start time:05:20:35
                    Start date:23/10/2024
                    Path:C:\Users\user\Desktop\IEW113_2311a.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
                    Imagebase:0xd10000
                    File size:5'302'512 bytes
                    MD5 hash:1BB2447F9AE84781BCFA73EDA1606D72
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Target ID:2
                    Start time:05:20:35
                    Start date:23/10/2024
                    Path:C:\Windows\System32\msiexec.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\System32\msiexec.exe" /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
                    Imagebase:0x7ff7a80d0000
                    File size:69'632 bytes
                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:3
                    Start time:05:20:35
                    Start date:23/10/2024
                    Path:C:\Windows\System32\msiexec.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\msiexec.exe /V
                    Imagebase:0x7ff7a80d0000
                    File size:69'632 bytes
                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:4
                    Start time:05:20:36
                    Start date:23/10/2024
                    Path:C:\Windows\System32\msiexec.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\MsiExec.exe -Embedding 87308A77B4DC65560968A93A1904E71A C
                    Imagebase:0x7ff7a80d0000
                    File size:69'632 bytes
                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:5
                    Start time:05:20:47
                    Start date:23/10/2024
                    Path:C:\Windows\System32\msiexec.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\MsiExec.exe -Embedding 026172C647FCA3CC45C109DD1CF65201
                    Imagebase:0x7ff7a80d0000
                    File size:69'632 bytes
                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:6
                    Start time:05:20:47
                    Start date:23/10/2024
                    Path:C:\Windows\SysWOW64\msiexec.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 1F622DA67DE9472AD76099B184CCC342
                    Imagebase:0x770000
                    File size:59'904 bytes
                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:8
                    Start time:05:20:49
                    Start date:23/10/2024
                    Path:C:\Windows\System32\msiexec.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\MsiExec.exe -Embedding 41D4778385EEC697935AEB0EB737BBE8 E Global\MSI0000
                    Imagebase:0x7ff7a80d0000
                    File size:69'632 bytes
                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:9
                    Start time:05:20:49
                    Start date:23/10/2024
                    Path:C:\Windows\System32\cmd.exe
                    Wow64 process (32bit):false
                    Commandline:cmd /c pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
                    Imagebase:0x7ff7f51c0000
                    File size:289'792 bytes
                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:10
                    Start time:05:20:49
                    Start date:23/10/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:11
                    Start time:05:20:49
                    Start date:23/10/2024
                    Path:C:\Windows\System32\pnputil.exe
                    Wow64 process (32bit):false
                    Commandline:pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
                    Imagebase:0x7ff6450a0000
                    File size:301'568 bytes
                    MD5 hash:DE03AC6962C0655E6F769F881295DE3F
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:13
                    Start time:05:20:50
                    Start date:23/10/2024
                    Path:C:\Windows\System32\drvinst.exe
                    Wow64 process (32bit):false
                    Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.inf" "9" "40c79f59f" "000000000000015C" "WinSta0\Default" "0000000000000168" "208" "C:\Program Files\Sony\Imaging Edge Webcam\Driver"
                    Imagebase:0x7ff6edb80000
                    File size:337'920 bytes
                    MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:14
                    Start time:05:20:50
                    Start date:23/10/2024
                    Path:C:\Windows\System32\rundll32.exe
                    Wow64 process (32bit):false
                    Commandline:rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} Global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat
                    Imagebase:0x7ff6d2c00000
                    File size:71'680 bytes
                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:13.6%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:24.2%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:44
                      execution_graph 22850 d11a50 22861 d12f70 22850->22861 22853 d11a80 TlsGetValue 22854 d11a87 22853->22854 22855 d11a90 SetFileAttributesW 22854->22855 22856 d11a9c 22854->22856 22855->22856 22873 d2f8ed 22856->22873 22858 d11abb 22876 d416e0 22858->22876 22860 d11ae8 22862 d12f90 22861->22862 22863 d11a74 22861->22863 22883 d13670 31 API calls 2 library calls 22862->22883 22863->22853 22863->22854 22865 d12fb0 MultiByteToWideChar 22866 d12fd0 GetLastError 22865->22866 22868 d1301f 22865->22868 22867 d12fdb MultiByteToWideChar 22866->22867 22866->22868 22884 d13670 31 API calls 2 library calls 22867->22884 22868->22863 22885 d138d0 HeapAlloc GetLastError RaiseException 22868->22885 22870 d13001 MultiByteToWideChar 22870->22868 22886 d2efea 22873->22886 22875 d2f908 22875->22858 22877 d416e9 22876->22877 22878 d416eb IsProcessorFeaturePresent 22876->22878 22877->22860 22880 d41ce8 22878->22880 23050 d41cac SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22880->23050 22882 d41dcb 22882->22860 22883->22865 22884->22870 22888 d2eff6 BuildCatchObjectHelperInternal 22886->22888 22887 d2f004 22944 d2efd7 20 API calls _abort 22887->22944 22888->22887 22890 d2f03d 22888->22890 22897 d2f5c4 22890->22897 22891 d2f009 22945 d2eefe 26 API calls pre_c_initialization 22891->22945 22896 d2f013 __fread_nolock 22896->22875 22947 d2f398 22897->22947 22900 d2f5f6 22979 d2efc4 20 API calls _abort 22900->22979 22901 d2f60f 22965 d35d75 22901->22965 22904 d2f614 22906 d2f634 22904->22906 22907 d2f61d 22904->22907 22905 d2f5fb 22980 d2efd7 20 API calls _abort 22905->22980 22978 d2f303 CreateFileW 22906->22978 22981 d2efc4 20 API calls _abort 22907->22981 22911 d2f622 22982 d2efd7 20 API calls _abort 22911->22982 22913 d2f6ea GetFileType 22914 d2f6f5 GetLastError 22913->22914 22915 d2f73c 22913->22915 22985 d2efa1 20 API calls 2 library calls 22914->22985 22987 d35cbe 21 API calls 3 library calls 22915->22987 22916 d2f6bf GetLastError 22984 d2efa1 20 API calls 2 library calls 22916->22984 22919 d2f66d 22919->22913 22919->22916 22983 d2f303 CreateFileW 22919->22983 22921 d2f703 CloseHandle 22921->22905 22924 d2f72c 22921->22924 22922 d2f6b2 22922->22913 22922->22916 22986 d2efd7 20 API calls _abort 22924->22986 22925 d2f75d 22927 d2f7a9 22925->22927 22988 d2f514 81 API calls 4 library calls 22925->22988 22932 d2f7d6 22927->22932 22989 d2f0b6 81 API calls 3 library calls 22927->22989 22928 d2f731 22928->22905 22931 d2f7cf 22931->22932 22933 d2f7e7 22931->22933 22990 d30c91 22932->22990 22935 d2f061 22933->22935 22936 d2f865 CloseHandle 22933->22936 22946 d2f08a LeaveCriticalSection __wsopen_s 22935->22946 23005 d2f303 CreateFileW 22936->23005 22938 d2f890 22939 d2f89a GetLastError 22938->22939 22940 d2f8c6 22938->22940 23006 d2efa1 20 API calls 2 library calls 22939->23006 22940->22935 22942 d2f8a6 23007 d35e87 21 API calls 3 library calls 22942->23007 22944->22891 22945->22896 22946->22896 22948 d2f3d3 22947->22948 22949 d2f3b9 22947->22949 23008 d2f328 22948->23008 22949->22948 23015 d2efd7 20 API calls _abort 22949->23015 22951 d2f40b 22955 d2f43a 22951->22955 23017 d2efd7 20 API calls _abort 22951->23017 22953 d2f3c8 23016 d2eefe 26 API calls pre_c_initialization 22953->23016 22960 d2f48d 22955->22960 23019 d35a1a 26 API calls 2 library calls 22955->23019 22958 d2f488 22958->22960 22961 d2f507 22958->22961 22959 d2f42f 23018 d2eefe 26 API calls pre_c_initialization 22959->23018 22960->22900 22960->22901 23020 d2ef2b 11 API calls _abort 22961->23020 22964 d2f513 22966 d35d81 BuildCatchObjectHelperInternal 22965->22966 23023 d38ffb EnterCriticalSection 22966->23023 22969 d35dad 23027 d35b54 21 API calls 3 library calls 22969->23027 22971 d35df8 __fread_nolock 22971->22904 22972 d35d88 22972->22969 22974 d35e1b EnterCriticalSection 22972->22974 22975 d35dcf 22972->22975 22973 d35db2 22973->22975 23028 d35c9b EnterCriticalSection 22973->23028 22974->22975 22976 d35e28 LeaveCriticalSection 22974->22976 23024 d35e7e 22975->23024 22976->22972 22978->22919 22979->22905 22980->22935 22981->22911 22982->22905 22983->22922 22984->22905 22985->22921 22986->22928 22987->22925 22988->22927 22989->22931 23030 d35f18 22990->23030 22992 d30ca7 23043 d35e87 21 API calls 3 library calls 22992->23043 22993 d30ca1 22993->22992 22996 d35f18 __wsopen_s 26 API calls 22993->22996 23004 d30cd9 22993->23004 22995 d30cff 22998 d30d21 22995->22998 23044 d2efa1 20 API calls 2 library calls 22995->23044 22999 d30cd0 22996->22999 22997 d35f18 __wsopen_s 26 API calls 23000 d30ce5 CloseHandle 22997->23000 22998->22935 23002 d35f18 __wsopen_s 26 API calls 22999->23002 23000->22992 23003 d30cf1 GetLastError 23000->23003 23002->23004 23003->22992 23004->22992 23004->22997 23005->22938 23006->22942 23007->22940 23009 d2f340 23008->23009 23012 d2f35b 23009->23012 23021 d2efd7 20 API calls _abort 23009->23021 23011 d2f37f 23022 d2eefe 26 API calls pre_c_initialization 23011->23022 23012->22951 23014 d2f38a 23014->22951 23015->22953 23016->22948 23017->22959 23018->22955 23019->22958 23020->22964 23021->23011 23022->23014 23023->22972 23029 d39043 LeaveCriticalSection 23024->23029 23026 d35e85 23026->22971 23027->22973 23028->22975 23029->23026 23031 d35f25 23030->23031 23032 d35f3a 23030->23032 23045 d2efc4 20 API calls _abort 23031->23045 23037 d35f5f 23032->23037 23047 d2efc4 20 API calls _abort 23032->23047 23034 d35f2a 23046 d2efd7 20 API calls _abort 23034->23046 23037->22993 23038 d35f6a 23048 d2efd7 20 API calls _abort 23038->23048 23039 d35f32 23039->22993 23041 d35f72 23049 d2eefe 26 API calls pre_c_initialization 23041->23049 23043->22995 23044->22998 23045->23034 23046->23039 23047->23038 23048->23041 23049->23039 23050->22882 23051 d41f75 23052 d41f81 BuildCatchObjectHelperInternal 23051->23052 23081 d419f4 23052->23081 23054 d41f88 23055 d420db 23054->23055 23058 d41fb2 23054->23058 23121 d42292 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 23055->23121 23057 d420e2 23059 d420e8 23057->23059 23122 d384c1 28 API calls _abort 23057->23122 23070 d41ff1 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23058->23070 23115 d3b953 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23058->23115 23123 d38473 28 API calls _abort 23059->23123 23063 d420f0 23064 d41fcb 23065 d41fd1 23064->23065 23116 d3b8f7 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23064->23116 23067 d42052 23092 d423ac 23067->23092 23069 d42058 23096 d2ba10 23069->23096 23070->23067 23117 d38489 47 API calls 3 library calls 23070->23117 23075 d42074 23075->23057 23076 d42078 23075->23076 23077 d42081 23076->23077 23119 d38464 28 API calls _abort 23076->23119 23120 d41b83 13 API calls 2 library calls 23077->23120 23080 d42089 23080->23065 23082 d419fd 23081->23082 23124 d420fb IsProcessorFeaturePresent 23082->23124 23084 d41a09 23125 d44430 10 API calls 3 library calls 23084->23125 23086 d41a0e 23087 d41a12 23086->23087 23126 d43871 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23086->23126 23087->23054 23089 d41a1b 23090 d41a29 23089->23090 23127 d44459 8 API calls 3 library calls 23089->23127 23090->23054 23128 d3f6a0 23092->23128 23095 d423d2 23095->23069 23130 d11910 23096->23130 23099 d2bb6e 23500 d116f0 23099->23500 23101 d2bb78 23102 d11910 39 API calls 23103 d2ba4f 23102->23103 23103->23099 23104 d11910 39 API calls 23103->23104 23105 d2ba6a 23104->23105 23105->23099 23106 d2ba72 23105->23106 23145 d18340 23106->23145 23112 d2baf1 23499 d20850 15 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23112->23499 23114 d2bb15 23118 d423e5 GetModuleHandleW 23114->23118 23115->23064 23116->23070 23117->23067 23118->23075 23119->23077 23120->23080 23121->23057 23122->23059 23123->23063 23124->23084 23125->23086 23126->23089 23127->23087 23129 d3f6b7 GetStartupInfoW 23128->23129 23129->23095 23131 d11926 23130->23131 23142 d1196c 23130->23142 23504 d4188a 5 API calls __Init_thread_wait 23131->23504 23134 d11930 23136 d1193c GetProcessHeap 23134->23136 23134->23142 23135 d11987 23144 d119ea 23135->23144 23508 d41be6 29 API calls __onexit 23135->23508 23505 d41be6 29 API calls __onexit 23136->23505 23139 d11962 23506 d41840 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 23139->23506 23140 d119e0 23509 d41840 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 23140->23509 23142->23144 23507 d4188a 5 API calls __Init_thread_wait 23142->23507 23144->23099 23144->23102 23146 d11910 39 API calls 23145->23146 23147 d1836f 23146->23147 23148 d183d8 23147->23148 23151 d18375 23147->23151 23149 d116f0 2 API calls 23148->23149 23150 d183e2 23149->23150 23152 d18395 23151->23152 23154 d183a2 23151->23154 23510 d18780 23152->23510 23154->23154 23531 d12e00 23154->23531 23156 d183a0 23157 d29b50 23156->23157 23158 d12ef0 2 API calls 23157->23158 23159 d29b89 23158->23159 23160 d12ef0 2 API calls 23159->23160 23161 d29b91 23160->23161 23162 d12ef0 2 API calls 23161->23162 23163 d29b99 23162->23163 23164 d11910 39 API calls 23163->23164 23165 d29bc2 23164->23165 23166 d2a14a 23165->23166 23184 d29bcc 23165->23184 23167 d116f0 2 API calls 23166->23167 23168 d2a154 23167->23168 23170 d12e00 28 API calls 23170->23184 23175 d2a0a3 23176 d2a0f3 23175->23176 23177 d2a0c8 23175->23177 23187 d2a0cf 23175->23187 23178 d12e00 28 API calls 23176->23178 23659 d115a0 22 API calls 23177->23659 23178->23187 23179 d29e56 23180 d28a80 51 API calls 23179->23180 23183 d29e71 23180->23183 23182 d29cb6 CompareStringW 23182->23179 23182->23184 23186 d29e98 23183->23186 23191 d29eb6 23183->23191 23192 d29e93 23183->23192 23184->23170 23184->23179 23184->23182 23185 d29ce1 CompareStringW 23184->23185 23188 d29d12 CompareStringW 23184->23188 23189 d2a040 23184->23189 23190 d29d6e CompareStringW 23184->23190 23195 d29d3d CompareStringW 23184->23195 23198 d29dc8 CompareStringW 23184->23198 23202 d29d99 CompareStringW 23184->23202 23206 d29def CompareStringW 23184->23206 23226 d2a00d 23184->23226 23582 d28a80 23184->23582 23630 d115a0 22 API calls 23184->23630 23631 d2bb80 23184->23631 23643 d200a0 23184->23643 23185->23179 23185->23184 23197 d29f1f 23186->23197 23201 d2bb80 84 API calls 23186->23201 23187->23112 23227 d2a360 23187->23227 23188->23184 23193 d2a063 23189->23193 23194 d2a04e CompareStringW 23189->23194 23189->23226 23190->23184 23196 d12e00 28 API calls 23191->23196 23655 d115a0 22 API calls 23192->23655 23204 d2a071 CompareStringW 23193->23204 23193->23226 23194->23193 23194->23226 23195->23184 23196->23186 23199 d28a80 51 API calls 23197->23199 23198->23184 23203 d29f5f 23199->23203 23205 d29ef3 23201->23205 23202->23184 23207 d29f86 23203->23207 23209 d29fa4 23203->23209 23211 d29f81 23203->23211 23204->23226 23208 d200a0 29 API calls 23205->23208 23206->23184 23206->23189 23214 d2bb80 84 API calls 23207->23214 23207->23226 23210 d29efa 23208->23210 23212 d12e00 28 API calls 23209->23212 23210->23197 23215 d29f3f 23210->23215 23218 d29f1a 23210->23218 23657 d115a0 22 API calls 23211->23657 23212->23207 23217 d29fe1 23214->23217 23216 d12e00 28 API calls 23215->23216 23216->23197 23219 d200a0 29 API calls 23217->23219 23656 d115a0 22 API calls 23218->23656 23221 d29fe8 23219->23221 23222 d2a030 23221->23222 23224 d2a008 23221->23224 23221->23226 23223 d12e00 28 API calls 23222->23223 23223->23226 23658 d115a0 22 API calls 23224->23658 23613 d18550 23226->23613 23230 d2a3cd 23227->23230 23261 d2a789 23227->23261 23228 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23229 d2b02a 23228->23229 23229->23112 23231 d2a3fe 23230->23231 23233 d2a420 23230->23233 23234 d2b031 23230->23234 23230->23261 23855 d20150 23231->23855 23236 d11510 20 API calls 23233->23236 23237 d116d0 2 API calls 23234->23237 23236->23231 23238 d2b036 23237->23238 23240 d116d0 2 API calls 23238->23240 23239 d20150 28 API calls 23241 d2a475 23239->23241 23242 d2b03b 23240->23242 23243 d28a80 51 API calls 23241->23243 23244 d116f0 2 API calls 23242->23244 23245 d2a4ab 23243->23245 23246 d2b045 23244->23246 23245->23261 23867 d34e77 48 API calls 23245->23867 23247 d116f0 2 API calls 23246->23247 23249 d2b04b 23247->23249 23251 d116d0 2 API calls 23249->23251 23250 d2a4cc 23252 d28a80 51 API calls 23250->23252 23253 d2b050 23251->23253 23254 d2a4f9 23252->23254 23255 d11910 39 API calls 23253->23255 23254->23261 23868 d34ef3 49 API calls 2 library calls 23254->23868 23257 d2b09f 23255->23257 23263 d11910 39 API calls 23257->23263 23258 d2a518 23259 d28a80 51 API calls 23258->23259 23260 d2a550 23259->23260 23260->23261 23869 d34ef3 49 API calls 2 library calls 23260->23869 23261->23228 23264 d2b0c3 23263->23264 23266 d2b9a4 23264->23266 23267 d2b0cd 23264->23267 23265 d2a56f 23268 d28a80 51 API calls 23265->23268 23269 d116f0 2 API calls 23266->23269 23271 d11910 39 API calls 23267->23271 23274 d2a5a2 23268->23274 23270 d2b9ae 23269->23270 23272 d116f0 2 API calls 23270->23272 23273 d2b0e4 23271->23273 23275 d2b9b8 23272->23275 23273->23270 23276 d2b0ee 23273->23276 23274->23261 23277 d2a61d 23274->23277 23287 d2a63c 23274->23287 23278 d116d0 2 API calls 23275->23278 23675 d2d530 23276->23675 23279 d18340 51 API calls 23277->23279 23280 d2b9bd 23278->23280 23293 d2a629 23279->23293 23281 d116f0 2 API calls 23280->23281 23283 d2b9c7 23281->23283 23284 d116f0 2 API calls 23283->23284 23286 d2b9d1 23284->23286 23290 d116f0 2 API calls 23286->23290 23287->23238 23291 d2a674 23287->23291 23287->23293 23295 d2b9db 23290->23295 23296 d11510 20 API calls 23291->23296 23292 d2b11c 23297 d2bb80 84 API calls 23292->23297 23870 d113b0 23293->23870 23299 d116f0 2 API calls 23295->23299 23296->23293 23300 d2b127 23297->23300 23302 d2b9e5 23299->23302 23303 d200a0 29 API calls 23300->23303 23307 d116f0 2 API calls 23302->23307 23304 d2b12e 23303->23304 23304->23275 23315 d2b14c 23304->23315 23321 d2b167 23304->23321 23305 d2a833 GetCurrentProcessId 23310 d11910 39 API calls 23305->23310 23306 d2a759 23879 d20760 CloseHandle 23306->23879 23309 d2b9ef 23307->23309 23312 d116f0 2 API calls 23309->23312 23311 d2a852 23310->23311 23311->23242 23313 d2a85c InitializeCriticalSectionAndSpinCount 23311->23313 23314 d2b9f9 23312->23314 23319 d2a891 GetLastError 23313->23319 23320 d2a8ab CreateEventW CreateEventW CreateEventW 23313->23320 23316 d116f0 2 API calls 23314->23316 23322 d2b1a7 GetModuleFileNameW 23315->23322 23328 d18780 38 API calls 23315->23328 23318 d2ba03 23316->23318 23329 d11910 39 API calls 23318->23329 23324 d2a89b 23319->23324 23325 d2aa00 23320->23325 23326 d2a968 GetModuleFileNameW 23320->23326 23327 d11510 20 API calls 23321->23327 23716 d13d40 23322->23716 23324->23246 23324->23320 23334 d2aa3f ShellExecuteExW 23325->23334 23895 d11120 44 API calls 23325->23895 23330 d18340 51 API calls 23326->23330 23327->23315 23331 d2b1a1 23328->23331 23332 d2ba34 23329->23332 23335 d2a98b 23330->23335 23331->23322 23336 d2bb6e 23332->23336 23351 d11910 39 API calls 23332->23351 23333 d2b25b 23342 d2b267 23333->23342 23343 d2b32d 23333->23343 23339 d2aa61 23334->23339 23340 d2aa59 GetLastError 23334->23340 23880 d299e0 48 API calls 23335->23880 23344 d116f0 2 API calls 23336->23344 23337 d2b21a 23337->23333 23346 d2b226 23337->23346 23347 d2aaba 23339->23347 23354 d2aa78 GetProcAddress 23339->23354 23340->23339 23349 d11910 39 API calls 23342->23349 23361 d2b4fb 23343->23361 23362 d11910 39 API calls 23343->23362 23385 d2b2d6 23343->23385 23350 d2bb78 23344->23350 23903 d2a160 16 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23346->23903 23357 d2aacb GetProcessId 23347->23357 23358 d2adee 23347->23358 23348 d2a99c 23348->23325 23355 d2a9a5 ResetEvent 23348->23355 23356 d2b26c 23349->23356 23360 d2ba4f 23351->23360 23364 d2aaa4 FreeLibrary 23354->23364 23365 d2aa88 23354->23365 23881 d33a7f 23355->23881 23356->23280 23368 d2b276 23356->23368 23359 d2aba2 WaitForInputIdle 23357->23359 23393 d2aaeb 23357->23393 23366 d2ae08 23358->23366 23371 d2ae01 SetEvent 23358->23371 23369 d2abb7 AllowSetForegroundWindow 23359->23369 23370 d2abbe GetTickCount WaitForMultipleObjects 23359->23370 23360->23336 23395 d11910 39 API calls 23360->23395 23361->23385 23723 d199c0 23361->23723 23373 d2b356 23362->23373 23363 d2b24a 23363->23333 23364->23347 23365->23364 23383 d2ae22 SetEvent 23366->23383 23384 d2ae25 SetEvent 23366->23384 23380 d11910 39 API calls 23368->23380 23369->23370 23376 d2abf4 23370->23376 23377 d2ac05 23370->23377 23371->23366 23372 d2ab9b AllowSetForegroundWindow 23372->23359 23373->23286 23378 d2b360 23373->23378 23381 d2ac38 23376->23381 23389 d2ac27 CloseHandle 23376->23389 23377->23381 23382 d2ac0f GetExitCodeProcess 23377->23382 23405 d18780 38 API calls 23378->23405 23388 d2b28d 23380->23388 23381->23366 23390 d2ac45 WaitForSingleObject 23381->23390 23382->23376 23383->23384 23391 d2ae87 23384->23391 23392 d2ae44 WaitForSingleObject 23384->23392 23394 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23385->23394 23386 d2b51c 23386->23385 23406 d11910 39 API calls 23386->23406 23387 d2b59d GetCurrentProcess OpenProcessToken 23398 d2b723 23387->23398 23399 d2b5cf GetTokenInformation 23387->23399 23388->23283 23396 d2b297 23388->23396 23389->23381 23390->23366 23397 d2ac61 SetEvent WaitForSingleObject GetTickCount 23390->23397 23411 d2aeab 23391->23411 23419 d12ef0 2 API calls 23391->23419 23400 d2ae57 TerminateThread 23392->23400 23401 d2ae68 23392->23401 23393->23249 23393->23372 23402 d2ab2e 23393->23402 23420 d2ab58 23393->23420 23403 d2b996 23394->23403 23404 d2ba6a 23395->23404 23426 d18780 38 API calls 23396->23426 23489 d2ac90 23397->23489 23407 d2b741 23398->23407 23408 d2b73a CloseHandle 23398->23408 23399->23398 23409 d2b5fc GetLastError 23399->23409 23400->23401 23401->23391 23410 d2ae78 CloseHandle 23401->23410 23896 d299e0 48 API calls 23402->23896 23403->23112 23404->23336 23412 d2ba72 23404->23412 23413 d2b382 23405->23413 23414 d2b532 23406->23414 23407->23385 23415 d2b782 CoInitializeEx 23407->23415 23436 d11910 39 API calls 23407->23436 23408->23407 23409->23398 23418 d2b60b GlobalAlloc 23409->23418 23410->23391 23421 d2aec2 23411->23421 23422 d2aeb5 CloseHandle 23411->23422 23441 d18340 51 API calls 23412->23441 23424 d11910 39 API calls 23413->23424 23414->23309 23425 d2b53c 23414->23425 23728 d21680 23415->23728 23416 d2add3 23416->23366 23427 d2ade3 SetEvent 23416->23427 23417 d2ac9c WaitForSingleObject 23417->23416 23417->23489 23418->23398 23429 d2b623 GetTokenInformation 23418->23429 23419->23411 23430 d11510 20 API calls 23420->23430 23431 d2aed9 23421->23431 23432 d2aecc CloseHandle 23421->23432 23422->23421 23433 d2b38b 23424->23433 23455 d18780 38 API calls 23425->23455 23435 d2b2b9 23426->23435 23427->23366 23439 d2b660 AllocateAndInitializeSid 23429->23439 23440 d2b702 23429->23440 23430->23402 23442 d2aee3 CloseHandle 23431->23442 23443 d2aef0 23431->23443 23432->23431 23433->23295 23434 d2b395 23433->23434 23905 d2a160 16 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23434->23905 23904 d23b10 105 API calls 23435->23904 23449 d2b75c 23436->23449 23438 d2b7af GetActiveWindow 23450 d2b7e6 GetCurrentProcess FlushInstructionCache GetCurrentThreadId EnterCriticalSection LeaveCriticalSection 23438->23450 23451 d2b7c5 23438->23451 23439->23440 23452 d2b691 23439->23452 23444 d2b715 FreeSid 23440->23444 23445 d2b71c GlobalFree 23440->23445 23453 d2ba8c 23441->23453 23442->23443 23446 d2af07 23443->23446 23447 d2aefa CloseHandle 23443->23447 23444->23445 23445->23398 23900 d24f50 44 API calls 23446->23900 23447->23446 23449->23314 23456 d2b766 23449->23456 23788 d235d0 23450->23788 23772 d2e57d 23451->23772 23452->23440 23465 d2b6a0 EqualSid 23452->23465 23460 d29b50 94 API calls 23453->23460 23455->23385 23456->23415 23466 d2bab7 23460->23466 23461 d2af12 DeleteCriticalSection 23467 d2af37 23461->23467 23463 d2b7ca 23463->23450 23469 d2b7d6 SetLastError 23463->23469 23464 d2b85c 23470 d2b862 GlobalLock 23464->23470 23475 d2b8b3 23464->23475 23465->23452 23471 d2b6b2 LookupAccountSidW 23465->23471 23480 d2a360 542 API calls 23466->23480 23483 d2baf1 23466->23483 23901 d20760 CloseHandle 23467->23901 23468 d2b3c0 23472 d2b3c7 23468->23472 23473 d2b3de GetTimeFormatW GetDateFormatW 23468->23473 23469->23475 23476 d2b894 GlobalFree 23470->23476 23477 d2b875 DialogBoxIndirectParamW GlobalUnlock GlobalFree 23470->23477 23471->23440 23478 d2b6ed GetLastError 23471->23478 23481 d18780 38 API calls 23472->23481 23906 d23b10 105 API calls 23473->23906 23916 d219b0 88 API calls 23475->23916 23476->23475 23477->23475 23478->23440 23478->23452 23480->23483 23484 d2b3d7 23481->23484 23917 d20850 15 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23483->23917 23907 d13390 23484->23907 23489->23416 23489->23417 23491 d2ad84 WaitForSingleObject GetTickCount 23489->23491 23897 d24d50 21 API calls __dtol3 23489->23897 23898 d2bd40 47 API calls 23489->23898 23899 d24f50 44 API calls 23489->23899 23491->23489 23492 d11910 39 API calls 23494 d2b45e 23492->23494 23493 d2a764 23493->23261 23494->23302 23496 d2b468 23494->23496 23495 d2bb15 23495->23112 23497 d18780 38 API calls 23496->23497 23498 d2b48a 23497->23498 23498->23361 23499->23114 23501 d116fe 23500->23501 26089 d415f8 23501->26089 23503 d1170b HeapAlloc 23503->23101 23504->23134 23505->23139 23506->23142 23507->23135 23508->23140 23509->23144 23553 d2e51b RaiseException EnterCriticalSection LeaveCriticalSection EnterCriticalSection LeaveCriticalSection 23510->23553 23512 d1888d 23512->23156 23513 d187b8 FindResourceExW 23514 d18797 23513->23514 23514->23512 23514->23513 23517 d187f6 23514->23517 23554 d19910 LoadResource LockResource SizeofResource 23514->23554 23555 d2e51b RaiseException EnterCriticalSection LeaveCriticalSection EnterCriticalSection LeaveCriticalSection 23514->23555 23517->23512 23518 d187fe FindResourceW 23517->23518 23518->23512 23519 d18813 23518->23519 23556 d19910 LoadResource LockResource SizeofResource 23519->23556 23521 d1881f 23521->23512 23522 d1884d 23521->23522 23557 d114b0 22 API calls 23521->23557 23558 d32100 26 API calls 4 library calls 23522->23558 23525 d18866 23559 d19870 HeapAlloc RaiseException 23525->23559 23527 d1886c 23528 d18876 23527->23528 23529 d116f0 2 API calls 23527->23529 23528->23156 23530 d188a2 23529->23530 23532 d12e0f 23531->23532 23537 d12e1c 23531->23537 23560 d12ef0 23532->23560 23534 d116f0 2 API calls 23536 d12ee2 23534->23536 23535 d12e14 23535->23156 23538 d12e5a 23537->23538 23551 d12e85 BuildCatchObjectHelperInternal 23537->23551 23565 d114b0 22 API calls 23537->23565 23540 d12e64 23538->23540 23541 d12eac 23538->23541 23543 d12e75 23540->23543 23544 d12e87 23540->23544 23540->23551 23570 d11510 23541->23570 23566 d2efd7 20 API calls _abort 23543->23566 23544->23551 23568 d2efd7 20 API calls _abort 23544->23568 23545 d12ec5 23545->23156 23547 d12e7a 23567 d2eefe 26 API calls pre_c_initialization 23547->23567 23550 d12e92 23569 d2eefe 26 API calls pre_c_initialization 23550->23569 23551->23534 23551->23545 23553->23514 23554->23514 23555->23514 23556->23521 23557->23522 23558->23525 23559->23527 23561 d12f01 23560->23561 23562 d12f10 23560->23562 23561->23562 23563 d116f0 2 API calls 23561->23563 23562->23535 23564 d12f4e 23563->23564 23564->23535 23565->23538 23566->23547 23567->23551 23568->23550 23569->23551 23571 d11522 23570->23571 23573 d11545 __fread_nolock 23570->23573 23574 d1152b ___scrt_fastfail 23571->23574 23579 d2efd7 20 API calls _abort 23571->23579 23573->23551 23574->23573 23575 d1156a 23574->23575 23580 d2efd7 20 API calls _abort 23574->23580 23575->23573 23581 d2efd7 20 API calls _abort 23575->23581 23578 d11582 23579->23574 23580->23575 23581->23578 23583 d28c51 23582->23583 23584 d28ab5 23582->23584 23586 d116f0 2 API calls 23583->23586 23585 d28b30 23584->23585 23593 d28ac2 23584->23593 23591 d28b3b 23585->23591 23595 d28c04 23585->23595 23587 d28c5b 23586->23587 23588 d116f0 2 API calls 23587->23588 23596 d28c23 23588->23596 23589 d11910 39 API calls 23592 d28b52 23589->23592 23590 d11910 39 API calls 23590->23596 23591->23589 23591->23592 23592->23587 23600 d28b6d 23592->23600 23593->23595 23597 d28af7 23593->23597 23594 d116f0 2 API calls 23598 d28c6f 23594->23598 23595->23590 23599 d28c30 23595->23599 23596->23594 23596->23599 23601 d18550 41 API calls 23597->23601 23599->23184 23602 d28be3 23600->23602 23603 d28b87 23600->23603 23604 d28b1a 23601->23604 23605 d12e00 28 API calls 23602->23605 23606 d28bb0 23603->23606 23607 d28b8f 23603->23607 23604->23184 23608 d28bee 23605->23608 23611 d12e00 28 API calls 23606->23611 23609 d18780 38 API calls 23607->23609 23608->23184 23610 d28b9a 23609->23610 23610->23184 23612 d28bcd 23611->23612 23612->23184 23614 d18642 23613->23614 23615 d1857d 23613->23615 23616 d116f0 2 API calls 23614->23616 23621 d18607 23615->23621 23622 d185a2 23615->23622 23617 d1864c 23616->23617 23661 d116d0 23617->23661 23618 d11910 39 API calls 23623 d1861c 23618->23623 23621->23618 23621->23623 23622->23617 23624 d185bc 23622->23624 23627 d185e1 23622->23627 23660 d130d0 22 API calls 23623->23660 23624->23175 23626 d18636 23626->23175 23628 d11510 20 API calls 23627->23628 23629 d185f3 23628->23629 23629->23175 23630->23184 23633 d2bb91 23631->23633 23639 d2bbe7 23631->23639 23636 d2bbbb 23633->23636 23664 d33918 23633->23664 23634 d2bbf8 23637 d116f0 2 API calls 23634->23637 23635 d2bbe0 23635->23634 23635->23639 23636->23634 23636->23635 23636->23639 23667 d114b0 22 API calls 23636->23667 23640 d2bc02 23637->23640 23639->23184 23668 d2bed0 83 API calls 2 library calls 23640->23668 23642 d2bc1b 23642->23184 23644 d33918 GetStringTypeW 23643->23644 23645 d200af 23644->23645 23646 d33918 GetStringTypeW 23645->23646 23650 d200ca 23645->23650 23646->23645 23647 d20126 23647->23184 23648 d20118 23648->23647 23651 d116f0 2 API calls 23648->23651 23649 d200f5 23674 d20570 28 API calls 3 library calls 23649->23674 23650->23647 23650->23648 23650->23649 23673 d114b0 22 API calls 23650->23673 23654 d20141 23651->23654 23655->23186 23656->23197 23657->23207 23658->23226 23659->23187 23660->23626 23662 d116f0 2 API calls 23661->23662 23663 d116da 23662->23663 23669 d3803a 23664->23669 23667->23635 23668->23642 23670 d38053 23669->23670 23671 d33927 23669->23671 23670->23671 23672 d3806b GetStringTypeW 23670->23672 23671->23633 23672->23671 23673->23649 23674->23648 23676 d12ef0 2 API calls 23675->23676 23677 d2d573 23676->23677 23678 d12ef0 2 API calls 23677->23678 23679 d2d57a GetModuleFileNameW GetFileVersionInfoSizeW 23678->23679 23680 d2d5b6 23679->23680 23681 d2d5c9 GetFileVersionInfoW 23680->23681 23682 d2d8bf 23680->23682 23681->23682 23683 d2d5e6 VerQueryValueW 23681->23683 23684 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23682->23684 23683->23682 23685 d2d612 23683->23685 23686 d2b111 23684->23686 23687 d11910 39 API calls 23685->23687 23697 d2d920 23686->23697 23688 d2d61e 23687->23688 23689 d2d908 23688->23689 23690 d2d628 23688->23690 23691 d116f0 2 API calls 23689->23691 23690->23682 23696 d2d658 23690->23696 23692 d2d912 23691->23692 23693 d2d410 78 API calls 23693->23696 23694 d115a0 22 API calls 23694->23696 23695 d12e00 28 API calls 23695->23696 23696->23682 23696->23693 23696->23694 23696->23695 23698 d12ef0 2 API calls 23697->23698 23699 d2d95b GetModuleFileNameW GetFileVersionInfoSizeW 23698->23699 23700 d2d997 23699->23700 23701 d2d9aa GetFileVersionInfoW 23700->23701 23702 d2db81 23700->23702 23701->23702 23703 d2d9c7 23701->23703 23704 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23702->23704 23703->23702 23706 d11910 39 API calls 23703->23706 23705 d2dbc6 23704->23705 23705->23292 23707 d2d9ff 23706->23707 23708 d2dbca 23707->23708 23709 d2da09 23707->23709 23710 d116f0 2 API calls 23708->23710 23709->23702 23715 d2da39 23709->23715 23712 d2dbd4 23710->23712 23712->23292 23713 d12e00 28 API calls 23713->23715 23714 d115a0 22 API calls 23714->23715 23715->23702 23715->23713 23715->23714 23918 d2d410 78 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23715->23918 23919 d31200 23716->23919 23719 d13d80 23721 d13d92 23719->23721 23946 d312bd 23719->23946 23721->23333 23721->23337 23902 d1f960 7 API calls 23721->23902 23724 d3f6a0 ___scrt_fastfail 23723->23724 23725 d19a1c VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 23724->23725 23726 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23725->23726 23727 d19a93 23726->23727 23727->23386 23727->23387 23729 d21714 23728->23729 23730 d21723 23729->23730 23731 d218f8 23729->23731 23732 d2173d 23729->23732 23733 d11910 39 API calls 23730->23733 23736 d116d0 2 API calls 23731->23736 23734 d11510 20 API calls 23732->23734 23735 d21778 23733->23735 23734->23730 23737 d21782 23735->23737 23738 d218fd 23735->23738 23736->23738 23741 d11910 39 API calls 23737->23741 23739 d116f0 2 API calls 23738->23739 23740 d21907 23739->23740 23742 d116f0 2 API calls 23740->23742 23743 d21796 23741->23743 23744 d21911 23742->23744 23743->23740 23746 d217a0 23743->23746 23745 d116f0 2 API calls 23744->23745 23747 d2191b 23745->23747 23749 d11910 39 API calls 23746->23749 23748 d116f0 2 API calls 23747->23748 23750 d21925 23748->23750 23751 d217b4 23749->23751 24384 d219b0 88 API calls 23750->24384 23751->23744 23753 d217be 23751->23753 23755 d11910 39 API calls 23753->23755 23754 d2193b 23754->23438 23756 d217e0 23755->23756 23756->23747 23757 d217ea 23756->23757 23758 d199c0 9 API calls 23757->23758 23759 d21820 23758->23759 23760 d18780 38 API calls 23759->23760 23761 d2183b 23760->23761 23762 d21883 23761->23762 23764 d2185a 23761->23764 23771 d2185f 23761->23771 23765 d12e00 28 API calls 23762->23765 23763 d218b2 23763->23438 24382 d115a0 22 API calls 23764->24382 23765->23771 23766 d218d4 23768 d12e00 28 API calls 23766->23768 23768->23763 23769 d218ad 24383 d115a0 22 API calls 23769->24383 23771->23763 23771->23766 23771->23769 23773 d2e582 23772->23773 23774 d2e58f 23773->23774 23775 d2e59d 23773->23775 24385 d2e688 7 API calls 23774->24385 23777 d2e5a2 GetProcessHeap HeapAlloc 23775->23777 23778 d2e5bc InterlockedPopEntrySList 23775->23778 23780 d2e5f0 RaiseException 23777->23780 23781 d2e5b7 23777->23781 23782 d2e5da VirtualAlloc 23778->23782 23783 d2e5c9 ___scrt_fastfail 23778->23783 23779 d2e594 23779->23775 23779->23780 23780->23783 23781->23783 23782->23780 23784 d2e602 InterlockedPopEntrySList 23782->23784 23783->23463 23785 d2e617 VirtualFree 23784->23785 23786 d2e628 23784->23786 23785->23783 23787 d2e62e InterlockedPushEntrySList 23786->23787 23787->23783 23787->23787 23789 d11910 39 API calls 23788->23789 23790 d23609 23789->23790 23791 d23613 23790->23791 23792 d23add 23790->23792 23795 d199c0 9 API calls 23791->23795 23793 d116f0 2 API calls 23792->23793 23794 d23ae7 23793->23794 23794->23464 23796 d23632 23795->23796 23797 d23648 23796->23797 23798 d2363c 23796->23798 23799 d18780 38 API calls 23797->23799 23800 d18780 38 API calls 23798->23800 23801 d23646 23799->23801 23800->23801 23802 d23770 23801->23802 23803 d23661 CreateCompatibleDC 23801->23803 23808 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23802->23808 23804 d236e3 FindResourceW 23803->23804 23805 d2366f ___scrt_fastfail 23803->23805 23804->23802 23806 d23702 SizeofResource 23804->23806 24386 d33b12 23805->24386 23806->23802 23807 d23715 LoadResource 23806->23807 23807->23802 23809 d23731 LockResource 23807->23809 23811 d237ab 23808->23811 23809->23802 23812 d23744 GlobalAlloc 23809->23812 23811->23464 23812->23802 23814 d23759 GlobalLock 23812->23814 23817 d23769 GlobalFree 23814->23817 23820 d237af 23814->23820 23815 d236a9 23818 d12e00 28 API calls 23815->23818 23816 d236dc DeleteDC 23816->23804 23817->23802 23819 d236d9 23818->23819 23819->23816 23821 d23833 23820->23821 23822 d238d5 23820->23822 24395 d13080 HeapAlloc RaiseException 23821->24395 24399 d23e50 26 API calls 4 library calls 23822->24399 23825 d238e4 23836 d238fe 23825->23836 24400 d2efd7 20 API calls _abort 23825->24400 23826 d23858 23827 d23862 23826->23827 23828 d23878 23826->23828 23856 d20379 23855->23856 23857 d20168 _wcsstr 23855->23857 23856->23239 23857->23856 23858 d20368 23857->23858 23862 d2026e _wcsstr BuildCatchObjectHelperInternal 23857->23862 24413 d114b0 22 API calls 23857->24413 23858->23856 23859 d116f0 2 API calls 23858->23859 23861 d203a4 23859->23861 23862->23858 23862->23862 24414 d2efd7 20 API calls _abort 23862->24414 24415 d2eefe 26 API calls pre_c_initialization 23862->24415 24416 d19870 HeapAlloc RaiseException 23862->24416 24417 d20780 28 API calls 4 library calls 23862->24417 23867->23250 23868->23258 23869->23265 23871 d11910 39 API calls 23870->23871 23872 d113b8 23871->23872 23873 d113be 23872->23873 23874 d116f0 2 API calls 23872->23874 23876 d204d0 23873->23876 23875 d113d6 23874->23875 24418 d204f0 23876->24418 23879->23493 23880->23348 23882 d33aa0 23881->23882 23883 d33a8c 23881->23883 24493 d33a36 23882->24493 24491 d2efd7 20 API calls _abort 23883->24491 23886 d33a91 24492 d2eefe 26 API calls pre_c_initialization 23886->24492 23889 d33ab5 CreateThread 23890 d33ad4 GetLastError 23889->23890 23894 d33ae0 23889->23894 24511 d3392b 23889->24511 24502 d2efa1 20 API calls 2 library calls 23890->24502 23893 d2a9e7 GetLastError 23893->23325 24503 d339a8 23894->24503 23895->23334 23896->23372 23897->23489 23898->23489 23899->23489 23900->23461 23901->23493 23902->23337 23903->23363 23904->23385 23905->23468 23906->23484 23908 d13412 23907->23908 23911 d133b1 23907->23911 23909 d116f0 2 API calls 23908->23909 23915 d1341c 23908->23915 23910 d1343a 23909->23910 23911->23908 23912 d133f5 23911->23912 26088 d114b0 22 API calls 23911->26088 23914 d11510 20 API calls 23912->23914 23914->23908 23915->23492 23916->23385 23917->23495 23918->23715 23920 d3121e 23919->23920 23921 d3120d 23919->23921 23959 d3113f 23920->23959 23976 d2efd7 20 API calls _abort 23921->23976 23924 d31212 23977 d2eefe 26 API calls pre_c_initialization 23924->23977 23925 d3122e 23926 d13d65 23925->23926 23978 d2efd7 20 API calls _abort 23925->23978 23926->23719 23929 d16750 23926->23929 23930 d16793 23929->23930 23931 d16787 23929->23931 24032 d31b58 23930->24032 23931->23719 23934 d16873 23934->23719 23939 d31d3f __fread_nolock 40 API calls 23940 d1682a 23939->23940 23940->23934 23941 d31d3f __fread_nolock 40 API calls 23940->23941 23942 d1684c 23941->23942 23942->23934 23943 d31d3f __fread_nolock 40 API calls 23942->23943 23944 d1685e 23943->23944 23944->23934 23945 d31d3f __fread_nolock 40 API calls 23944->23945 23945->23934 23947 d312c9 BuildCatchObjectHelperInternal 23946->23947 23948 d312da 23947->23948 23949 d312ef 23947->23949 24336 d2efd7 20 API calls _abort 23948->24336 23958 d312ea __fread_nolock 23949->23958 24319 d36741 EnterCriticalSection 23949->24319 23952 d312df 24337 d2eefe 26 API calls pre_c_initialization 23952->24337 23953 d3130b 24320 d31247 23953->24320 23956 d31316 24338 d31333 LeaveCriticalSection __fread_nolock 23956->24338 23958->23721 23962 d3114b BuildCatchObjectHelperInternal 23959->23962 23960 d31159 23987 d2efd7 20 API calls _abort 23960->23987 23962->23960 23963 d31189 23962->23963 23965 d3119b 23963->23965 23966 d3118e 23963->23966 23964 d3115e 23988 d2eefe 26 API calls pre_c_initialization 23964->23988 23979 d36769 23965->23979 23989 d2efd7 20 API calls _abort 23966->23989 23970 d311a4 23971 d311b7 23970->23971 23972 d311aa 23970->23972 23991 d311e9 LeaveCriticalSection __fread_nolock 23971->23991 23990 d2efd7 20 API calls _abort 23972->23990 23973 d31169 __fread_nolock 23973->23925 23976->23924 23977->23926 23978->23926 23980 d36775 BuildCatchObjectHelperInternal 23979->23980 23992 d38ffb EnterCriticalSection 23980->23992 23982 d36783 23993 d36803 23982->23993 23986 d367b4 __fread_nolock 23986->23970 23987->23964 23988->23973 23989->23973 23990->23973 23991->23973 23992->23982 24000 d36826 23993->24000 23994 d36790 24006 d367bf 23994->24006 23995 d3687f 24011 d365c0 23995->24011 24000->23994 24000->23995 24009 d36741 EnterCriticalSection 24000->24009 24010 d36755 LeaveCriticalSection 24000->24010 24001 d36891 24001->23994 24026 d38749 11 API calls 2 library calls 24001->24026 24003 d368b0 24027 d36741 EnterCriticalSection 24003->24027 24031 d39043 LeaveCriticalSection 24006->24031 24008 d367c6 24008->23986 24009->24000 24010->24000 24012 d365cd 24011->24012 24013 d3660d 24012->24013 24014 d365f8 HeapAlloc 24012->24014 24017 d365e1 _abort 24012->24017 24029 d2efd7 20 API calls _abort 24013->24029 24015 d3660b 24014->24015 24014->24017 24018 d36612 24015->24018 24017->24013 24017->24014 24028 d39829 7 API calls 2 library calls 24017->24028 24020 d359e0 24018->24020 24021 d359eb RtlFreeHeap 24020->24021 24022 d35a14 _free 24020->24022 24021->24022 24023 d35a00 24021->24023 24022->24001 24030 d2efd7 20 API calls _abort 24023->24030 24025 d35a06 GetLastError 24025->24022 24026->24003 24027->23994 24028->24017 24029->24018 24030->24025 24031->24008 24041 d31904 24032->24041 24034 d167bd 24034->23934 24035 d31d3f 24034->24035 24190 d31d5c 24035->24190 24037 d167d6 24037->23934 24038 d31b3d 24037->24038 24039 d31904 73 API calls 24038->24039 24040 d16811 24039->24040 24040->23934 24040->23939 24042 d31910 BuildCatchObjectHelperInternal 24041->24042 24043 d3191c 24042->24043 24045 d31942 24042->24045 24066 d2efd7 20 API calls _abort 24043->24066 24054 d36741 EnterCriticalSection 24045->24054 24046 d31921 24067 d2eefe 26 API calls pre_c_initialization 24046->24067 24049 d3194e 24055 d31a64 24049->24055 24051 d31962 24068 d31981 LeaveCriticalSection __fread_nolock 24051->24068 24053 d3192c __fread_nolock 24053->24034 24054->24049 24056 d31a86 24055->24056 24057 d31a76 24055->24057 24069 d3198b 24056->24069 24082 d2efd7 20 API calls _abort 24057->24082 24060 d31a7b 24060->24051 24062 d31aa9 24065 d31b28 24062->24065 24073 d36cf1 24062->24073 24065->24051 24066->24046 24067->24053 24068->24053 24070 d31997 24069->24070 24071 d3199e 24069->24071 24070->24062 24071->24070 24072 d3109c __fread_nolock 28 API calls 24071->24072 24072->24070 24074 d31ad0 24073->24074 24075 d36d09 24073->24075 24079 d3109c 24074->24079 24075->24074 24083 d36c8d 24075->24083 24077 d36d29 24090 d30871 24077->24090 24179 d30f74 24079->24179 24082->24060 24084 d36c99 24083->24084 24085 d36cae 24083->24085 24115 d2efd7 20 API calls _abort 24084->24115 24085->24077 24087 d36c9e 24116 d2eefe 26 API calls pre_c_initialization 24087->24116 24089 d36ca9 24089->24077 24091 d3087d BuildCatchObjectHelperInternal 24090->24091 24092 d30885 24091->24092 24094 d3089d 24091->24094 24171 d2efc4 20 API calls _abort 24092->24171 24095 d3093b 24094->24095 24098 d308d2 24094->24098 24176 d2efc4 20 API calls _abort 24095->24176 24096 d3088a 24172 d2efd7 20 API calls _abort 24096->24172 24117 d35c9b EnterCriticalSection 24098->24117 24099 d30940 24177 d2efd7 20 API calls _abort 24099->24177 24103 d308d8 24105 d308f4 24103->24105 24106 d30909 24103->24106 24104 d30948 24178 d2eefe 26 API calls pre_c_initialization 24104->24178 24173 d2efd7 20 API calls _abort 24105->24173 24118 d3095c 24106->24118 24109 d30892 __fread_nolock 24109->24074 24111 d308f9 24174 d2efc4 20 API calls _abort 24111->24174 24112 d30904 24175 d30933 LeaveCriticalSection __wsopen_s 24112->24175 24115->24087 24116->24089 24117->24103 24119 d3098a 24118->24119 24159 d30983 24118->24159 24120 d3098e 24119->24120 24121 d309ad 24119->24121 24123 d2efc4 __dosmaperr 20 API calls 24120->24123 24124 d309fe 24121->24124 24125 d309e1 24121->24125 24122 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24126 d30b64 24122->24126 24127 d30993 24123->24127 24129 d30a14 24124->24129 24131 d3109c __fread_nolock 28 API calls 24124->24131 24128 d2efc4 __dosmaperr 20 API calls 24125->24128 24126->24112 24130 d2efd7 _free 20 API calls 24127->24130 24134 d309e6 24128->24134 24133 d30501 __wsopen_s 48 API calls 24129->24133 24132 d3099a 24130->24132 24131->24129 24135 d2eefe pre_c_initialization 26 API calls 24132->24135 24136 d30a1d 24133->24136 24137 d2efd7 _free 20 API calls 24134->24137 24135->24159 24138 d30a22 24136->24138 24139 d30a5b 24136->24139 24140 d309ee 24137->24140 24141 d30a26 24138->24141 24142 d30a48 24138->24142 24144 d30ab5 WriteFile 24139->24144 24145 d30a6f 24139->24145 24143 d2eefe pre_c_initialization 26 API calls 24140->24143 24148 d30b1c 24141->24148 24153 d30494 __wsopen_s GetLastError WriteConsoleW CreateFileW 24141->24153 24149 d302e1 __wsopen_s 54 API calls 24142->24149 24143->24159 24150 d30ad8 GetLastError 24144->24150 24155 d30a3e 24144->24155 24146 d30a77 24145->24146 24147 d30aa5 24145->24147 24151 d30a95 24146->24151 24152 d30a7c 24146->24152 24154 d30577 __wsopen_s 7 API calls 24147->24154 24148->24159 24160 d2efd7 _free 20 API calls 24148->24160 24149->24155 24150->24155 24157 d30744 __wsopen_s 8 API calls 24151->24157 24152->24148 24156 d30a85 24152->24156 24153->24155 24158 d30a93 24154->24158 24155->24148 24155->24159 24161 d30af8 24155->24161 24162 d30656 __wsopen_s 7 API calls 24156->24162 24157->24158 24158->24155 24159->24122 24163 d30b41 24160->24163 24165 d30b13 24161->24165 24166 d30aff 24161->24166 24162->24158 24164 d2efc4 __dosmaperr 20 API calls 24163->24164 24164->24159 24168 d2efa1 __dosmaperr 20 API calls 24165->24168 24167 d2efd7 _free 20 API calls 24166->24167 24169 d30b04 24167->24169 24168->24159 24170 d2efc4 __dosmaperr 20 API calls 24169->24170 24170->24159 24171->24096 24172->24109 24173->24111 24174->24112 24175->24109 24176->24099 24177->24104 24178->24109 24180 d35f18 __wsopen_s 26 API calls 24179->24180 24181 d30f86 24180->24181 24182 d30f9f SetFilePointerEx 24181->24182 24183 d30f8e 24181->24183 24184 d30fb7 GetLastError 24182->24184 24187 d30f93 24182->24187 24188 d2efd7 20 API calls _abort 24183->24188 24189 d2efa1 20 API calls 2 library calls 24184->24189 24187->24065 24188->24187 24189->24187 24191 d31d68 BuildCatchObjectHelperInternal 24190->24191 24192 d31d7b ___scrt_fastfail 24191->24192 24193 d31da8 24191->24193 24194 d31da0 __fread_nolock 24191->24194 24217 d2efd7 20 API calls _abort 24192->24217 24203 d36741 EnterCriticalSection 24193->24203 24194->24037 24197 d31db2 24204 d31b73 24197->24204 24198 d31d95 24218 d2eefe 26 API calls pre_c_initialization 24198->24218 24203->24197 24207 d31b85 ___scrt_fastfail 24204->24207 24210 d31ba2 24204->24210 24205 d31b92 24285 d2efd7 20 API calls _abort 24205->24285 24207->24205 24207->24210 24215 d31be5 __fread_nolock 24207->24215 24208 d31b97 24286 d2eefe 26 API calls pre_c_initialization 24208->24286 24219 d31de7 LeaveCriticalSection __fread_nolock 24210->24219 24211 d31d01 ___scrt_fastfail 24288 d2efd7 20 API calls _abort 24211->24288 24213 d36c8d __fread_nolock 26 API calls 24213->24215 24215->24210 24215->24211 24215->24213 24220 d2ff2c 24215->24220 24287 d31def 26 API calls 4 library calls 24215->24287 24217->24198 24218->24194 24219->24194 24221 d2ff56 24220->24221 24222 d2ff3e 24220->24222 24224 d302c0 24221->24224 24229 d2ff9b 24221->24229 24298 d2efc4 20 API calls _abort 24222->24298 24313 d2efc4 20 API calls _abort 24224->24313 24225 d2ff43 24299 d2efd7 20 API calls _abort 24225->24299 24228 d302c5 24314 d2efd7 20 API calls _abort 24228->24314 24230 d2ff4b 24229->24230 24232 d2ffa6 24229->24232 24236 d2ffd6 24229->24236 24230->24215 24300 d2efc4 20 API calls _abort 24232->24300 24233 d2ffb3 24315 d2eefe 26 API calls pre_c_initialization 24233->24315 24235 d2ffab 24301 d2efd7 20 API calls _abort 24235->24301 24239 d2ffef 24236->24239 24240 d30031 24236->24240 24241 d30015 24236->24241 24239->24241 24245 d2fffc 24239->24245 24305 d36357 21 API calls 2 library calls 24240->24305 24302 d2efc4 20 API calls _abort 24241->24302 24244 d3001a 24303 d2efd7 20 API calls _abort 24244->24303 24289 d36301 24245->24289 24246 d30048 24249 d359e0 _free 20 API calls 24246->24249 24252 d30051 24249->24252 24250 d30021 24304 d2eefe 26 API calls pre_c_initialization 24250->24304 24251 d3019a 24254 d30210 24251->24254 24257 d301b3 GetConsoleMode 24251->24257 24255 d359e0 _free 20 API calls 24252->24255 24256 d30214 ReadFile 24254->24256 24258 d30058 24255->24258 24259 d30288 GetLastError 24256->24259 24260 d3022e 24256->24260 24257->24254 24261 d301c4 24257->24261 24262 d30062 24258->24262 24263 d3007d 24258->24263 24264 d30295 24259->24264 24265 d301ec 24259->24265 24260->24259 24266 d30205 24260->24266 24261->24256 24267 d301ca ReadConsoleW 24261->24267 24306 d2efd7 20 API calls _abort 24262->24306 24271 d3109c __fread_nolock 28 API calls 24263->24271 24311 d2efd7 20 API calls _abort 24264->24311 24282 d3002c __fread_nolock 24265->24282 24308 d2efa1 20 API calls 2 library calls 24265->24308 24278 d30253 24266->24278 24279 d3026a 24266->24279 24266->24282 24267->24266 24272 d301e6 GetLastError 24267->24272 24268 d359e0 _free 20 API calls 24268->24230 24271->24245 24272->24265 24274 d30067 24307 d2efc4 20 API calls _abort 24274->24307 24275 d3029a 24312 d2efc4 20 API calls _abort 24275->24312 24309 d2fc48 31 API calls 3 library calls 24278->24309 24280 d30281 24279->24280 24279->24282 24310 d2fa64 29 API calls __fread_nolock 24280->24310 24282->24268 24284 d30286 24284->24282 24285->24208 24286->24210 24287->24215 24288->24208 24290 d3631b 24289->24290 24291 d3630e 24289->24291 24293 d36327 24290->24293 24317 d2efd7 20 API calls _abort 24290->24317 24316 d2efd7 20 API calls _abort 24291->24316 24293->24251 24295 d36313 24295->24251 24296 d36348 24318 d2eefe 26 API calls pre_c_initialization 24296->24318 24298->24225 24299->24230 24300->24235 24301->24233 24302->24244 24303->24250 24304->24282 24305->24246 24306->24274 24307->24282 24308->24282 24309->24282 24310->24284 24311->24275 24312->24282 24313->24228 24314->24233 24315->24230 24316->24295 24317->24296 24318->24295 24319->23953 24321 d31254 24320->24321 24322 d31269 24320->24322 24358 d2efd7 20 API calls _abort 24321->24358 24325 d36cf1 71 API calls 24322->24325 24327 d31264 24322->24327 24324 d31259 24359 d2eefe 26 API calls pre_c_initialization 24324->24359 24328 d3127d 24325->24328 24327->23956 24339 d36cb3 24328->24339 24331 d36c8d __fread_nolock 26 API calls 24332 d3128b 24331->24332 24343 d30c12 24332->24343 24335 d359e0 _free 20 API calls 24335->24327 24336->23952 24337->23958 24338->23958 24340 d31285 24339->24340 24341 d36cc9 24339->24341 24340->24331 24341->24340 24342 d359e0 _free 20 API calls 24341->24342 24342->24340 24344 d30c21 24343->24344 24346 d30c36 24343->24346 24363 d2efc4 20 API calls _abort 24344->24363 24345 d30c71 24365 d2efc4 20 API calls _abort 24345->24365 24346->24345 24350 d30c5d 24346->24350 24349 d30c26 24364 d2efd7 20 API calls _abort 24349->24364 24360 d30bea 24350->24360 24351 d30c76 24366 d2efd7 20 API calls _abort 24351->24366 24355 d30c2e 24355->24327 24355->24335 24356 d30c7e 24367 d2eefe 26 API calls pre_c_initialization 24356->24367 24358->24324 24359->24327 24368 d30b68 24360->24368 24362 d30c0e 24362->24355 24363->24349 24364->24355 24365->24351 24366->24356 24367->24355 24369 d30b74 BuildCatchObjectHelperInternal 24368->24369 24379 d35c9b EnterCriticalSection 24369->24379 24371 d30b82 24372 d30bb4 24371->24372 24373 d30ba9 24371->24373 24380 d2efd7 20 API calls _abort 24372->24380 24374 d30c91 __wsopen_s 29 API calls 24373->24374 24376 d30baf 24374->24376 24381 d30bde LeaveCriticalSection __wsopen_s 24376->24381 24378 d30bd1 __fread_nolock 24378->24362 24379->24371 24380->24376 24381->24378 24382->23771 24383->23763 24384->23754 24385->23779 24387 d33b2d 24386->24387 24388 d33b1f 24386->24388 24410 d2efd7 20 API calls _abort 24387->24410 24388->24387 24391 d33b46 24388->24391 24392 d2368b EnumFontFamiliesExW 24391->24392 24412 d2efd7 20 API calls _abort 24391->24412 24392->23815 24392->23816 24394 d33b37 24411 d2eefe 26 API calls pre_c_initialization 24394->24411 24395->23826 24399->23825 24410->24394 24411->24392 24412->24394 24413->23862 24414->23862 24415->23862 24416->23862 24417->23862 24419 d20500 24418->24419 24429 d20539 24418->24429 24431 d19840 24419->24431 24421 d116f0 2 API calls 24422 d20560 24421->24422 24423 d116f0 2 API calls 24422->24423 24425 d2056a 24423->24425 24426 d2052b 24435 d197f0 24426->24435 24429->24421 24430 d204e2 OpenEventW 24429->24430 24430->23305 24430->23306 24432 d19853 ___scrt_initialize_default_local_stdio_options 24431->24432 24440 d33851 24432->24440 24436 d19805 ___scrt_initialize_default_local_stdio_options 24435->24436 24466 d33875 24436->24466 24439 d114b0 22 API calls 24439->24426 24443 d32335 24440->24443 24444 d32375 24443->24444 24445 d3235d 24443->24445 24444->24445 24446 d3237d 24444->24446 24460 d2efd7 20 API calls _abort 24445->24460 24462 d3282a 47 API calls 2 library calls 24446->24462 24449 d32362 24461 d2eefe 26 API calls pre_c_initialization 24449->24461 24450 d3238d 24463 d327f5 20 API calls _free 24450->24463 24452 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24454 d19861 24452->24454 24454->24422 24454->24426 24454->24439 24455 d32405 24464 d32b73 60 API calls 2 library calls 24455->24464 24458 d32410 24465 d328ad 20 API calls _free 24458->24465 24459 d3236d 24459->24452 24460->24449 24461->24459 24462->24450 24463->24455 24464->24458 24465->24459 24469 d324ba 24466->24469 24468 d19813 24468->24429 24470 d324c5 24469->24470 24471 d324da 24469->24471 24485 d2efd7 20 API calls _abort 24470->24485 24472 d3251e 24471->24472 24474 d324e8 24471->24474 24489 d2efd7 20 API calls _abort 24472->24489 24487 d321b0 60 API calls 4 library calls 24474->24487 24476 d324ca 24486 d2eefe 26 API calls pre_c_initialization 24476->24486 24479 d324d5 24479->24468 24480 d32500 24482 d3252e 24480->24482 24488 d2efd7 20 API calls _abort 24480->24488 24482->24468 24484 d32516 24490 d2eefe 26 API calls pre_c_initialization 24484->24490 24485->24476 24486->24479 24487->24480 24488->24484 24489->24484 24490->24482 24491->23886 24492->23893 24494 d365c0 _abort 20 API calls 24493->24494 24495 d33a46 24494->24495 24496 d359e0 _free 20 API calls 24495->24496 24497 d33a4f 24496->24497 24498 d33a56 GetModuleHandleExW 24497->24498 24499 d33a6e 24497->24499 24498->24499 24500 d339a8 22 API calls 24499->24500 24501 d33a78 24500->24501 24501->23889 24501->23894 24502->23894 24504 d339b5 24503->24504 24505 d339d9 24503->24505 24506 d339c4 24504->24506 24507 d339bb CloseHandle 24504->24507 24505->23893 24508 d339d3 24506->24508 24509 d339ca FreeLibrary 24506->24509 24507->24506 24510 d359e0 _free 20 API calls 24508->24510 24509->24508 24510->24505 24512 d33937 _abort 24511->24512 24513 d3394b 24512->24513 24514 d3393e GetLastError ExitThread 24512->24514 24527 d35891 GetLastError 24513->24527 24516 d33950 24547 d38950 24516->24547 24519 d33966 24555 d199a0 24519->24555 24521 d33982 24560 d33b04 23 API calls 24521->24560 24528 d358ad 24527->24528 24529 d358a7 24527->24529 24531 d365c0 _abort 20 API calls 24528->24531 24533 d358fc SetLastError 24528->24533 24561 d3869a 11 API calls 2 library calls 24529->24561 24532 d358bf 24531->24532 24539 d358c7 24532->24539 24562 d386f0 11 API calls 2 library calls 24532->24562 24533->24516 24535 d359e0 _free 20 API calls 24537 d358cd 24535->24537 24536 d358dc 24538 d358e3 24536->24538 24536->24539 24540 d35908 SetLastError 24537->24540 24563 d35703 20 API calls _abort 24538->24563 24539->24535 24564 d38be6 47 API calls 2 library calls 24540->24564 24542 d358ee 24545 d359e0 _free 20 API calls 24542->24545 24544 d35914 24546 d358f5 24545->24546 24546->24533 24546->24540 24548 d38975 24547->24548 24549 d3896b 24547->24549 24565 d384d7 5 API calls 2 library calls 24548->24565 24551 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24549->24551 24552 d3395b 24551->24552 24552->24519 24554 d3888f 10 API calls 2 library calls 24552->24554 24553 d3898c 24553->24549 24554->24519 24556 d199b3 24555->24556 24557 d199aa 24555->24557 24556->24521 24566 d1fb80 24557->24566 24561->24528 24562->24536 24563->24542 24564->24544 24565->24553 24606 d1dc20 24566->24606 24569 d1fbb9 WaitForSingleObject 24571 d1fbd5 24569->24571 24572 d1fbcb 24569->24572 24570 d1fd2d 24570->24572 24573 d1fd33 SendMessageW 24570->24573 24571->24572 24577 d11910 39 API calls 24571->24577 24595 d1fc43 24571->24595 24574 d1fd59 24572->24574 24575 d1fd4e PostMessageW 24572->24575 24573->24572 24576 d1fd6b 24574->24576 24843 d1e840 82 API calls 24574->24843 24575->24574 24581 d1fd71 PostMessageW 24576->24581 24582 d1fd7c 24576->24582 24583 d1fbf7 24577->24583 24578 d1fcf0 SendMessageW 24579 d1fcff 24578->24579 24579->24572 24584 d1fd11 24579->24584 24585 d1fd0a 24579->24585 24581->24582 24586 d1fc01 24583->24586 24595->24578 24595->24579 24607 d3f6a0 ___scrt_fastfail 24606->24607 24608 d1dc79 GetModuleFileNameW 24607->24608 24844 d1b2c0 24608->24844 24610 d1dc9b 24853 d1a410 24610->24853 24613 d1dcee PathFileExistsW 24614 d1dd34 24613->24614 24615 d1dcf9 CreateDirectoryW 24613->24615 24907 d15730 24614->24907 24615->24614 24617 d1dcc5 24615->24617 24618 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24617->24618 24620 d1e82c 24618->24620 24620->24569 24620->24570 24843->24576 24845 d3f6a0 ___scrt_fastfail 24844->24845 24846 d1b2f6 FindFirstFileW 24845->24846 24847 d1b30a 24846->24847 24848 d1b32e FindClose 24846->24848 24849 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24847->24849 24850 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24848->24850 24851 d1b32a 24849->24851 24852 d1b34c 24850->24852 24851->24610 24852->24610 24854 d1a42b __wsopen_s 24853->24854 24855 d11910 39 API calls 24854->24855 24861 d1a466 24855->24861 24856 d1a81a 24857 d116f0 2 API calls 24856->24857 24858 d1a824 24857->24858 24859 d116f0 2 API calls 24858->24859 24862 d1a82e 24859->24862 24860 d1a4ab GetTempPathW 24864 d1a4c0 24860->24864 24861->24856 24861->24860 25366 d114b0 22 API calls 24861->25366 24865 d1a4e1 24864->24865 24866 d1a810 24864->24866 24867 d1a593 24865->24867 24868 d1a4f4 24865->24868 24869 d116f0 2 API calls 24866->24869 24871 d11910 39 API calls 24867->24871 25367 d12ca0 24868->25367 24869->24856 24872 d1a598 24871->24872 24872->24858 24873 d1a5a2 24872->24873 24874 d12ef0 2 API calls 24873->24874 24885 d1a5c2 ___scrt_fastfail 24874->24885 24875 d1a56b PathFileExistsW 24878 d1a580 24875->24878 24879 d1a578 CreateDirectoryW 24875->24879 24876 d1a504 24876->24875 24877 d13390 22 API calls 24876->24877 24877->24875 24880 d13390 22 API calls 24878->24880 24879->24878 24883 d1a58e 24880->24883 24881 d1a625 24881->24883 24886 d12ca0 41 API calls 24881->24886 24882 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24884 d1a7f7 24882->24884 24883->24882 24884->24613 24884->24617 24885->24881 24887 d12e00 28 API calls 24885->24887 24888 d1a64a 24886->24888 24887->24881 24889 d1a69d 24888->24889 24890 d1a6af 24888->24890 24891 d13390 22 API calls 24889->24891 24892 d13390 22 API calls 24890->24892 24891->24890 24893 d1a6c1 PathFileExistsW 24892->24893 24894 d1a6e1 24893->24894 24895 d1a6d2 CreateDirectoryW 24893->24895 24894->24883 24896 d12ca0 41 API calls 24894->24896 24895->24894 24897 d1a6ff 24896->24897 24898 d1a764 24897->24898 24899 d13390 22 API calls 24897->24899 24900 d13390 22 API calls 24898->24900 24899->24898 24901 d1a776 24900->24901 25383 d15b20 24907->25383 25366->24860 25368 d12d27 25367->25368 25373 d12cc6 25367->25373 25369 d11910 39 API calls 25368->25369 25370 d12d39 25368->25370 25369->25370 25382 d130d0 22 API calls 25370->25382 25371 d12cda 25371->24876 25373->25371 25375 d12d61 25373->25375 25376 d12cff 25373->25376 25374 d12d55 25374->24876 25377 d116d0 2 API calls 25375->25377 25378 d11510 20 API calls 25376->25378 25379 d12d66 25377->25379 25380 d12d13 25378->25380 25380->24876 25382->25374 25384 d18340 51 API calls 25383->25384 25385 d15b59 25384->25385 25386 d15b76 GetNamedSecurityInfoW 25385->25386 25390 d11640 22 API calls 25385->25390 26088->23912 26090 d41618 RaiseException 26089->26090 26090->23503 26092 d23cb0 KiUserCallbackDispatcher 26093 d23d3e 26092->26093 26094 d23d25 26092->26094 26094->26093 26095 d23d5e SetWindowLongW 26094->26095 26095->26093 26096 d36e7f 26097 d36ea4 26096->26097 26098 d36e8c 26096->26098 26102 d36eff 26097->26102 26110 d36e9c 26097->26110 26148 d39d6d 21 API calls 2 library calls 26097->26148 26146 d2efd7 20 API calls _abort 26098->26146 26100 d36e91 26147 d2eefe 26 API calls pre_c_initialization 26100->26147 26103 d36c8d __fread_nolock 26 API calls 26102->26103 26105 d36f17 26103->26105 26116 d2fe19 26105->26116 26107 d36f1e 26108 d36c8d __fread_nolock 26 API calls 26107->26108 26107->26110 26109 d36f4a 26108->26109 26109->26110 26111 d36c8d __fread_nolock 26 API calls 26109->26111 26112 d36f58 26111->26112 26112->26110 26113 d36c8d __fread_nolock 26 API calls 26112->26113 26114 d36f68 26113->26114 26115 d36c8d __fread_nolock 26 API calls 26114->26115 26115->26110 26117 d2fe25 BuildCatchObjectHelperInternal 26116->26117 26118 d2fe2d 26117->26118 26121 d2fe45 26117->26121 26150 d2efc4 20 API calls _abort 26118->26150 26119 d2ff0b 26157 d2efc4 20 API calls _abort 26119->26157 26121->26119 26124 d2fe7e 26121->26124 26123 d2fe32 26151 d2efd7 20 API calls _abort 26123->26151 26127 d2fea2 26124->26127 26128 d2fe8d 26124->26128 26125 d2ff10 26158 d2efd7 20 API calls _abort 26125->26158 26149 d35c9b EnterCriticalSection 26127->26149 26152 d2efc4 20 API calls _abort 26128->26152 26132 d2fe9a 26159 d2eefe 26 API calls pre_c_initialization 26132->26159 26133 d2fe92 26153 d2efd7 20 API calls _abort 26133->26153 26134 d2fea8 26137 d2fec4 26134->26137 26138 d2fed9 26134->26138 26135 d2fe3a __fread_nolock 26135->26107 26154 d2efd7 20 API calls _abort 26137->26154 26140 d2ff2c __fread_nolock 38 API calls 26138->26140 26142 d2fed4 26140->26142 26156 d2ff03 LeaveCriticalSection __wsopen_s 26142->26156 26143 d2fec9 26155 d2efc4 20 API calls _abort 26143->26155 26146->26100 26147->26110 26148->26102 26149->26134 26150->26123 26151->26135 26152->26133 26153->26132 26154->26143 26155->26142 26156->26135 26157->26125 26158->26132 26159->26135 26160 d3133d 26161 d31349 BuildCatchObjectHelperInternal 26160->26161 26162 d31355 26161->26162 26163 d3136c 26161->26163 26194 d2efd7 20 API calls _abort 26162->26194 26173 d36741 EnterCriticalSection 26163->26173 26166 d3135a 26195 d2eefe 26 API calls pre_c_initialization 26166->26195 26167 d3137c 26174 d313b9 26167->26174 26170 d31388 26196 d313af LeaveCriticalSection __fread_nolock 26170->26196 26172 d31365 __fread_nolock 26173->26167 26175 d313e1 26174->26175 26176 d313c7 26174->26176 26177 d36c8d __fread_nolock 26 API calls 26175->26177 26200 d2efd7 20 API calls _abort 26176->26200 26179 d313ea 26177->26179 26197 d31081 26179->26197 26180 d313cc 26201 d2eefe 26 API calls pre_c_initialization 26180->26201 26182 d313d7 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 26182->26170 26185 d31472 26189 d3148f 26185->26189 26191 d314a1 26185->26191 26186 d314ee 26187 d314fb 26186->26187 26186->26191 26203 d2efd7 20 API calls _abort 26187->26203 26202 d316d2 31 API calls 4 library calls 26189->26202 26191->26182 26204 d3154e 30 API calls 2 library calls 26191->26204 26192 d31499 26192->26182 26194->26166 26195->26172 26196->26172 26205 d30e18 26197->26205 26199 d31097 26199->26182 26199->26185 26199->26186 26200->26180 26201->26182 26202->26192 26203->26182 26204->26182 26206 d30e24 BuildCatchObjectHelperInternal 26205->26206 26207 d30e44 26206->26207 26208 d30e2c 26206->26208 26210 d30ef8 26207->26210 26214 d30e7c 26207->26214 26231 d2efc4 20 API calls _abort 26208->26231 26236 d2efc4 20 API calls _abort 26210->26236 26211 d30e31 26232 d2efd7 20 API calls _abort 26211->26232 26213 d30efd 26237 d2efd7 20 API calls _abort 26213->26237 26230 d35c9b EnterCriticalSection 26214->26230 26218 d30f05 26238 d2eefe 26 API calls pre_c_initialization 26218->26238 26219 d30e82 26221 d30ea6 26219->26221 26222 d30ebb 26219->26222 26233 d2efd7 20 API calls _abort 26221->26233 26225 d30f74 __fread_nolock 28 API calls 26222->26225 26224 d30e39 __fread_nolock 26224->26199 26227 d30eb6 26225->26227 26226 d30eab 26234 d2efc4 20 API calls _abort 26226->26234 26235 d30ef0 LeaveCriticalSection __wsopen_s 26227->26235 26230->26219 26231->26211 26232->26224 26233->26226 26234->26227 26235->26224 26236->26213 26237->26218 26238->26224 26239 d128fe 26240 d113b0 41 API calls 26239->26240 26241 d12909 26240->26241 26242 d113b0 41 API calls 26241->26242 26243 d1291b 26242->26243 26244 d12982 26243->26244 26245 d12925 26243->26245 26296 d12d70 24 API calls 26244->26296 26247 d12f70 36 API calls 26245->26247 26252 d12934 26247->26252 26248 d12963 26249 d129b7 26248->26249 26251 d129e4 26248->26251 26256 d129b2 26248->26256 26250 d13390 22 API calls 26249->26250 26255 d12a08 26250->26255 26254 d12e00 28 API calls 26251->26254 26253 d12e00 28 API calls 26252->26253 26253->26248 26254->26249 26280 d11e70 26255->26280 26297 d115a0 22 API calls 26256->26297 26259 d12a16 26289 d12bf0 CreateFileW 26259->26289 26262 d11910 39 API calls 26263 d12a36 26262->26263 26264 d12b75 26263->26264 26268 d12a40 26263->26268 26265 d116f0 2 API calls 26264->26265 26266 d12b7f 26265->26266 26267 d12a8c 26270 d12af2 26267->26270 26271 d12aff 26267->26271 26268->26267 26269 d12ab8 26268->26269 26272 d12a87 26268->26272 26273 d12e00 28 API calls 26269->26273 26299 d136f0 22 API calls 26270->26299 26300 d13440 29 API calls 26271->26300 26298 d115a0 22 API calls 26272->26298 26273->26267 26277 d1267e 26278 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 26277->26278 26279 d1269c 26278->26279 26281 d11ec4 26280->26281 26282 d11e7e 26280->26282 26281->26259 26283 d30c12 31 API calls 26282->26283 26284 d11e85 26283->26284 26285 d11ea6 26284->26285 26286 d12ef0 2 API calls 26284->26286 26285->26259 26287 d11e9e 26286->26287 26288 d12ef0 2 API calls 26287->26288 26288->26285 26290 d12a31 26289->26290 26291 d12c1d DosDateTimeToFileTime 26289->26291 26290->26262 26292 d12c75 CloseHandle SetFileAttributesW 26291->26292 26293 d12c3e 26291->26293 26292->26290 26294 d12c66 SetFileTime 26293->26294 26295 d12c56 LocalFileTimeToFileTime 26293->26295 26294->26292 26295->26294 26296->26248 26297->26249 26298->26267 26299->26277 26300->26277 26301 d11bc0 26302 d11bd8 26301->26302 26303 d11bcf TlsGetValue 26301->26303 26306 d12310 26302->26306 26303->26302 26307 d12356 WaitForSingleObject 26306->26307 26309 d12366 26306->26309 26307->26309 26340 d123bd 26307->26340 26308 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 26312 d11be3 26308->26312 26310 d123eb 26309->26310 26311 d1237f 26309->26311 26309->26340 26314 d113b0 41 API calls 26310->26314 26313 d12f70 36 API calls 26311->26313 26315 d1238e 26313->26315 26316 d123f6 26314->26316 26320 d12e00 28 API calls 26315->26320 26317 d113b0 41 API calls 26316->26317 26318 d12408 26317->26318 26319 d113b0 41 API calls 26318->26319 26321 d12413 26319->26321 26320->26340 26322 d113b0 41 API calls 26321->26322 26323 d1241e 26322->26323 26324 d113b0 41 API calls 26323->26324 26325 d12429 26324->26325 26326 d12f70 36 API calls 26325->26326 26327 d12442 26326->26327 26328 d12e00 28 API calls 26327->26328 26329 d12471 26328->26329 26330 d11bf0 28 API calls 26329->26330 26333 d124b6 26330->26333 26331 d124e3 26332 d13390 22 API calls 26331->26332 26337 d12531 26332->26337 26333->26331 26341 d115a0 22 API calls 26333->26341 26335 d1255e 26336 d13390 22 API calls 26335->26336 26338 d125af SHCreateDirectoryExW 26336->26338 26337->26335 26342 d115a0 22 API calls 26337->26342 26338->26340 26340->26308 26341->26331 26342->26335 26343 d20ac0 26344 d20b02 26343->26344 26345 d20b0c 26343->26345 26344->26345 26348 d20b5b 26344->26348 26349 d20b6e 26344->26349 26346 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 26345->26346 26347 d20b41 26346->26347 26483 d21bf0 26348->26483 26349->26345 26351 d20ba1 26349->26351 26352 d20c04 IsIconic 26349->26352 26353 d20ca8 26349->26353 26351->26345 26355 d20bdc ShowWindow 26351->26355 26352->26345 26354 d20c15 SendMessageW GetSystemMetrics GetSystemMetrics 26352->26354 26353->26345 26356 d20cc3 26353->26356 26357 d20cf0 26353->26357 26473 d20c5b 26354->26473 26355->26345 26520 d224e0 26356->26520 26358 d20cf5 26357->26358 26359 d20d2e 26357->26359 26358->26345 26362 d20d03 26358->26362 26363 d20d37 26359->26363 26364 d20e08 26359->26364 26567 d1fdf0 SetEvent WaitForSingleObject GetExitCodeThread TerminateThread CloseHandle 26362->26567 26368 d20de8 26363->26368 26372 d20d4a GetModuleHandleW 26363->26372 26365 d20e66 26364->26365 26366 d20e0d 26364->26366 26370 d20e84 26365->26370 26371 d20e6d 26365->26371 26366->26345 26383 d20e46 26366->26383 26368->26345 26373 d20def SetEvent 26368->26373 26369 d20d0b 26568 d21af0 79 API calls 26369->26568 26377 d20fc4 26370->26377 26386 d20e8f 26370->26386 26571 d22920 114 API calls 26371->26571 26372->26368 26376 d20d5d GetProcAddress 26372->26376 26373->26345 26376->26368 26379 d20d70 GetCommandLineW 26376->26379 26378 d210df 26377->26378 26391 d20fcf 26377->26391 26380 d21100 26378->26380 26381 d210e6 26378->26381 26400 d20d8d 26379->26400 26384 d21107 26380->26384 26385 d2117a 26380->26385 26537 d227b0 GetWindowLongW 26381->26537 26569 d1fdf0 SetEvent WaitForSingleObject GetExitCodeThread TerminateThread CloseHandle 26383->26569 26390 d11910 39 API calls 26384->26390 26387 d21181 26385->26387 26388 d211ce 26385->26388 26386->26345 26392 d20eb9 26386->26392 26411 d21612 26386->26411 26412 d20ed6 26386->26412 26393 d11910 39 API calls 26387->26393 26398 d2127a 26388->26398 26399 d211d9 26388->26399 26396 d2110c 26390->26396 26391->26345 26397 d21044 26391->26397 26403 d21015 26391->26403 26406 d2101d 26391->26406 26414 d12ca0 41 API calls 26392->26414 26405 d21186 26393->26405 26394 d210c5 SetWindowTextW 26394->26345 26395 d20e4e 26570 d21af0 79 API calls 26395->26570 26401 d21116 26396->26401 26402 d21617 26396->26402 26404 d12e00 28 API calls 26397->26404 26398->26345 26424 d212f0 26398->26424 26425 d212a7 IsWindow 26398->26425 26409 d211e4 SendMessageW 26399->26409 26419 d21200 26399->26419 26400->26368 26428 d18780 38 API calls 26401->26428 26410 d116f0 2 API calls 26402->26410 26573 d115a0 22 API calls 26403->26573 26404->26406 26415 d21190 26405->26415 26416 d21621 26405->26416 26406->26345 26406->26394 26407 d210b6 26406->26407 26417 d21089 26406->26417 26418 d12e00 28 API calls 26407->26418 26409->26419 26410->26416 26420 d116d0 2 API calls 26411->26420 26422 d11510 20 API calls 26412->26422 26441 d20f0b 26414->26441 26439 d18780 38 API calls 26415->26439 26421 d116f0 2 API calls 26416->26421 26574 d115a0 22 API calls 26417->26574 26433 d21091 26418->26433 26419->26345 26423 d21259 KillTimer 26419->26423 26420->26402 26427 d2162b 26421->26427 26422->26392 26423->26345 26431 d212fb 26424->26431 26432 d213bf 26424->26432 26429 d212b4 KiUserCallbackDispatcher 26425->26429 26430 d212bf GetSystemMenu 26425->26430 26434 d116f0 2 API calls 26427->26434 26436 d21135 SetDlgItemTextW 26428->26436 26429->26430 26430->26345 26437 d212d2 EnableMenuItem 26430->26437 26438 d11910 39 API calls 26431->26438 26435 d21450 26432->26435 26450 d213ca 26432->26450 26433->26394 26440 d21635 26434->26440 26442 d2145b 26435->26442 26454 d214e0 26435->26454 26436->26345 26437->26345 26443 d21304 26438->26443 26444 d211af SetDlgItemTextW 26439->26444 26445 d116f0 2 API calls 26440->26445 26452 d20f6b 26441->26452 26453 d20f5c 26441->26453 26446 d11910 39 API calls 26442->26446 26443->26427 26447 d2130e 26443->26447 26444->26345 26448 d2163f 26445->26448 26451 d21460 26446->26451 26464 d18780 38 API calls 26447->26464 26449 d213f8 ShowWindow IsWindow 26457 d21426 GetSystemMenu 26449->26457 26458 d2141b EnableWindow 26449->26458 26450->26449 26456 d213ee 26450->26456 26451->26440 26459 d2146a 26451->26459 26461 d13390 22 API calls 26452->26461 26460 d13390 22 API calls 26453->26460 26455 d18340 51 API calls 26454->26455 26481 d21570 26454->26481 26462 d21529 SetDlgItemTextW 26455->26462 26456->26449 26463 d21435 EnableMenuItem 26457->26463 26457->26473 26458->26457 26469 d18780 38 API calls 26459->26469 26460->26452 26465 d20f7a 26461->26465 26466 d22e30 56 API calls 26462->26466 26463->26473 26467 d2132d SetDlgItemTextW 26464->26467 26572 d21f80 91 API calls 26465->26572 26477 d21549 26466->26477 26554 d22e30 26467->26554 26472 d21489 SetDlgItemTextW IsWindow 26469->26472 26471 d215ee 26471->26345 26474 d215f9 SetEvent 26471->26474 26475 d214ba GetSystemMenu 26472->26475 26476 d214af EnableWindow 26472->26476 26473->26345 26474->26345 26475->26345 26478 d214cd EnableMenuItem 26475->26478 26476->26475 26477->26481 26482 d2157e ShowWindow 26477->26482 26478->26345 26481->26345 26481->26351 26481->26355 26481->26471 26482->26481 26484 d21c23 GetWindowLongW 26483->26484 26485 d21c69 GetSystemMenu 26483->26485 26488 d21c40 SetWindowLongW 26484->26488 26489 d21c48 SetWindowLongW SetWindowPos 26484->26489 26486 d21c8b 8 API calls 26485->26486 26487 d21c7d EnableMenuItem 26485->26487 26490 d11910 39 API calls 26486->26490 26487->26486 26488->26489 26489->26485 26491 d21d06 26490->26491 26492 d21d10 26491->26492 26493 d21f69 26491->26493 26497 d18780 38 API calls 26492->26497 26494 d116f0 2 API calls 26493->26494 26495 d21f73 26494->26495 26496 d116f0 2 API calls 26495->26496 26498 d21f7d 26496->26498 26499 d21d2f SetDlgItemTextW 26497->26499 26500 d11910 39 API calls 26499->26500 26501 d21d49 26500->26501 26501->26495 26502 d21d53 26501->26502 26503 d18780 38 API calls 26502->26503 26504 d21d6f SetDlgItemTextW GetDlgItem GetDlgItem IsWindow 26503->26504 26505 d21db1 SendMessageW SendMessageW 26504->26505 26506 d21dd8 CoCreateInstance 26504->26506 26505->26506 26507 d21df4 26506->26507 26575 d208f0 GetWindowLongW 26507->26575 26509 d21e26 SetTimer ShowWindow SetForegroundWindow 26593 d41c5c 26509->26593 26512 d21e84 26596 d19aa0 49 API calls 2 library calls 26512->26596 26514 d21e8d 26515 d21e8f 26514->26515 26516 d12e00 28 API calls 26515->26516 26519 d21f10 26515->26519 26517 d21ee2 ResetEvent 26516->26517 26518 d33a7f 447 API calls 26517->26518 26518->26519 26519->26345 26521 d224f4 26520->26521 26522 d2250b SendMessageW 26520->26522 26521->26345 26523 d226c9 26522->26523 26524 d2252d 26522->26524 26525 d226cf SendMessageW 26523->26525 26534 d2265b 26523->26534 26524->26523 26530 d22537 26524->26530 26526 d226e2 SendMessageW 26525->26526 26527 d226f0 SendMessageW 26525->26527 26526->26527 26527->26534 26528 d22626 SendMessageW SendMessageW 26529 d2264e SendMessageW 26528->26529 26528->26534 26529->26534 26530->26528 26531 d2260d SendMessageW 26530->26531 26532 d22587 EnterCriticalSection LeaveCriticalSection 26530->26532 26531->26528 26532->26531 26535 d225d3 26532->26535 26534->26345 26617 d445f3 21 API calls __dtol3 26535->26617 26538 d227f8 26537->26538 26553 d22858 26537->26553 26541 d11910 39 API calls 26538->26541 26538->26553 26539 d22870 SetWindowLongW SendMessageW 26540 d22891 26539->26540 26545 d228f3 26540->26545 26546 d228c4 SendMessageW 26540->26546 26542 d22806 26541->26542 26543 d22810 26542->26543 26544 d22909 26542->26544 26551 d18780 38 API calls 26543->26551 26547 d116f0 2 API calls 26544->26547 26545->26345 26548 d228d7 SendMessageW 26546->26548 26549 d228e5 SendMessageW 26546->26549 26550 d22913 26547->26550 26548->26549 26549->26545 26552 d2282f SetDlgItemTextW 26551->26552 26552->26553 26553->26539 26553->26540 26555 d11910 39 API calls 26554->26555 26556 d22e5c 26555->26556 26557 d22efb 26556->26557 26559 d22e66 26556->26559 26558 d116f0 2 API calls 26557->26558 26560 d22f05 26558->26560 26561 d18780 38 API calls 26559->26561 26562 d22e85 SetDlgItemTextW IsWindow 26561->26562 26563 d22eb3 GetSystemMenu 26562->26563 26564 d22ea8 KiUserCallbackDispatcher 26562->26564 26565 d22ec2 EnableMenuItem 26563->26565 26566 d2134e ShowWindow 26563->26566 26564->26563 26565->26566 26566->26345 26567->26369 26568->26345 26569->26395 26570->26473 26571->26473 26572->26473 26573->26406 26574->26433 26576 d20932 GetWindow 26575->26576 26577 d20923 26575->26577 26578 d20941 GetWindowRect 26576->26578 26577->26578 26579 d20955 26578->26579 26590 d209a4 SetWindowPos 26578->26590 26580 d2096e MonitorFromWindow 26579->26580 26581 d20959 GetWindowLongW 26579->26581 26583 d209be 26580->26583 26584 d2097e GetMonitorInfoW 26580->26584 26581->26580 26585 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 26583->26585 26584->26583 26586 d20996 26584->26586 26587 d209cd 26585->26587 26588 d209b0 GetWindowRect 26586->26588 26586->26590 26587->26509 26588->26590 26591 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 26590->26591 26592 d20aad 26591->26592 26592->26509 26597 d41c2c 26593->26597 26596->26514 26601 d41c31 26597->26601 26599 d21e78 26599->26512 26599->26515 26601->26599 26603 d41c4d 26601->26603 26607 d33b76 26601->26607 26614 d39829 7 API calls 2 library calls 26601->26614 26602 d42b3c 26604 d415f8 __CxxThrowException@8 RaiseException 26602->26604 26603->26602 26605 d415f8 __CxxThrowException@8 RaiseException 26603->26605 26606 d42b59 26604->26606 26605->26602 26612 d36357 _abort 26607->26612 26608 d36395 26616 d2efd7 20 API calls _abort 26608->26616 26610 d36380 RtlAllocateHeap 26611 d36393 26610->26611 26610->26612 26611->26601 26612->26608 26612->26610 26615 d39829 7 API calls 2 library calls 26612->26615 26614->26601 26615->26612 26616->26611 26617->26531 26618 d27c00 PathFileExistsW 26619 d27c23 26618->26619 26620 d27d00 26618->26620 26631 d280c0 26619->26631 26632 d11910 39 API calls 26631->26632 26633 d280f1 26632->26633 26634 d116f0 2 API calls 26633->26634 26635 d281b7 26634->26635 26636 d26600 26641 d25f40 SetDllDirectoryW 26636->26641 26642 d3f6a0 ___scrt_fastfail 26641->26642 26643 d25f93 GetSystemDirectoryW 26642->26643 26644 d25fb1 26643->26644 26670 d33c4e 26644->26670 26647 d2601b GetVersionExW GetModuleHandleW 26651 d260a1 26647->26651 26652 d26057 GetProcAddress 26647->26652 26648 d2614b 26683 d41dcd 5 API calls ___report_securityfailure 26648->26683 26653 d260a6 GetVersionExW 26651->26653 26654 d2610d 26651->26654 26652->26651 26660 d26067 26652->26660 26658 d260c4 26653->26658 26681 d26160 31 API calls 2 library calls 26654->26681 26655 d26150 26657 d26119 26659 d2612e 26657->26659 26682 d26160 31 API calls 2 library calls 26657->26682 26658->26654 26680 d264d0 29 API calls 2 library calls 26658->26680 26663 d416e0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 26659->26663 26660->26659 26679 d264d0 29 API calls 2 library calls 26660->26679 26666 d26147 26663->26666 26665 d2609c 26665->26659 26667 d420f1 26666->26667 26687 d42ba7 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 26667->26687 26669 d420f6 26669->26669 26673 d33b81 26670->26673 26671 d33b96 26672 d26001 26671->26672 26684 d2efd7 20 API calls _abort 26671->26684 26672->26647 26672->26648 26673->26671 26673->26672 26677 d33bd7 26673->26677 26675 d33bc6 26685 d2eefe 26 API calls pre_c_initialization 26675->26685 26677->26672 26686 d2efd7 20 API calls _abort 26677->26686 26679->26665 26680->26654 26681->26657 26682->26659 26683->26655 26684->26675 26685->26672 26686->26675 26687->26669 26688 d430cc 26689 d430e6 LoadLibraryExA 26688->26689 26697 d430d0 26688->26697 26690 d43147 26689->26690 26691 d430f9 GetLastError 26689->26691 26692 d43152 FreeLibrary 26690->26692 26701 d43159 26690->26701 26693 d43122 26691->26693 26695 d4310c 26691->26695 26692->26701 26709 d42f7b 6 API calls 2 library calls 26693->26709 26695->26690 26695->26693 26696 d4312d RaiseException 26700 d43243 26696->26700 26697->26689 26697->26690 26698 d43215 26712 d42f7b 6 API calls 2 library calls 26698->26712 26699 d431b7 GetProcAddress 26699->26698 26702 d431c7 GetLastError 26699->26702 26701->26698 26701->26699 26704 d431da 26702->26704 26704->26698 26710 d42f7b 6 API calls 2 library calls 26704->26710 26706 d431fb RaiseException 26711 d42d3e 6 API calls 3 library calls 26706->26711 26708 d43212 26708->26698 26709->26696 26710->26706 26711->26708 26712->26700 26713 d36b0a 26718 d368c6 26713->26718 26716 d36b32 26717 d2f8ed __wsopen_s 97 API calls 26717->26716 26723 d368f7 26718->26723 26720 d36af6 26734 d2eefe 26 API calls pre_c_initialization 26720->26734 26722 d36a4b 26722->26716 26722->26717 26726 d36a40 26723->26726 26730 d39a04 49 API calls 2 library calls 26723->26730 26725 d36a94 26725->26726 26731 d39a04 49 API calls 2 library calls 26725->26731 26726->26722 26733 d2efd7 20 API calls _abort 26726->26733 26728 d36ab3 26728->26726 26732 d39a04 49 API calls 2 library calls 26728->26732 26730->26725 26731->26728 26732->26726 26733->26720 26734->26722 26735 d30d2d 26736 d30d39 BuildCatchObjectHelperInternal 26735->26736 26737 d30d41 26736->26737 26738 d30d59 26736->26738 26769 d2efc4 20 API calls _abort 26737->26769 26740 d30df7 26738->26740 26744 d30d8e 26738->26744 26774 d2efc4 20 API calls _abort 26740->26774 26741 d30d46 26770 d2efd7 20 API calls _abort 26741->26770 26760 d35c9b EnterCriticalSection 26744->26760 26745 d30dfc 26775 d2efd7 20 API calls _abort 26745->26775 26748 d30d94 26750 d30db0 26748->26750 26751 d30dc5 26748->26751 26749 d30e04 26776 d2eefe 26 API calls pre_c_initialization 26749->26776 26771 d2efd7 20 API calls _abort 26750->26771 26761 d30f1d 26751->26761 26753 d30d4e __fread_nolock 26756 d30db5 26772 d2efc4 20 API calls _abort 26756->26772 26757 d30dc0 26773 d30def LeaveCriticalSection __wsopen_s 26757->26773 26760->26748 26762 d35f18 __wsopen_s 26 API calls 26761->26762 26763 d30f2c 26762->26763 26764 d30f42 26763->26764 26765 d30f32 26763->26765 26777 d30ff2 SetFilePointerEx 26764->26777 26785 d2efd7 20 API calls _abort 26765->26785 26768 d30f37 26768->26757 26769->26741 26770->26753 26771->26756 26772->26757 26773->26753 26774->26745 26775->26749 26776->26753 26778 d31012 GetLastError 26777->26778 26779 d31021 SetFilePointerEx 26777->26779 26786 d2efa1 20 API calls 2 library calls 26778->26786 26779->26778 26781 d31041 26779->26781 26782 d3101e 26781->26782 26783 d31052 SetFilePointerEx 26781->26783 26782->26768 26787 d2efd7 20 API calls _abort 26783->26787 26785->26768 26786->26782 26787->26782
                      APIs
                      • OpenEventW.KERNEL32(00100002,00000000,?), ref: 00D2A743
                      • GetCurrentProcessId.KERNEL32 ref: 00D2A833
                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 00D2A887
                      • GetLastError.KERNEL32 ref: 00D2A891
                      • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00D2A92F
                      • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000), ref: 00D2A93F
                      • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00D2A94F
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00D2A976
                      • ResetEvent.KERNEL32(?,?,?), ref: 00D2A9B2
                      • GetLastError.KERNEL32 ref: 00D2A9F6
                      • ShellExecuteExW.SHELL32(0000003C), ref: 00D2AA46
                      • GetLastError.KERNEL32(00000000), ref: 00D2AA59
                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D2AA7E
                      • FreeLibrary.KERNEL32(00000000), ref: 00D2AAAA
                      • GetProcessId.KERNEL32(?,00000000), ref: 00D2AADB
                      • AllowSetForegroundWindow.USER32(00000000), ref: 00D2AB9C
                      • WaitForInputIdle.USER32(?,0000EA60), ref: 00D2ABAD
                      • AllowSetForegroundWindow.USER32(00000000), ref: 00D2ABB8
                      • GetTickCount.KERNEL32 ref: 00D2ABBE
                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00D2ABE9
                      • GetExitCodeProcess.KERNEL32(?,00000000), ref: 00D2AC17
                      • CloseHandle.KERNEL32(?), ref: 00D2AC28
                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D2AC54
                      • SetEvent.KERNEL32(?), ref: 00D2AC67
                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D2AC79
                      • GetTickCount.KERNEL32 ref: 00D2AC7B
                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D2AC9F
                      • WaitForSingleObject.KERNEL32(?,00001388,?), ref: 00D2AD91
                      • GetTickCount.KERNEL32 ref: 00D2AD97
                      • SetEvent.KERNEL32(?), ref: 00D2ADE4
                      • SetEvent.KERNEL32(?,00000000), ref: 00D2AE23
                      • SetEvent.KERNEL32(?,00000000), ref: 00D2AE38
                      • WaitForSingleObject.KERNEL32(?,00002710), ref: 00D2AE4A
                      • TerminateThread.KERNEL32(?,80004004), ref: 00D2AE62
                      • CloseHandle.KERNEL32(?), ref: 00D2AE79
                      • CloseHandle.KERNEL32(?), ref: 00D2AEB6
                      • CloseHandle.KERNEL32(?), ref: 00D2AECD
                      • CloseHandle.KERNEL32(?), ref: 00D2AEE4
                      • CloseHandle.KERNEL32(?), ref: 00D2AEFB
                      • DeleteCriticalSection.KERNEL32(?), ref: 00D2AF19
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000), ref: 00D2B1B5
                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000100), ref: 00D2B3FA
                      • GetDateFormatW.KERNEL32(00000400,00000001,?,00000000,?,00000100), ref: 00D2B41C
                      • GetCurrentProcess.KERNEL32(00000008,?), ref: 00D2B5BE
                      • OpenProcessToken.ADVAPI32(00000000), ref: 00D2B5C1
                      • GetTokenInformation.KERNELBASE(FFFFFFFF,00000002,00000000,00000000,?), ref: 00D2B5F2
                      • GetLastError.KERNEL32 ref: 00D2B5FC
                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00D2B613
                      • GetTokenInformation.KERNELBASE(FFFFFFFF,00000002,00000000,00000000,00000000), ref: 00D2B656
                      • AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000222,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D2B683
                      • EqualSid.ADVAPI32(00000000,00000004), ref: 00D2B6A8
                      • LookupAccountSidW.ADVAPI32(00000000,00000004,?,00000100,?,00000100,?), ref: 00D2B6E3
                      • GetLastError.KERNEL32 ref: 00D2B6ED
                      • FreeSid.ADVAPI32(00000000), ref: 00D2B716
                      • GlobalFree.KERNEL32(00000000), ref: 00D2B71D
                      • CloseHandle.KERNELBASE(FFFFFFFF), ref: 00D2B73B
                      • CoInitializeEx.COMBASE(00000000,00000000), ref: 00D2B786
                      • GetActiveWindow.USER32 ref: 00D2B7B3
                      • SetLastError.KERNEL32(0000000E), ref: 00D2B7D8
                      • GetCurrentProcess.KERNEL32(?,0000000D), ref: 00D2B804
                      • FlushInstructionCache.KERNEL32(00000000), ref: 00D2B807
                      • GetCurrentThreadId.KERNEL32 ref: 00D2B819
                      • EnterCriticalSection.KERNEL32(00D558B4), ref: 00D2B82A
                      • LeaveCriticalSection.KERNEL32(00D558B4), ref: 00D2B84B
                      • GlobalLock.KERNEL32(00000000), ref: 00D2B863
                      • DialogBoxIndirectParamW.USER32(00000000,00000000,00D23BE0,00000000), ref: 00D2B87C
                      • GlobalUnlock.KERNEL32(00000000), ref: 00D2B885
                      • GlobalFree.KERNEL32(00000000), ref: 00D2B88C
                      • GlobalFree.KERNEL32(00000000), ref: 00D2B8AB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Event$CloseHandleWait$ErrorGlobalLastProcess$FreeObjectSingle$CountCriticalCurrentSection$CreateInitializeTickTokenWindow$AllowFileForegroundFormatInformationModuleNameOpenThread$AccountActiveAddressAllocAllocateCacheCodeDateDeleteDialogEnterEqualExecuteExitFlushIdleIndirectInputInstructionLeaveLibraryLockLookupMultipleObjectsParamProcResetShellSpinTerminateTimeUnlock
                      • String ID: %20$%25$Local\Packman_Exec_%s$Wow64RevertWow64FsRedirection$Yes$open
                      • API String ID: 698854990-2970576115
                      • Opcode ID: 1791dcc5497fa3a4650c62405d4028d5afb9e114f34adad7cc07d92a2e67a21f
                      • Instruction ID: 473729113069f9723b771aa6c1047888a50a210d67c5f3e1a8d32893b4549e69
                      • Opcode Fuzzy Hash: 1791dcc5497fa3a4650c62405d4028d5afb9e114f34adad7cc07d92a2e67a21f
                      • Instruction Fuzzy Hash: 52E2CF70A013299FDB20DF28DC48B99B7B5EF55314F1882D9E409EB2A1DB719E84CF61
                      APIs
                      • ShowWindow.USER32(?,00000000,70CDB3AB), ref: 00D20BE5
                      • IsIconic.USER32(?), ref: 00D20C07
                      • SendMessageW.USER32(?,00000027,00000000,00000000), ref: 00D20C2C
                      • GetSystemMetrics.USER32(0000000B), ref: 00D20C3A
                      • GetSystemMetrics.USER32(0000000C), ref: 00D20C40
                      • GetModuleHandleW.KERNEL32(kernel32.dll,70CDB3AB), ref: 00D20D4F
                      • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 00D20D63
                      • GetCommandLineW.KERNEL32 ref: 00D20D70
                      • SetEvent.KERNEL32(?,70CDB3AB), ref: 00D20DF2
                      • SetWindowTextW.USER32(?,?), ref: 00D210C9
                      • SetDlgItemTextW.USER32(FFFFFFFF,000003F3,?), ref: 00D21148
                      • SetDlgItemTextW.USER32(FFFFFFFF,000003F3,?), ref: 00D211C2
                      • SendMessageW.USER32(?,00000402,000003E8,00000000), ref: 00D211F3
                      • KillTimer.USER32(?,?,70CDB3AB), ref: 00D2125D
                      • IsWindow.USER32(?), ref: 00D212AA
                      • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 00D212B9
                      • GetSystemMenu.USER32(?,00000000), ref: 00D212C4
                      • EnableMenuItem.USER32(00000000,0000F060,00000002), ref: 00D212DA
                      • SetDlgItemTextW.USER32(00000004,000003F3,?), ref: 00D21340
                      • ShowWindow.USER32(00000004,00000005), ref: 00D21386
                      • ShowWindow.USER32(?,00000005,70CDB3AB), ref: 00D21408
                      • IsWindow.USER32(?), ref: 00D21411
                      • EnableWindow.USER32(?,00000001), ref: 00D21420
                      • GetSystemMenu.USER32(?,00000000), ref: 00D2142B
                      • EnableMenuItem.USER32(00000000,0000F060,00000000), ref: 00D2143D
                      • SetDlgItemTextW.USER32(FFFFFFFF,000003F3,?), ref: 00D2149C
                      • IsWindow.USER32(?), ref: 00D214A5
                      • EnableWindow.USER32(?,00000000), ref: 00D214B4
                      • GetSystemMenu.USER32(FFFFFFFF,00000000), ref: 00D214BF
                      • EnableMenuItem.USER32(00000000,0000F060,00000002), ref: 00D214D5
                      • SetDlgItemTextW.USER32(00000006,000003F3,?), ref: 00D2153B
                      • ShowWindow.USER32(00000006,00000005), ref: 00D21583
                      • SetEvent.KERNEL32(?,70CDB3AB), ref: 00D215FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Window$Item$MenuText$EnableSystem$Show$EventMessageMetricsSend$AddressCallbackCommandDispatcherHandleIconicKillLineModuleProcTimerUser
                      • String ID: MessageInfo.xml$RegisterApplicationRestart$kernel32.dll$s
                      • API String ID: 3051885035-2535979818
                      • Opcode ID: cd325ef298c6b7e97f26a7eec6af7b1a693c23d518989ddfa58edb330dd89390
                      • Instruction ID: ea2251475898e783d59c6287c7f47cd4447549e676667c7233de2e08f3f0a1f7
                      • Opcode Fuzzy Hash: cd325ef298c6b7e97f26a7eec6af7b1a693c23d518989ddfa58edb330dd89390
                      • Instruction Fuzzy Hash: CF72D274A00725AFEB21CF64E855BADBBB1FF24318F188119E915DB691CB75EC40CBA0
                      APIs
                      • CreateEventW.KERNEL32(00000000,00000001,00000000,?), ref: 00D1B897
                      • PathFindExtensionW.SHLWAPI(?,00D4D3FC,00000002), ref: 00D1B9D3
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,.exe,000000FF,00000000), ref: 00D1BA71
                        • Part of subcall function 00D18780: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,?,00D45778), ref: 00D187BE
                        • Part of subcall function 00D18780: FindResourceW.KERNEL32(00000000,?,00000006), ref: 00D18809
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00D1BE34
                      • PostMessageW.USER32(?,0000811A,00000000,00000000), ref: 00D1C173
                      • ShellExecuteExW.SHELL32(0000003C), ref: 00D1C180
                      • GetProcessId.KERNELBASE(?), ref: 00D1C19D
                      • AllowSetForegroundWindow.USER32(00000000), ref: 00D1C1AE
                      • WaitForInputIdle.USER32(?,00000BB8), ref: 00D1C1BF
                      • AllowSetForegroundWindow.USER32(?), ref: 00D1C1D0
                      • PostMessageW.USER32(?,0000811B,00000000,00000000), ref: 00D1C1EC
                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00D1C224
                      • SetEvent.KERNEL32(?), ref: 00D1C243
                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00D1C29C
                      • CloseHandle.KERNEL32(?), ref: 00D1C2B3
                      • GetLastError.KERNEL32 ref: 00D1C2CB
                      • PostMessageW.USER32(?,0000811C,00000000,00000000), ref: 00D1C2FE
                      • CloseHandle.KERNEL32(?), ref: 00D1C44D
                        • Part of subcall function 00D116F0: __CxxThrowException@8.LIBVCRUNTIME ref: 00D11706
                        • Part of subcall function 00D116F0: HeapAlloc.KERNEL32(?,00000000,?,?,?,00D52C84,?,?,00D136E6,80070057,?,?,?,00D12FB0,?,?), ref: 00D1171B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: FindMessagePost$AllowCloseEventForegroundHandleProcessResourceWaitWindow$AllocCodeCompareCreateErrorException@8ExecuteExitExtensionFileHeapIdleInputLastModuleMultipleNameObjectsPathShellStringThrow
                      • String ID: %20$%25$-run $.bat$.cmd$.exe$/C $<$D$Local\Packman_Exec_%s$Yes$\cmd.exe$open$runas
                      • API String ID: 3503205883-1239623122
                      • Opcode ID: d8186a9f609e0da56774f4ae884702a0f3347786424e6deed210a5c0cbe9e416
                      • Instruction ID: 3430fd01560528851f5c21922ad1fbd16fc39071396d3b4a40185d790d54ad2a
                      • Opcode Fuzzy Hash: d8186a9f609e0da56774f4ae884702a0f3347786424e6deed210a5c0cbe9e416
                      • Instruction Fuzzy Hash: 87927D30A41619AFDB10DF68DC98B99B7B5FF44314F1482D9E409AB2A1DF70AE85CF60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1780 d21bf0-d21c21 1781 d21c23-d21c3e GetWindowLongW 1780->1781 1782 d21c69-d21c7b GetSystemMenu 1780->1782 1785 d21c40-d21c46 SetWindowLongW 1781->1785 1786 d21c48-d21c63 SetWindowLongW SetWindowPos 1781->1786 1783 d21c8b-d21d0a GetSystemMetrics * 4 LoadImageW * 2 SendMessageW * 2 call d11910 1782->1783 1784 d21c7d-d21c85 EnableMenuItem 1782->1784 1789 d21d10-d21d4d call d18780 SetDlgItemTextW call d11910 1783->1789 1790 d21f69-d21f6e call d116f0 1783->1790 1784->1783 1785->1786 1786->1782 1792 d21f73-d21f7f call d116f0 1789->1792 1800 d21d53-d21daf call d18780 SetDlgItemTextW GetDlgItem * 2 IsWindow 1789->1800 1790->1792 1804 d21db1-d21dd2 SendMessageW * 2 1800->1804 1805 d21dd8-d21df2 CoCreateInstance 1800->1805 1804->1805 1806 d21df4-d21df9 1805->1806 1807 d21e1d-d21e82 call d208f0 SetTimer ShowWindow SetForegroundWindow call d41c5c 1805->1807 1806->1807 1808 d21dfb-d21e19 1806->1808 1814 d21e84-d21e8d call d19aa0 1807->1814 1815 d21e8f 1807->1815 1808->1807 1816 d21e91-d21e99 1814->1816 1815->1816 1818 d21f16-d21f2a 1816->1818 1819 d21e9b-d21eb8 1816->1819 1823 d21f34-d21f46 1818->1823 1824 d21f2c-d21f2f 1818->1824 1821 d21eba-d21ebc 1819->1821 1822 d21ebe-d21ec3 1819->1822 1825 d21ed9-d21f0b call d12e00 ResetEvent call d33a7f 1821->1825 1826 d21ec6-d21ecf 1822->1826 1827 d21f50-d21f66 1823->1827 1828 d21f48-d21f4b 1823->1828 1824->1823 1833 d21f10-d21f13 1825->1833 1826->1826 1829 d21ed1-d21ed7 1826->1829 1828->1827 1829->1825 1833->1818
                      APIs
                      • GetWindowLongW.USER32(?,000000F0), ref: 00D21C28
                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D21C46
                      • SetWindowLongW.USER32(?,000000EC,00000080), ref: 00D21C52
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,?,?,?,00D459C0,000000FF,?,00D20B65,70CDB3AB), ref: 00D21C63
                      • GetSystemMenu.USER32(?,00000000,70CDB3AB,?,?,?,00D459C0,000000FF,?,00D20B65,70CDB3AB), ref: 00D21C73
                      • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00D21C85
                      • GetSystemMetrics.USER32(0000000B), ref: 00D21C93
                      • GetSystemMetrics.USER32(0000000C), ref: 00D21C99
                      • GetSystemMetrics.USER32(00000031), ref: 00D21C9F
                      • GetSystemMetrics.USER32(00000032), ref: 00D21CA6
                      • LoadImageW.USER32(00000064,00000001,00000000,00000000,00000000), ref: 00D21CBE
                      • LoadImageW.USER32(00000064,00000001,?,00000000,00000000), ref: 00D21CD6
                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 00D21CEE
                      • SendMessageW.USER32(?,00000080,00000000,?), ref: 00D21CFF
                      • SetDlgItemTextW.USER32(?,00000002,?), ref: 00D21D3E
                      • SetDlgItemTextW.USER32(?,000003F3,?), ref: 00D21D7E
                      • GetDlgItem.USER32(?,00000002), ref: 00D21D8E
                      • GetDlgItem.USER32(?,000003F2), ref: 00D21D9E
                      • IsWindow.USER32(00000000), ref: 00D21DA7
                      • SendMessageW.USER32(?,00000406,00000000,000003E8), ref: 00D21DC0
                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00D21DD2
                      • CoCreateInstance.COMBASE(00D4D9D8,00000000,00000017,00D4D9C8,?), ref: 00D21DEA
                      • SetTimer.USER32(?,0000002D,00000042,00000000), ref: 00D21E2F
                      • ShowWindow.USER32(?,00000005,?,?,?,00D459C0,000000FF), ref: 00D21E49
                      • SetForegroundWindow.USER32(?), ref: 00D21E52
                      • ResetEvent.KERNEL32(?,?,?,?,?,00D459C0,000000FF), ref: 00D21EF7
                        • Part of subcall function 00D116F0: __CxxThrowException@8.LIBVCRUNTIME ref: 00D11706
                        • Part of subcall function 00D116F0: HeapAlloc.KERNEL32(?,00000000,?,?,?,00D52C84,?,?,00D136E6,80070057,?,?,?,00D12FB0,?,?), ref: 00D1171B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Window$ItemSystem$MessageMetricsSend$Long$ImageLoadMenuText$AllocCreateEnableEventException@8ForegroundHeapInstanceResetShowThrowTimer
                      • String ID:
                      • API String ID: 2619141099-0
                      • Opcode ID: 028abf72606b32b0036062450e4e06bc8574dbf6f0fbb577adadda46d7ca2e3a
                      • Instruction ID: 8c23619c935ac999f7ee50fa54d475839d1ad3ae1c8575ad9a6990bffac72f5c
                      • Opcode Fuzzy Hash: 028abf72606b32b0036062450e4e06bc8574dbf6f0fbb577adadda46d7ca2e3a
                      • Instruction Fuzzy Hash: A1B1D075A40305AFDB119F64DC96BA97FB4EF08711F188199FA05AF2E6CBB19900CF60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2230 d235d0-d2360d call d11910 2233 d23613-d2363a call d199c0 2230->2233 2234 d23add-d23af0 call d116f0 2230->2234 2240 d23648-d23652 call d18780 2233->2240 2241 d2363c-d23646 call d18780 2233->2241 2246 d23654-d2365b 2240->2246 2241->2246 2247 d23770 2246->2247 2248 d23661-d2366d CreateCompatibleDC 2246->2248 2251 d23772-d23787 2247->2251 2249 d236e3-d23700 FindResourceW 2248->2249 2250 d2366f-d236a7 call d3f6a0 call d33b12 EnumFontFamiliesExW 2248->2250 2249->2247 2252 d23702-d23713 SizeofResource 2249->2252 2265 d236a9-d236bd 2250->2265 2266 d236dc-d236dd DeleteDC 2250->2266 2254 d23791-d237ae call d416e0 2251->2254 2255 d23789-d2378c 2251->2255 2252->2247 2256 d23715-d2372f LoadResource 2252->2256 2255->2254 2256->2247 2259 d23731-d23742 LockResource 2256->2259 2259->2247 2262 d23744-d23757 GlobalAlloc 2259->2262 2262->2247 2264 d23759-d23767 GlobalLock 2262->2264 2267 d23769-d2376a GlobalFree 2264->2267 2268 d237af-d237df 2264->2268 2269 d236c0-d236c9 2265->2269 2266->2249 2267->2247 2270 d237e1-d237e4 2268->2270 2271 d237e6-d237ef 2268->2271 2269->2269 2272 d236cb-d236d9 call d12e00 2269->2272 2273 d237f6-d237f9 2270->2273 2271->2271 2274 d237f1 2271->2274 2272->2266 2276 d23800-d23809 2273->2276 2277 d237fb-d237fe 2273->2277 2274->2273 2276->2276 2280 d2380b 2276->2280 2279 d23810-d23819 2277->2279 2279->2279 2281 d2381b-d23826 2279->2281 2280->2279 2282 d2382a-d2382d 2281->2282 2283 d23828 2281->2283 2284 d23833-d23860 call d13080 2282->2284 2285 d238d5-d238ec call d23e50 2282->2285 2283->2282 2292 d23862-d23873 call d23e50 2284->2292 2293 d23878-d238aa call d23e50 * 2 2284->2293 2290 d23900-d23905 2285->2290 2291 d238ee-d238fe call d2efd7 call d2eefe 2285->2291 2294 d23908-d2391a 2290->2294 2291->2294 2303 d23a60-d23a6c 2292->2303 2317 d238b0-d238b9 2293->2317 2299 d23975-d239a1 call d23e50 2294->2299 2300 d2391c-d2391e 2294->2300 2320 d239a3 2299->2320 2321 d239a5-d239c5 2299->2321 2304 d23932-d23937 2300->2304 2305 d23920-d23930 call d2efd7 call d2eefe 2300->2305 2313 d23a71-d23a7f 2303->2313 2314 d23a6e 2303->2314 2311 d2393a-d2393d 2304->2311 2305->2311 2318 d23951-d23956 2311->2318 2319 d2393f-d2394f call d2efd7 call d2eefe 2311->2319 2322 d23a80-d23a86 2313->2322 2314->2313 2317->2317 2327 d238bb-d238d0 2317->2327 2323 d23958-d2395b 2318->2323 2319->2323 2320->2321 2329 d239d0-d239d9 2321->2329 2330 d239c7-d239ca 2321->2330 2324 d23aa6-d23aa8 2322->2324 2325 d23a88-d23a8b 2322->2325 2331 d2396f-d23972 2323->2331 2332 d2395d-d2396d call d2efd7 call d2eefe 2323->2332 2335 d23aab-d23aad 2324->2335 2333 d23aa2-d23aa4 2325->2333 2334 d23a8d-d23a95 2325->2334 2337 d23a4c-d23a5d call d23e50 2327->2337 2329->2329 2340 d239db 2329->2340 2339 d239e0-d239e3 2330->2339 2347 d23974 2331->2347 2332->2347 2333->2335 2334->2324 2344 d23a97-d23aa0 2334->2344 2345 d23ac6-d23ad8 GlobalUnlock 2335->2345 2346 d23aaf-d23ac1 GlobalUnlock 2335->2346 2337->2303 2341 d239f0-d239f9 2339->2341 2342 d239e5-d239e8 2339->2342 2340->2339 2341->2341 2351 d239fb 2341->2351 2350 d23a00-d23a09 2342->2350 2344->2322 2344->2333 2345->2251 2346->2251 2347->2299 2350->2350 2356 d23a0b-d23a0e 2350->2356 2351->2350 2358 d23a10-d23a29 2356->2358 2359 d23a3b-d23a4a 2356->2359 2360 d23a30-d23a39 2358->2360 2359->2337 2360->2359 2360->2360
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                        • Part of subcall function 00D199C0: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,000000BC), ref: 00D19A4C
                        • Part of subcall function 00D199C0: VerSetConditionMask.KERNEL32(00000000,?,?,000000BC), ref: 00D19A50
                        • Part of subcall function 00D199C0: VerSetConditionMask.KERNEL32(00000000,?,?,?,000000BC), ref: 00D19A54
                        • Part of subcall function 00D199C0: VerifyVersionInfoW.KERNEL32(?,00000023,00000000), ref: 00D19A77
                      • CreateCompatibleDC.GDI32(00000000), ref: 00D23663
                      • EnumFontFamiliesExW.GDI32(00000000,?,00D235C0,00000000,00000000), ref: 00D2369C
                      • DeleteDC.GDI32(00000000), ref: 00D236DD
                      • FindResourceW.KERNEL32(00000000,?,00000005), ref: 00D236F6
                      • SizeofResource.KERNEL32(00000000,00000000), ref: 00D23705
                      • LoadResource.KERNEL32(00000000,00000000), ref: 00D23727
                      • LockResource.KERNEL32(00000000), ref: 00D23732
                      • GlobalAlloc.KERNEL32(00000040,00000001), ref: 00D23747
                      • GlobalLock.KERNEL32(00000000), ref: 00D2375A
                      • GlobalFree.KERNEL32(00000000), ref: 00D2376A
                        • Part of subcall function 00D18780: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,?,00D45778), ref: 00D187BE
                        • Part of subcall function 00D18780: FindResourceW.KERNEL32(00000000,?,00000006), ref: 00D18809
                      • GlobalUnlock.KERNEL32(?), ref: 00D23ABB
                      • GlobalUnlock.KERNEL32(?), ref: 00D23AD2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Resource$Global$ConditionFindMask$Init_thread_footerLockUnlock$AllocCompatibleCreateDeleteEnumFamiliesFontFreeHeapInfoLoadProcessSizeofVerifyVersion
                      • String ID: MS Shell Dlg$Segoe UI
                      • API String ID: 1746237089-2394893074
                      • Opcode ID: cb5bcbbbf26921c7e3074c37823c1422adc3036f4a2d2023a8e066e4f582c295
                      • Instruction ID: ac921f5a54f450725c0d78fc0b0746d811319032f794d7533ae872ea3a447fd9
                      • Opcode Fuzzy Hash: cb5bcbbbf26921c7e3074c37823c1422adc3036f4a2d2023a8e066e4f582c295
                      • Instruction Fuzzy Hash: 0FE13A75A002258BDB209F68EC41BBAB7B5FF65308F184169E945DB381EB389E45CB70

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2464 d2e57d-d2e58d 2466 d2e58f-d2e596 call d2e688 2464->2466 2467 d2e59d-d2e5a0 2464->2467 2472 d2e5f0-d2e600 RaiseException 2466->2472 2476 d2e598 2466->2476 2469 d2e5a2-d2e5b5 GetProcessHeap HeapAlloc 2467->2469 2470 d2e5bc-d2e5c7 InterlockedPopEntrySList 2467->2470 2469->2472 2473 d2e5b7 2469->2473 2474 d2e5da-d2e5ee VirtualAlloc 2470->2474 2475 d2e5c9-d2e5d8 call d3f6a0 2470->2475 2477 d2e645-d2e647 2472->2477 2473->2477 2474->2472 2479 d2e602-d2e615 InterlockedPopEntrySList 2474->2479 2475->2477 2476->2467 2481 d2e617-d2e626 VirtualFree 2479->2481 2482 d2e628 2479->2482 2484 d2e644 2481->2484 2483 d2e62e-d2e640 InterlockedPushEntrySList 2482->2483 2483->2483 2485 d2e642 2483->2485 2484->2477 2485->2484
                      APIs
                      • GetProcessHeap.KERNEL32(00000008,0000000D,?,00000000,00D23C5D,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E5A6
                      • HeapAlloc.KERNEL32(00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E5AD
                        • Part of subcall function 00D2E688: IsProcessorFeaturePresent.KERNEL32(0000000C,00D2E594,?,00000000,00D23C5D,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E68A
                      • InterlockedPopEntrySList.KERNEL32(00785B58,?,00000000,00D23C5D,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E5BD
                      • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000040,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E5E4
                      • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E5F8
                      • InterlockedPopEntrySList.KERNEL32(00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E60B
                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E61E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
                      • String ID: X[x
                      • API String ID: 2460949444-2592070539
                      • Opcode ID: 1d6b5876e40e612bd3b058b0d44d0fa9520c312d030ae989435c8fef76797f33
                      • Instruction ID: 22135a61fc7ac5b855f30eba8ff37d7f0e4aca7264938063f1ec15ce40bb2b3c
                      • Opcode Fuzzy Hash: 1d6b5876e40e612bd3b058b0d44d0fa9520c312d030ae989435c8fef76797f33
                      • Instruction Fuzzy Hash: 5E1190796457316BE6311B64BC88F662758EF7579EF190920F941D6360EB60CC0046B4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2813 d1e890-d1e8fd call d18340 call d12ca0 2818 d1e900-d1e906 2813->2818 2819 d1e926-d1e928 2818->2819 2820 d1e908-d1e90b 2818->2820 2823 d1e92b-d1e941 2819->2823 2821 d1e922-d1e924 2820->2821 2822 d1e90d-d1e915 2820->2822 2821->2823 2822->2819 2824 d1e917-d1e920 2822->2824 2825 d1e943-d1e946 2823->2825 2826 d1e94b-d1e94d 2823->2826 2824->2818 2824->2821 2825->2826 2827 d1e9ad-d1ea41 GetSystemTime SystemTimeToFileTime call d3f6a0 call d112c0 FindFirstFileW 2826->2827 2828 d1e94f-d1e95d 2826->2828 2844 d1ea43-d1ea46 2827->2844 2845 d1ea4b-d1ea54 call d11910 2827->2845 2829 d1eea1-d1eea6 call d116f0 2828->2829 2830 d1e963-d1e972 2828->2830 2836 d1eeab-d1eeb5 call d116f0 2829->2836 2833 d1e974-d1e980 call d114b0 2830->2833 2834 d1e986-d1e998 2830->2834 2833->2834 2834->2829 2838 d1e99e-d1e9a9 2834->2838 2838->2827 2844->2845 2845->2836 2848 d1ea5a-d1ea7c 2845->2848 2850 d1ee22-d1ee36 2848->2850 2851 d1ea82-d1ea88 2848->2851 2853 d1ee40-d1ee58 2850->2853 2854 d1ee38-d1ee3b 2850->2854 2852 d1ea90-d1ea9b 2851->2852 2855 d1eaa0-d1eaa6 2852->2855 2856 d1ee62-d1ee83 call d416e0 2853->2856 2857 d1ee5a-d1ee5d 2853->2857 2854->2853 2858 d1eac6-d1eac8 2855->2858 2859 d1eaa8-d1eaab 2855->2859 2857->2856 2863 d1eacb-d1eacd 2858->2863 2861 d1eac2-d1eac4 2859->2861 2862 d1eaad-d1eab5 2859->2862 2861->2863 2862->2858 2865 d1eab7-d1eac0 2862->2865 2866 d1ead3-d1eadf 2863->2866 2867 d1ede8-d1edfd FindNextFileW 2863->2867 2865->2855 2865->2861 2870 d1eae0-d1eae6 2866->2870 2868 d1ee03-d1ee0a 2867->2868 2869 d1ee84-d1ee93 GetLastError 2867->2869 2868->2852 2871 d1ee10 2868->2871 2874 d1ee95-d1ee9c 2869->2874 2875 d1ee16-d1ee19 2869->2875 2872 d1eb06-d1eb08 2870->2872 2873 d1eae8-d1eaeb 2870->2873 2871->2875 2876 d1eb0b-d1eb0d 2872->2876 2878 d1eb02-d1eb04 2873->2878 2879 d1eaed-d1eaf5 2873->2879 2874->2875 2875->2850 2877 d1ee1b-d1ee1c FindClose 2875->2877 2876->2867 2881 d1eb13-d1eb1a 2876->2881 2877->2850 2878->2876 2879->2872 2880 d1eaf7-d1eb00 2879->2880 2880->2870 2880->2878 2881->2867 2882 d1eb20-d1eb2c 2881->2882 2882->2867 2883 d1eb32 2882->2883 2884 d1eb40-d1eb46 2883->2884 2885 d1eb34-d1eb3a 2883->2885 2884->2867 2886 d1eb4c 2884->2886 2885->2867 2885->2884 2887 d1eb5a-d1eb61 call d11910 2886->2887 2888 d1eb4e-d1eb54 2886->2888 2887->2836 2891 d1eb67-d1eb86 2887->2891 2888->2867 2888->2887 2893 d1eb99-d1eb9f 2891->2893 2894 d1eb88-d1eb97 call d18780 2891->2894 2896 d1eba2-d1ebab 2893->2896 2899 d1ebc4-d1ec19 call d1ff60 call d18550 2894->2899 2896->2896 2898 d1ebad-d1ebbf call d12e00 2896->2898 2898->2899 2905 d1ec6b-d1ec7c 2899->2905 2906 d1ec1b-d1ec1f 2899->2906 2907 d1ec86-d1ec9d 2905->2907 2908 d1ec7e-d1ec81 2905->2908 2909 d1ec21-d1ec25 2906->2909 2910 d1ec5c-d1ec66 call d12e00 2906->2910 2912 d1eca7-d1ecc6 call d20150 2907->2912 2913 d1ec9f-d1eca2 2907->2913 2908->2907 2909->2910 2914 d1ec27-d1ec41 call d115a0 2909->2914 2910->2905 2919 d1ed33 2912->2919 2920 d1ecc8-d1ecfa call d33899 call d1ff60 2912->2920 2913->2912 2921 d1ec51-d1ec5a 2914->2921 2922 d1ec43-d1ec4b 2914->2922 2924 d1ed35-d1ed3d 2919->2924 2938 d1ed00-d1ed06 2920->2938 2921->2905 2922->2921 2925 d1ed60-d1ed62 2924->2925 2926 d1ed3f-d1ed56 2924->2926 2930 d1edc4-d1edd8 2925->2930 2931 d1ed64-d1eda4 call d112c0 call d1b350 2925->2931 2926->2925 2929 d1ed58-d1ed5b 2926->2929 2929->2925 2935 d1ede2 2930->2935 2936 d1edda-d1eddd 2930->2936 2946 d1eda6-d1eda9 2931->2946 2947 d1edae-d1edbe 2931->2947 2935->2867 2936->2935 2940 d1ed26-d1ed28 2938->2940 2941 d1ed08-d1ed0b 2938->2941 2945 d1ed2b-d1ed2d 2940->2945 2943 d1ed22-d1ed24 2941->2943 2944 d1ed0d-d1ed15 2941->2944 2943->2945 2944->2940 2948 d1ed17-d1ed20 2944->2948 2945->2919 2949 d1ed2f-d1ed31 2945->2949 2946->2947 2947->2930 2948->2938 2948->2943 2949->2924
                      APIs
                      • GetSystemTime.KERNEL32(?,?,00000001,?,70CDB3AB,?,?), ref: 00D1E9B1
                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D1E9C2
                      • FindFirstFileW.KERNELBASE(00000000,?), ref: 00D1EA20
                      • FindNextFileW.KERNEL32(?,?,?), ref: 00D1EDF5
                      • FindClose.KERNEL32(?), ref: 00D1EE1C
                      Strings
                      • {????????-????-????-????-????????????}, xrefs: 00D1E9FE
                      • 0123456789abcdefABCDEF, xrefs: 00D1ECC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: FileFindTime$System$CloseFirstNext
                      • String ID: 0123456789abcdefABCDEF${????????-????-????-????-????????????}
                      • API String ID: 1385230233-2180135798
                      • Opcode ID: 2b97ef91af6a2b1181aa1d9354a6f54877ca2a94a6360e2427c3af7dbc0ab78d
                      • Instruction ID: a874c9205fcd8550b20a2767d4fd8d91cde61d7abb54ebb6ff77e65cfcb3fa6d
                      • Opcode Fuzzy Hash: 2b97ef91af6a2b1181aa1d9354a6f54877ca2a94a6360e2427c3af7dbc0ab78d
                      • Instruction Fuzzy Hash: 3E029031A00616AFDB24DB24DC49BE9B7B5FF55310F1842D9E81A97291EF319E84CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3187 d15480-d154a9 call d15b20 3190 d156f7-d156fc 3187->3190 3191 d154af-d154cd GetSecurityDescriptorDacl 3187->3191 3192 d15705-d15707 3190->3192 3193 d156fe-d156ff LocalFree 3190->3193 3194 d154d3-d154d8 3191->3194 3195 d156ee-d156f1 LocalFree 3191->3195 3196 d15712-d15714 3192->3196 3197 d15709-d1570f call d11a40 3192->3197 3193->3192 3194->3195 3198 d154de-d15537 call d11a30 * 2 3194->3198 3195->3190 3201 d15716-d1571c call d11a40 3196->3201 3202 d1571f-d15727 3196->3202 3197->3196 3209 d156a4-d156b3 LocalAlloc 3198->3209 3210 d1553d-d1553f 3198->3210 3201->3202 3211 d156b5-d156c8 InitializeAcl 3209->3211 3212 d156ca GetLastError 3209->3212 3210->3209 3213 d15545-d15553 3210->3213 3211->3212 3214 d156d4-d156dc call d159b0 3211->3214 3215 d156d0-d156d2 3212->3215 3216 d15555-d1555c 3213->3216 3217 d1555e-d1557d call d113b0 3213->3217 3221 d156e1-d156e6 3214->3221 3215->3214 3218 d156ea-d156ed 3215->3218 3216->3216 3216->3217 3223 d15583-d15589 3217->3223 3224 d1565d-d15661 3217->3224 3218->3195 3221->3218 3227 d15590-d155a5 GetAce 3223->3227 3225 d15663-d1566a 3224->3225 3226 d1566c-d15672 3224->3226 3230 d15675-d15686 3225->3230 3226->3230 3228 d15641 3227->3228 3229 d155ab-d155c5 call d15ac0 3227->3229 3234 d15644-d1564e 3228->3234 3235 d155ca-d155cf 3229->3235 3232 d15690-d15692 3230->3232 3233 d15688-d1568b 3230->3233 3232->3209 3236 d15694-d156a2 SetEntriesInAclW 3232->3236 3233->3232 3234->3227 3237 d15654-d1565a 3234->3237 3235->3228 3238 d155d1-d155ea call d15430 3235->3238 3236->3215 3237->3224 3241 d155ec-d155ef 3238->3241 3242 d155ff-d15615 3238->3242 3241->3228 3243 d155f1-d155f7 3241->3243 3242->3234 3244 d15617-d15619 3242->3244 3243->3234 3245 d155f9-d155fd 3243->3245 3244->3234 3246 d1561b-d1563e BuildExplicitAccessWithNameW 3244->3246 3245->3234 3246->3228
                      APIs
                        • Part of subcall function 00D15B20: GetNamedSecurityInfoW.ADVAPI32(?,00000001,00000004,00000000,00000000,00000000,00000000,00000000,?,70CDB3AB), ref: 00D15B86
                      • GetSecurityDescriptorDacl.ADVAPI32(00000000,?,?,?,?,00000001), ref: 00D154C5
                      • GetAce.ADVAPI32(?,00000000,?,?,00000001), ref: 00D1559D
                      • BuildExplicitAccessWithNameW.ADVAPI32(?,?,00000000,?,?,?,?,00000001), ref: 00D1562C
                      • SetEntriesInAclW.ADVAPI32(00000000,?,00000000,00000000,?,00000001), ref: 00D1569C
                      • LocalAlloc.KERNEL32(00000000,00000008,?,00000001), ref: 00D156A8
                      • InitializeAcl.ADVAPI32(00000000,00000008,00000002,?,00000001), ref: 00D156BA
                      • GetLastError.KERNEL32(?,00000001), ref: 00D156CA
                      • LocalFree.KERNEL32(?,?,00000001), ref: 00D156F1
                      • LocalFree.KERNEL32(00000000,?,00000001), ref: 00D156FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Local$FreeSecurity$AccessAllocBuildDaclDescriptorEntriesErrorExplicitInfoInitializeLastNameNamedWith
                      • String ID:
                      • API String ID: 32545959-0
                      • Opcode ID: d782bb3e714dc25226dfbc4cfa49561ccc87f1423dfa70317e8556edf459777a
                      • Instruction ID: 24ee0b3a6d5f992980abaa4f4c1fa1c9cd6b45fada43d309022977362338c5f1
                      • Opcode Fuzzy Hash: d782bb3e714dc25226dfbc4cfa49561ccc87f1423dfa70317e8556edf459777a
                      • Instruction Fuzzy Hash: 2281C371E01615EBDB148F64E885BEEBBB5EF85300F088169E815E7296DB38CD41CBB0
                      APIs
                        • Part of subcall function 00D15B20: GetNamedSecurityInfoW.ADVAPI32(?,00000001,00000004,00000000,00000000,00000000,00000000,00000000,?,70CDB3AB), ref: 00D15B86
                      • GetSecurityDescriptorDacl.ADVAPI32(00000000,00000000,00000000,?), ref: 00D15795
                      • CreateWellKnownSid.ADVAPI32(00000016,00000000,?,00000100), ref: 00D157F7
                      • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,00000100), ref: 00D1581A
                      • GetUserNameW.ADVAPI32(?,00000100), ref: 00D1583B
                      • LookupAccountNameW.ADVAPI32(00000000,?,?,00000100,?,00000100,?), ref: 00D15883
                      • GetAce.ADVAPI32(00000000,00000000,?), ref: 00D158FB
                      • EqualSid.ADVAPI32(?,-00000008), ref: 00D15911
                      • LocalFree.KERNEL32(00000000), ref: 00D1598C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CreateKnownNameSecurityWell$AccountDaclDescriptorEqualFreeInfoLocalLookupNamedUser
                      • String ID:
                      • API String ID: 4259123070-0
                      • Opcode ID: a9f09e64176fdede957f586bab442588e0b2f9ee7d8ef17d4398455a0817858f
                      • Instruction ID: aed0588442adf4a85589c2be8f0b84455b20c95a8bd7ccd0342bcd5306311374
                      • Opcode Fuzzy Hash: a9f09e64176fdede957f586bab442588e0b2f9ee7d8ef17d4398455a0817858f
                      • Instruction Fuzzy Hash: 31612B75D0822CDBDB61CB24DC80BEAB7F8EB49350F4401D6D50DA2241DB78AEC58FA1
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll,70CDB3AB,?,?,?,?,?,?,?,?,70CDB3AB,?,?,?,00000000,00D4527D), ref: 00D1A887
                      • GetProcAddress.KERNEL32(00000000,70CDB3AB), ref: 00D1A89A
                      • GetDiskFreeSpaceExW.KERNELBASE(?,?,?,00000000,?,?,?,?,?,?,?,?,70CDB3AB,?,?), ref: 00D1A8C0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AddressDiskFreeHandleModuleProcSpace
                      • String ID: ExW$kernel32.dll
                      • API String ID: 1197914913-1367044033
                      • Opcode ID: 246a2471890b7766b09660080e41088a4626fc7a6944daa0bef9b4cde0fdebe7
                      • Instruction ID: 330be16d8423bceceda516207a73644d8f6019652df0f7070e125eaa35a3e934
                      • Opcode Fuzzy Hash: 246a2471890b7766b09660080e41088a4626fc7a6944daa0bef9b4cde0fdebe7
                      • Instruction Fuzzy Hash: C4D19FB1A01219AFCB24DF68D894BEDB7B4FF48310F04459AE519A7291DF30AE85CF64
                      APIs
                      • FindFirstFileW.KERNELBASE(00000000,?,?,?,80070002), ref: 00D15E39
                      • FindNextFileW.KERNELBASE(000000FF,?,?,?,80070002), ref: 00D164CE
                      • GetLastError.KERNEL32(?,?,80070002), ref: 00D164E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: FileFind$ErrorFirstLastNext
                      • String ID:
                      • API String ID: 1230121326-0
                      • Opcode ID: 858844ae454016281a597e5c3885d3076fc268eb0d296694a966187cb25c1d7c
                      • Instruction ID: 156d2668a2f74b7f6c08283aa583383878f2be682d1aade9b46c7d60c122fe4b
                      • Opcode Fuzzy Hash: 858844ae454016281a597e5c3885d3076fc268eb0d296694a966187cb25c1d7c
                      • Instruction Fuzzy Hash: 9A825D34A05615DFDB20DF28D888B99B7B1FF45310F1882E9E8199B295DB31EE85CF60
                      APIs
                      • FindFirstFileW.KERNELBASE(?,?,?,00000250,?), ref: 00D1B2FF
                      • FindClose.KERNELBASE(00000000,?,00000250,?), ref: 00D1B32F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Find$CloseFileFirst
                      • String ID:
                      • API String ID: 2295610775-0
                      • Opcode ID: dbb3c53472e4312f39b61c33b1c88d2616f008962d6620331340b554b3afd7ca
                      • Instruction ID: 996e2f7043189d5659a59849ef2c43c4cc1e7a1f6c11717739c1dcaa203385f9
                      • Opcode Fuzzy Hash: dbb3c53472e4312f39b61c33b1c88d2616f008962d6620331340b554b3afd7ca
                      • Instruction Fuzzy Hash: 8E0175756187449BC220EF24E84AAABB7D8FB89324F504B09F85883280D771E944C6E2
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 00D1DC8A
                        • Part of subcall function 00D1B2C0: FindFirstFileW.KERNELBASE(?,?,?,00000250,?), ref: 00D1B2FF
                        • Part of subcall function 00D1A410: GetTempPathW.KERNEL32(00000105,?,?,00000010,?,00000000,00D4527D,000000FF,?,80004005,80004005), ref: 00D1A4B2
                      • PathFileExistsW.KERNELBASE(?,?,?), ref: 00D1DCEF
                      • CreateDirectoryW.KERNELBASE(?,00000000,?,?), ref: 00D1DCFB
                        • Part of subcall function 00D15730: GetSecurityDescriptorDacl.ADVAPI32(00000000,00000000,00000000,?), ref: 00D15795
                        • Part of subcall function 00D15730: CreateWellKnownSid.ADVAPI32(00000016,00000000,?,00000100), ref: 00D157F7
                        • Part of subcall function 00D15730: CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,00000100), ref: 00D1581A
                        • Part of subcall function 00D15730: GetUserNameW.ADVAPI32(?,00000100), ref: 00D1583B
                        • Part of subcall function 00D15730: LookupAccountNameW.ADVAPI32(00000000,?,?,00000100,?,00000100,?), ref: 00D15883
                      • CreateWellKnownSid.ADVAPI32(00000016,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D1DD85
                      • LookupAccountSidW.ADVAPI32(00000000,?,?,00000100,?,?,?), ref: 00D1DDD2
                      • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,00000100,?,?,?,?,?,?,?,?), ref: 00D1DDF7
                      • LookupAccountSidW.ADVAPI32(00000000,?,?,00000100,?,00000100,?), ref: 00D1DE3B
                      • GetUserNameW.ADVAPI32(?,00000100), ref: 00D1DE66
                      • BuildExplicitAccessWithNameW.ADVAPI32(?,?,001F01FF,00000002,00000003,?,?,?,?,?,?,?,?), ref: 00D1DEAB
                      • SetEntriesInAclW.ADVAPI32(00000003,?,00000061,00000000,?,?,?,?,?,?,?,?), ref: 00D1DED0
                      • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00D1DEFB
                      • PathFileExistsW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D1E0D9
                      • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D1E0EA
                      • PathFileExistsW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D1E102
                      • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D1E113
                      • PostMessageW.USER32(00000000,00008111,00000000,00000000), ref: 00D1E15C
                      • PostMessageW.USER32(00000000,00008112,00000001,00000000), ref: 00D1E2B7
                      • PostMessageW.USER32(00000000,00008112,00000000,00000000), ref: 00D1E2DD
                      • PostMessageW.USER32(00000000,00008113,00000000,00000000), ref: 00D1E2F7
                      • WaitForSingleObject.KERNEL32(00D1FBAF,000001F4,?,?,00000002,00000000,00000000,?,?,?,00000000), ref: 00D1E32A
                        • Part of subcall function 00D1FE60: PathFileExistsW.KERNELBASE(?,00000008,00D1E4B7,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D1FE64
                        • Part of subcall function 00D1FE60: CreateDirectoryW.KERNELBASE(?,00000000,?,00000008,00D1E4B7), ref: 00D1FE70
                      • PostMessageW.USER32(00000000,00008114,00000000,00000000), ref: 00D1E4D7
                      • GetLocalTime.KERNEL32(?), ref: 00D1E5A5
                      • PostMessageW.USER32(?,00008115,?,00000000), ref: 00D1E7EA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Create$FileMessagePost$NamePath$DirectoryExistsKnownWell$AccountLookup$LocalUser$AccessBuildDaclDescriptorEntriesExplicitFindFirstFreeModuleObjectSecuritySingleTempTimeWaitWith
                      • String ID: !!!53AAED7C-68E7-413C-A5FD-D9F76477D66A$E8FF0748-2339-49f9-9A79-824D7561736C.cab$ExtractedFiles_%04d%02d%02dT%02d%02d%02d.%03d.log$Package\$Support\
                      • API String ID: 2966010313-1054188327
                      • Opcode ID: 2a5f6293910032851a3d1d2abf65a4a231cc2f4063fbffaa344e95878b0eea08
                      • Instruction ID: f02c0bf2cc601e73bd54d332ba39ee184b20a1081c3d80b40acb8f2659ce880b
                      • Opcode Fuzzy Hash: 2a5f6293910032851a3d1d2abf65a4a231cc2f4063fbffaa344e95878b0eea08
                      • Instruction Fuzzy Hash: 94829070A00615AFDB10CF68DC84BD9B7B9EF45314F14829AE919A7291DF70AE85CFB0
                      APIs
                      • EnterCriticalSection.KERNEL32(?,?,?,70CDB3AB,80040006,00000010,00000010), ref: 00D16F8E
                      • LeaveCriticalSection.KERNEL32(?), ref: 00D16FBB
                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D16FEB
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,!!!E8FF0748-2339-49f9-9A79-824D7561736C,000000FF), ref: 00D17033
                      • CompareStringW.KERNEL32(0000007F,00000001,00000000,000000FF,!!!53AAED7C-68E7-413C-A5FD-D9F76477D66A,000000FF), ref: 00D1706C
                      • PathFileExistsW.KERNELBASE(?,?,?), ref: 00D1721D
                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D17229
                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D1727F
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,Settings.ini,000000FF), ref: 00D17320
                      • CompareStringW.KERNEL32(0000007F,00000001,-00000010,000000FF,E8FF0748-2339-49f9-9A79-824D7561736C.cab,000000FF), ref: 00D17345
                      • EnterCriticalSection.KERNEL32(?), ref: 00D1735A
                      • LeaveCriticalSection.KERNEL32(?), ref: 00D17387
                      • GetCurrentThreadId.KERNEL32 ref: 00D1769E
                      • GetCurrentThreadId.KERNEL32 ref: 00D176AA
                      • TlsGetValue.KERNEL32(00000001), ref: 00D176CD
                      • TlsSetValue.KERNEL32(00000001,00D4D004), ref: 00D176ED
                      • TlsGetValue.KERNEL32 ref: 00D17701
                      • DeleteFileW.KERNELBASE(?), ref: 00D17789
                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D178F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CompareCriticalSectionString$ObjectSingleValueWait$CurrentEnterFileLeaveThread$CreateDeleteDirectoryExistsPath
                      • String ID: !!!53AAED7C-68E7-413C-A5FD-D9F76477D66A$!!!E8FF0748-2339-49f9-9A79-824D7561736C$E8FF0748-2339-49f9-9A79-824D7561736C.cab$PA=n$Settings.ini
                      • API String ID: 2253311208-3772288626
                      • Opcode ID: 6d1c4e0d41bb29dbbc64eeac6df79ec859a172d0a6b336279c8a259d1e681818
                      • Instruction ID: 0a7d87817434271d37cd13a4c289af634d9ae0039500b3bc0b0169ebf0523b47
                      • Opcode Fuzzy Hash: 6d1c4e0d41bb29dbbc64eeac6df79ec859a172d0a6b336279c8a259d1e681818
                      • Instruction Fuzzy Hash: 33923C70A05605EFDB10DF68D884BDDB7B1FF05314F1886A9E469AB2A1DB30AD85CF60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1566 d1f010-d1f068 GetTickCount GetNativeSystemInfo 1567 d1f077 1566->1567 1568 d1f06a-d1f075 1566->1568 1569 d1f07c-d1f08e 1567->1569 1568->1567 1568->1569 1570 d1f094-d1f0d5 call d18340 call d112c0 PathFileExistsW call d11910 1569->1570 1571 d1f60d-d1f615 1569->1571 1594 d1f930-d1f935 call d116f0 1570->1594 1595 d1f0db-d1f0f3 1570->1595 1573 d1f61b-d1f620 1571->1573 1574 d1f91a-d1f92d 1571->1574 1576 d1f622-d1f63e call d1ff60 1573->1576 1577 d1f665 1573->1577 1585 d1f640-d1f642 1576->1585 1586 d1f65f-d1f663 1576->1586 1580 d1f668 1577->1580 1583 d1f66c-d1f66f 1580->1583 1587 d1f671-d1f682 1583->1587 1588 d1f68c-d1f690 1583->1588 1585->1580 1591 d1f644-d1f646 1585->1591 1586->1583 1587->1588 1592 d1f684-d1f687 1587->1592 1588->1574 1589 d1f696-d1f6b7 call d11910 1588->1589 1599 d1f949-d1f94e call d116f0 1589->1599 1600 d1f6bd-d1f6f0 InitializeCriticalSectionAndSpinCount 1589->1600 1591->1580 1596 d1f648-d1f65d CompareStringW 1591->1596 1592->1588 1602 d1f93a-d1f93f call d116f0 1594->1602 1603 d1f0f9-d1f11a call d112c0 1595->1603 1604 d1f17f-d1f18a 1595->1604 1596->1580 1596->1586 1612 d1f953-d1f959 call d116f0 1599->1612 1614 d1f6f2-d1f6fa GetLastError 1600->1614 1615 d1f70c-d1f7ac 1600->1615 1609 d1f944 call d116d0 1602->1609 1627 d1f11c-d1f120 1603->1627 1628 d1f15e-d1f173 1603->1628 1610 d1f18c-d1f190 1604->1610 1611 d1f1ce-d1f1e8 call d13390 1604->1611 1609->1599 1619 d1f1c2-d1f1c9 call d12e00 1610->1619 1620 d1f192-d1f196 1610->1620 1631 d1f5a7-d1f5bb 1611->1631 1632 d1f1ee-d1f1f9 1611->1632 1623 d1f706 1614->1623 1624 d1f6fc-d1f704 1614->1624 1626 d1f7b0-d1f7b5 1615->1626 1619->1611 1620->1619 1629 d1f198-d1f1ad call d115a0 1620->1629 1623->1612 1623->1615 1624->1623 1633 d1f7bb-d1f7d3 GetTickCount 1626->1633 1634 d1f8dd-d1f910 call d24f50 DeleteCriticalSection 1626->1634 1635 d1f152-d1f159 call d12e00 1627->1635 1636 d1f122-d1f126 1627->1636 1628->1611 1630 d1f175-d1f17d 1628->1630 1646 d1f1ba-d1f1c0 1629->1646 1647 d1f1af-d1f1b7 1629->1647 1630->1611 1640 d1f5c8-d1f5dc 1631->1640 1641 d1f5bd-d1f5c5 1631->1641 1632->1631 1643 d1f1ff-d1f208 PathFileExistsW 1632->1643 1633->1634 1644 d1f7d9-d1f7e9 call d199c0 1633->1644 1634->1574 1656 d1f912-d1f915 1634->1656 1635->1628 1636->1635 1645 d1f128-d1f13d call d115a0 1636->1645 1649 d1f5e9-d1f600 1640->1649 1650 d1f5de-d1f5e6 1640->1650 1641->1640 1643->1631 1652 d1f20e-d1f217 call d11910 1643->1652 1667 d1f804-d1f85c call d18340 call d24350 1644->1667 1668 d1f7eb-d1f7ff call d24890 1644->1668 1662 d1f14a-d1f150 1645->1662 1663 d1f13f-d1f147 1645->1663 1646->1611 1647->1646 1658 d1f602-d1f605 1649->1658 1659 d1f60a 1649->1659 1650->1649 1652->1602 1671 d1f21d-d1f23c 1652->1671 1656->1574 1658->1659 1659->1571 1662->1628 1663->1662 1676 d1f8c6-d1f8c8 1667->1676 1686 d1f85e-d1f862 1667->1686 1668->1676 1679 d1f29c-d1f2a3 1671->1679 1680 d1f23e-d1f246 1671->1680 1676->1634 1678 d1f8ca-d1f8d8 WaitForSingleObject 1676->1678 1678->1626 1682 d1f387-d1f38b 1679->1682 1683 d1f2a9-d1f2b0 call d1f960 1679->1683 1684 d1f248-d1f24c 1680->1684 1685 d1f28a-d1f299 call d13390 1680->1685 1690 d1f393 1682->1690 1691 d1f38d-d1f391 1682->1691 1700 d1f2b2-d1f2be 1683->1700 1701 d1f2d9-d1f30b call d20690 1683->1701 1688 d1f27e-d1f285 call d12e00 1684->1688 1689 d1f24e-d1f252 1684->1689 1685->1679 1686->1676 1692 d1f864-d1f8c3 call d15290 call d18340 call d24350 1686->1692 1688->1685 1689->1688 1696 d1f254-d1f269 call d115a0 1689->1696 1697 d1f397-d1f39c 1690->1697 1691->1697 1692->1676 1716 d1f276-d1f27c 1696->1716 1717 d1f26b-d1f273 1696->1717 1703 d1f3b7-d1f3bf 1697->1703 1704 d1f39e-d1f3b2 call d13390 * 2 1697->1704 1700->1701 1706 d1f2c0-d1f2d4 call d13390 * 2 1700->1706 1727 d1f30d-d1f339 RegQueryValueExW 1701->1727 1728 d1f35c-d1f361 1701->1728 1711 d1f3c1-d1f3d5 call d13390 * 2 1703->1711 1712 d1f3da-d1f3e1 1703->1712 1704->1703 1706->1701 1711->1712 1713 d1f3e7-d1f3f7 call d3ee98 1712->1713 1714 d1f4a9-d1f4b0 1712->1714 1713->1714 1744 d1f3fd-d1f401 1713->1744 1724 d1f4b6-d1f4c6 call d3ee98 1714->1724 1725 d1f55b-d1f566 1714->1725 1716->1685 1717->1716 1724->1725 1748 d1f4cc-d1f4d0 1724->1748 1738 d1f568-d1f56c 1725->1738 1739 d1f56e 1725->1739 1740 d1f347-d1f359 1727->1740 1741 d1f33b-d1f344 RegCloseKey 1727->1741 1732 d1f371-d1f37c 1728->1732 1733 d1f363-d1f36a RegCloseKey 1728->1733 1732->1703 1743 d1f37e-d1f385 1732->1743 1733->1732 1746 d1f570-d1f57b call d1b740 1738->1746 1739->1746 1740->1728 1741->1740 1743->1697 1744->1714 1747 d1f407-d1f426 1744->1747 1751 d1f580-d1f583 1746->1751 1756 d1f431-d1f445 1747->1756 1757 d1f428-d1f42a 1747->1757 1748->1725 1750 d1f4d6-d1f50c call d112c0 call d20150 PathFileExistsW 1748->1750 1764 d1f51e 1750->1764 1765 d1f50e-d1f518 CreateDirectoryW 1750->1765 1752 d1f588-d1f59d 1751->1752 1752->1631 1755 d1f59f-d1f5a2 1752->1755 1755->1631 1756->1609 1767 d1f44b-d1f462 call d11510 1756->1767 1757->1756 1760 d1f42c-d1f42f 1757->1760 1762 d1f465-d1f49f call d20020 call d20150 1760->1762 1762->1714 1778 d1f4a1-d1f4a4 1762->1778 1770 d1f520-d1f54a 1764->1770 1765->1764 1768 d1f51a-d1f51c 1765->1768 1767->1762 1768->1770 1774 d1f557-d1f559 1770->1774 1775 d1f54c-d1f554 1770->1775 1774->1725 1777 d1f585 1774->1777 1775->1774 1777->1752 1778->1714
                      APIs
                      • GetTickCount.KERNEL32 ref: 00D1F046
                      • GetNativeSystemInfo.KERNELBASE(?), ref: 00D1F056
                      • PathFileExistsW.KERNELBASE(?,?), ref: 00D1F0C0
                      • PathFileExistsW.KERNELBASE(?,?,00000000), ref: 00D1F200
                      • RegQueryValueExW.ADVAPI32(00000000,LaunchInstaller,00000000,?,?,?,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019), ref: 00D1F32E
                      • RegCloseKey.ADVAPI32(00000000), ref: 00D1F33C
                      • RegCloseKey.ADVAPI32(00000000,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019), ref: 00D1F364
                      • _wcsstr.LIBVCRUNTIME ref: 00D1F3ED
                      • _wcsstr.LIBVCRUNTIME ref: 00D1F4BC
                      • PathFileExistsW.SHLWAPI(?,%PACKTOOLTEMP%,?), ref: 00D1F504
                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D1F510
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,?,000000FF,?,00000000), ref: 00D1F651
                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 00D1F6E8
                      • GetLastError.KERNEL32 ref: 00D1F6F2
                      • GetTickCount.KERNEL32 ref: 00D1F7BB
                        • Part of subcall function 00D199C0: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,000000BC), ref: 00D19A4C
                        • Part of subcall function 00D199C0: VerSetConditionMask.KERNEL32(00000000,?,?,000000BC), ref: 00D19A50
                        • Part of subcall function 00D199C0: VerSetConditionMask.KERNEL32(00000000,?,?,?,000000BC), ref: 00D19A54
                        • Part of subcall function 00D199C0: VerifyVersionInfoW.KERNEL32(?,00000023,00000000), ref: 00D19A77
                      • WaitForSingleObject.KERNEL32(00D1FBAF,00007530,00000000,?), ref: 00D1F8D2
                      • DeleteCriticalSection.KERNEL32(?), ref: 00D1F8F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ConditionCountExistsFileMaskPath$CloseCriticalInfoSectionTick_wcsstr$CompareCreateDeleteDirectoryErrorInitializeLastNativeObjectQuerySingleSpinStringSystemValueVerifyVersionWait
                      • String ID: %PACKTOOLROOT%$%PACKTOOLTEMP%$&$LaunchInstaller$SOFTWARE\Sony Corporation\VAIO update$Settings.ini$Temp
                      • API String ID: 1270599173-3622933857
                      • Opcode ID: c8186188bc7452fb0d4df25dbe6784862829410c083e269bc08a69f0b0a4ed64
                      • Instruction ID: 4e95fa2faa8b01995c428b8981e290e381f09cac81934008b12e01451562745c
                      • Opcode Fuzzy Hash: c8186188bc7452fb0d4df25dbe6784862829410c083e269bc08a69f0b0a4ed64
                      • Instruction Fuzzy Hash: 1752A070A01605EFDB14CF68D854BEEBBB1FF05314F188269E465AB291DB74A984CFB0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1865 d1a0a0-d1a0f5 call d424e0 call d11910 1870 d1a3f8-d1a3fd call d116f0 1865->1870 1871 d1a0fb-d1a120 GetModuleHandleW 1865->1871 1873 d1a402-d1a46a call d116f0 call d424e0 call d11910 1870->1873 1876 d1a1b0-d1a1c3 1871->1876 1877 d1a126-d1a134 GetProcAddress 1871->1877 1910 d1a470-d1a49d 1873->1910 1911 d1a81a-d1a81f call d116f0 1873->1911 1879 d1a1c5-d1a1c9 1876->1879 1880 d1a20c-d1a21b 1876->1880 1877->1876 1881 d1a136-d1a157 1877->1881 1885 d1a1f8-d1a1fe call d12e00 1879->1885 1886 d1a1cb-d1a1cf 1879->1886 1883 d1a225-d1a22b 1880->1883 1884 d1a21d-d1a220 1880->1884 1881->1876 1898 d1a159-d1a161 1881->1898 1889 d1a231-d1a23a call d11910 1883->1889 1890 d1a3d6-d1a3f7 call d416e0 1883->1890 1884->1883 1893 d1a203-d1a209 1885->1893 1886->1885 1891 d1a1d1-d1a1e7 call d115a0 1886->1891 1889->1873 1906 d1a240-d1a28b call d3f6a0 1889->1906 1907 d1a1f1-d1a1f6 1891->1907 1908 d1a1e9-d1a1ec 1891->1908 1893->1880 1898->1876 1899 d1a163-d1a168 1898->1899 1904 d1a170-d1a179 1899->1904 1904->1904 1909 d1a17b-d1a1aa call d12e00 call d13390 1904->1909 1934 d1a28d-d1a293 1906->1934 1935 d1a2be-d1a2c0 1906->1935 1907->1893 1908->1907 1909->1876 1922 d1a4ab-d1a4be GetTempPathW 1910->1922 1923 d1a49f-d1a4a6 call d114b0 1910->1923 1916 d1a824-d1a82f call d116f0 1911->1916 1927 d1a4c0-d1a4d0 call d2eb4c 1922->1927 1928 d1a4d6-d1a4db 1922->1928 1923->1922 1927->1928 1931 d1a810-d1a815 call d116f0 1927->1931 1930 d1a4e1-d1a4ee 1928->1930 1928->1931 1936 d1a593-d1a59c call d11910 1930->1936 1937 d1a4f4-d1a50b call d12ca0 1930->1937 1931->1911 1940 d1a296-d1a29f 1934->1940 1943 d1a3b7-d1a3cc 1935->1943 1944 d1a2c6-d1a2d0 1935->1944 1936->1916 1954 d1a5a2-d1a5f8 call d12ef0 call d3f6a0 1936->1954 1952 d1a510-d1a516 1937->1952 1940->1940 1945 d1a2a1-d1a2b8 call d12e00 1940->1945 1943->1890 1948 d1a3ce-d1a3d1 1943->1948 1949 d1a2d2-d1a2d6 1944->1949 1950 d1a318-d1a32f call d12ca0 1944->1950 1945->1935 1948->1890 1955 d1a2d8-d1a2dc 1949->1955 1956 d1a30d-d1a313 call d12e00 1949->1956 1965 d1a330-d1a336 1950->1965 1959 d1a536-d1a538 1952->1959 1960 d1a518-d1a51b 1952->1960 2002 d1a62b-d1a630 1954->2002 2003 d1a5fa-d1a600 1954->2003 1955->1956 1962 d1a2de-d1a2f6 call d115a0 1955->1962 1956->1950 1966 d1a53b-d1a54f 1959->1966 1963 d1a532-d1a534 1960->1963 1964 d1a51d-d1a525 1960->1964 1982 d1a306-d1a30b 1962->1982 1983 d1a2f8-d1a300 1962->1983 1963->1966 1964->1959 1969 d1a527-d1a530 1964->1969 1970 d1a356-d1a358 1965->1970 1971 d1a338-d1a33b 1965->1971 1972 d1a551-d1a554 1966->1972 1973 d1a559-d1a55b 1966->1973 1969->1952 1969->1963 1980 d1a35b-d1a36f 1970->1980 1978 d1a352-d1a354 1971->1978 1979 d1a33d-d1a345 1971->1979 1972->1973 1976 d1a56b-d1a576 PathFileExistsW 1973->1976 1977 d1a55d-d1a566 call d13390 1973->1977 1985 d1a580-d1a58e call d13390 1976->1985 1986 d1a578-d1a57a CreateDirectoryW 1976->1986 1977->1976 1978->1980 1979->1970 1987 d1a347-d1a350 1979->1987 1988 d1a371-d1a374 1980->1988 1989 d1a379-d1a37b 1980->1989 1982->1950 1983->1982 2001 d1a7dd-d1a7fa call d416e0 1985->2001 1986->1985 1987->1965 1987->1978 1988->1989 1993 d1a38b-d1a3a3 call d13390 PathFileExistsW 1989->1993 1994 d1a37d-d1a386 call d13390 1989->1994 1993->1943 2004 d1a3a5-d1a3b0 CreateDirectoryW 1993->2004 1994->1993 2007 d1a636-d1a64f call d12ca0 2002->2007 2008 d1a808-d1a80e 2002->2008 2006 d1a603-d1a60c 2003->2006 2004->1943 2006->2006 2011 d1a60e-d1a625 call d12e00 2006->2011 2017 d1a651-d1a657 2007->2017 2010 d1a7c4-d1a7d3 2008->2010 2010->2001 2014 d1a7d5-d1a7d8 2010->2014 2011->2002 2014->2001 2018 d1a677-d1a679 2017->2018 2019 d1a659-d1a65c 2017->2019 2020 d1a67c-d1a68f 2018->2020 2021 d1a673-d1a675 2019->2021 2022 d1a65e-d1a666 2019->2022 2023 d1a691-d1a694 2020->2023 2024 d1a699-d1a69b 2020->2024 2021->2020 2022->2018 2025 d1a668-d1a671 2022->2025 2023->2024 2026 d1a69d-d1a6aa call d13390 2024->2026 2027 d1a6af-d1a6d0 call d13390 PathFileExistsW 2024->2027 2025->2017 2025->2021 2026->2027 2031 d1a6e1 2027->2031 2032 d1a6d2-d1a6df CreateDirectoryW 2027->2032 2033 d1a6e7-d1a6e9 2031->2033 2032->2033 2033->2010 2034 d1a6ef-d1a704 call d12ca0 2033->2034 2037 d1a706-d1a70c 2034->2037 2038 d1a72c-d1a72e 2037->2038 2039 d1a70e-d1a711 2037->2039 2042 d1a731-d1a744 2038->2042 2040 d1a713-d1a71b 2039->2040 2041 d1a728-d1a72a 2039->2041 2040->2038 2043 d1a71d-d1a726 2040->2043 2041->2042 2044 d1a746-d1a749 2042->2044 2045 d1a74e-d1a750 2042->2045 2043->2037 2043->2041 2044->2045 2046 d1a752-d1a75f call d13390 2045->2046 2047 d1a764-d1a786 call d13390 2045->2047 2046->2047 2051 d1a7c1 2047->2051 2052 d1a788-d1a78c 2047->2052 2051->2010 2053 d1a7fb-d1a806 call d12e00 2052->2053 2054 d1a78e-d1a792 2052->2054 2053->2051 2054->2053 2056 d1a794-d1a7ac call d115a0 2054->2056 2060 d1a7bc-d1a7bf 2056->2060 2061 d1a7ae-d1a7b6 2056->2061 2060->2051 2061->2060
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • GetModuleHandleW.KERNEL32(shell32.dll), ref: 00D1A118
                      • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00D1A12C
                      • PathFileExistsW.SHLWAPI(?,Downloads,00000009,?,00000001,?,00D1AAFD), ref: 00D1A39B
                      • CreateDirectoryW.KERNEL32(?,00000000,?,Downloads,00000009,?,00000001,?,00D1AAFD), ref: 00D1A3A8
                      • GetTempPathW.KERNEL32(00000105,?,?,00000010,?,00000000,00D4527D,000000FF,?,80004005,80004005), ref: 00D1A4B2
                      • PathFileExistsW.KERNELBASE(00000000,?,00000001,?,?,00000010,?,00000000,00D4527D,000000FF,?,80004005,80004005), ref: 00D1A56E
                      • CreateDirectoryW.KERNEL32(00000000,00000000,?,?,00000010,?,00000000,00D4527D,000000FF,?,80004005,80004005), ref: 00D1A57A
                      • PathFileExistsW.SHLWAPI(?,Sony Corporation,00000010,?,00000001,?,00D1AAFD), ref: 00D1A6C8
                      • CreateDirectoryW.KERNEL32(?,00000000,?,00D1AAFD), ref: 00D1A6D4
                        • Part of subcall function 00D116F0: __CxxThrowException@8.LIBVCRUNTIME ref: 00D11706
                        • Part of subcall function 00D116F0: HeapAlloc.KERNEL32(?,00000000,?,?,?,00D52C84,?,?,00D136E6,80070057,?,?,?,00D12FB0,?,?), ref: 00D1171B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Path$CreateDirectoryExistsFile$HeapInit_thread_footer$AddressAllocException@8HandleModuleProcProcessTempThrow
                      • String ID: Downloads$SHGetKnownFolderPath$SPackTool$Sony Corporation$Sony Packaging Tool$shell32.dll
                      • API String ID: 985261093-955954178
                      • Opcode ID: cfe772b6aadcc19b898bbe9523608e7b0bf78c1a9db5ccd027d9bba08057a1e5
                      • Instruction ID: bd784b7f85e86f211992717693654e3384c8ad0ad18e6f94091aac9fde05d829
                      • Opcode Fuzzy Hash: cfe772b6aadcc19b898bbe9523608e7b0bf78c1a9db5ccd027d9bba08057a1e5
                      • Instruction Fuzzy Hash: DD22E131A01611ABDB24DF68DC55BEAB3B1EF40310F0842A8E9559B291DFB59EC4CFB1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2063 d14120-d14178 call d11910 2066 d1493f-d14944 call d116f0 2063->2066 2067 d1417e-d141fb 2063->2067 2070 d14949-d1494e call d116f0 2066->2070 2071 d142c1-d142dc call d180a0 2067->2071 2072 d14201-d1421c call d180a0 2067->2072 2076 d14953-d14958 call d116f0 2070->2076 2080 d14246 2071->2080 2082 d142e2-d142e9 2071->2082 2072->2080 2081 d1421e-d14225 2072->2081 2083 d1495d call d116d0 2076->2083 2088 d14249-d14294 call d15bd0 call d18450 2080->2088 2084 d14231-d14240 call d12e00 2081->2084 2085 d14227-d1422b 2081->2085 2082->2084 2086 d142ef-d142f3 2082->2086 2091 d14962 call d2ef0e 2083->2091 2084->2080 2085->2084 2089 d142f9-d14310 call d115a0 2085->2089 2086->2084 2086->2089 2104 d14702-d1470e 2088->2104 2105 d1429a-d142a6 2088->2105 2100 d14320-d14329 2089->2100 2101 d14312-d1431a 2089->2101 2098 d14967 call d2ef0e 2091->2098 2106 d1496c-d14971 call d2ef0e 2098->2106 2100->2088 2101->2100 2109 d14714-d1471c 2104->2109 2110 d147c7-d147d3 2104->2110 2107 d142ac-d142bc call d14a80 2105->2107 2108 d1432e-d1433a 2105->2108 2136 d14373-d1438b 2107->2136 2114 d1433c-d1434c call d14a80 2108->2114 2115 d1434e-d1435a 2108->2115 2119 d14747-d14760 2109->2119 2120 d1471e 2109->2120 2117 d14863-d1486f 2110->2117 2118 d147d9-d147e1 2110->2118 2114->2136 2127 d1435c-d1436c call d14a80 2115->2127 2128 d1436e 2115->2128 2121 d14875-d1487d 2117->2121 2122 d148ff-d14911 2117->2122 2125 d147e3 2118->2125 2126 d1480c-d14825 2118->2126 2130 d14762-d14770 2119->2130 2131 d1479f-d147bd call d41c1e 2119->2131 2129 d14720-d14730 2120->2129 2133 d148a8-d148c1 2121->2133 2134 d1487f 2121->2134 2143 d14913-d14916 2122->2143 2144 d1491b-d1493c call d416e0 2122->2144 2137 d147e5-d147f5 2125->2137 2141 d14827-d14835 2126->2141 2142 d1483b-d14859 call d41c1e 2126->2142 2127->2136 2128->2136 2139 d14732-d14735 2129->2139 2140 d1473a-d1473f 2129->2140 2130->2091 2145 d14776 2130->2145 2131->2110 2154 d148c3-d148d1 2133->2154 2155 d148d7-d148f5 call d41c1e 2133->2155 2153 d14881-d14891 2134->2153 2136->2104 2151 d14391-d143b9 CreateFileW 2136->2151 2148 d147f7-d147fa 2137->2148 2149 d147ff-d14804 2137->2149 2139->2140 2140->2129 2156 d14741 2140->2156 2141->2098 2141->2142 2142->2117 2143->2144 2145->2131 2148->2149 2149->2137 2158 d14806 2149->2158 2159 d146fb 2151->2159 2160 d143bf-d143c8 call d11910 2151->2160 2162 d14893-d14896 2153->2162 2163 d1489b-d148a0 2153->2163 2154->2106 2154->2155 2155->2122 2156->2119 2158->2126 2159->2104 2160->2070 2169 d143ce-d14413 GetFileSizeEx 2160->2169 2162->2163 2163->2153 2166 d148a2 2163->2166 2166->2133 2171 d14419-d144ab call d183f0 call d3f6a0 call d25a30 call d25d20 call d18340 call d188b0 2169->2171 2172 d145a8-d145af SetFilePointerEx 2169->2172 2203 d144b5-d144bc 2171->2203 2204 d144ad-d144b0 2171->2204 2174 d145b5-d145c9 2172->2174 2179 d145d4-d145e7 2174->2179 2180 d145cb-d145cd 2174->2180 2179->2083 2186 d145ed-d1460a call d11510 2179->2186 2180->2179 2182 d145cf-d145d2 2180->2182 2184 d1460d-d14640 call d188b0 2182->2184 2193 d14642-d14645 2184->2193 2194 d1464a-d146f1 call d188b0 call d14980 * 3 WriteFile CloseHandle 2184->2194 2186->2184 2193->2194 2194->2159 2217 d146f3-d146f6 2194->2217 2205 d144c2-d144cb call d11910 2203->2205 2206 d1454a-d14550 2203->2206 2204->2203 2205->2076 2214 d144d1-d144ee 2205->2214 2210 d14555-d1458d call d188b0 2206->2210 2210->2174 2218 d1458f-d1459c 2210->2218 2221 d14501-d1450a 2214->2221 2222 d144f0-d144ff call d18780 2214->2222 2217->2159 2218->2174 2220 d1459e-d145a6 2218->2220 2220->2174 2224 d14510-d14519 2221->2224 2228 d14532-d14548 2222->2228 2224->2224 2227 d1451b-d1452d call d12e00 2224->2227 2227->2228 2228->2210
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000004,00000080,00000000,?,?,?), ref: 00D143A8
                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00D143FD
                      • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00D145AF
                      • WriteFile.KERNEL32(?,?,00000000,00000000,00000000), ref: 00D146CE
                      • CloseHandle.KERNEL32(?), ref: 00D146DA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$Init_thread_footer$CloseCreateHandleHeapPointerProcessSizeWrite
                      • String ID: Folder:%s$Changed$Created$Deleted$ErrorCode:0x%08x$Package:%I64d%s$Signature:%s"%s"$false$true
                      • API String ID: 745663689-1134783121
                      • Opcode ID: 901865c0feb02941bdbdde91439f8596ea284df8854116a6bbbe5b8455f80d41
                      • Instruction ID: 329776e7067175de4aaa8d28fdc067306e01fe3b7217dbfb55be4acb231ed38a
                      • Opcode Fuzzy Hash: 901865c0feb02941bdbdde91439f8596ea284df8854116a6bbbe5b8455f80d41
                      • Instruction Fuzzy Hash: 3B327A71900659ABDB20DB28DC54BDAB7F5FF04314F188298E499A7281DF31AE85CFE0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2361 d224e0-d224f2 2362 d224f4-d22508 2361->2362 2363 d2250b-d22527 SendMessageW 2361->2363 2364 d226c9-d226cd 2363->2364 2365 d2252d-d22531 2363->2365 2366 d226fe-d22706 2364->2366 2367 d226cf-d226e0 SendMessageW 2364->2367 2365->2364 2368 d22537-d2254e 2365->2368 2369 d226e2-d226ee SendMessageW 2367->2369 2370 d226f0-d226fc SendMessageW 2367->2370 2371 d22550-d22553 2368->2371 2372 d22559-d2255d 2368->2372 2369->2370 2370->2366 2371->2372 2373 d22626-d2264c SendMessageW * 2 2371->2373 2374 d2256e-d22572 2372->2374 2375 d2255f-d22563 2372->2375 2376 d2265b-d22660 2373->2376 2377 d2264e-d22659 SendMessageW 2373->2377 2374->2373 2379 d22578-d22581 2374->2379 2378 d22565-d22568 2375->2378 2375->2379 2376->2366 2380 d22666-d2266f 2376->2380 2377->2376 2378->2374 2381 d22618-d2261c 2378->2381 2379->2381 2382 d22587-d225d1 EnterCriticalSection LeaveCriticalSection 2379->2382 2384 d22671-d2268a 2380->2384 2385 d2268d-d226ba 2380->2385 2383 d22621-d22624 SendMessageW 2381->2383 2382->2381 2386 d225d3-d22616 call d44900 * 2 call d44791 2382->2386 2383->2373 2392 d226be-d226c6 2385->2392 2386->2383
                      APIs
                      • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 00D2251D
                      • EnterCriticalSection.KERNEL32(?,?,?,?), ref: 00D2258E
                      • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 00D225C1
                      • SendMessageW.USER32(?,00000405,00000000,00000000), ref: 00D22624
                      • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 00D22632
                      • SendMessageW.USER32(?,00000411,00000000,00000000), ref: 00D22644
                      • SendMessageW.USER32(?,00000410,?,00000000), ref: 00D22659
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: MessageSend$CriticalSection$EnterLeave
                      • String ID: -
                      • API String ID: 4009585992-2547889144
                      • Opcode ID: 95e06f1c52a8ddbf967aa865c3f08b45d613a354c6ebc5bcae39f9c47abd2ad3
                      • Instruction ID: 548e0f91210821f726fc535a56099d1aa0c33e1d811a32b258282547b1718ce3
                      • Opcode Fuzzy Hash: 95e06f1c52a8ddbf967aa865c3f08b45d613a354c6ebc5bcae39f9c47abd2ad3
                      • Instruction Fuzzy Hash: AB51F1B1704711BBE7108F24EC81B6AB791FF58714F044529F605AB6D1CBB1EC60CBA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2396 d2f5c4-d2f5f4 call d2f398 2399 d2f5f6-d2f601 call d2efc4 2396->2399 2400 d2f60f-d2f61b call d35d75 2396->2400 2407 d2f603-d2f60a call d2efd7 2399->2407 2405 d2f634-d2f67d call d2f303 2400->2405 2406 d2f61d-d2f632 call d2efc4 call d2efd7 2400->2406 2416 d2f6ea-d2f6f3 GetFileType 2405->2416 2417 d2f67f-d2f688 2405->2417 2406->2407 2414 d2f8e6-d2f8ec 2407->2414 2418 d2f6f5-d2f726 GetLastError call d2efa1 CloseHandle 2416->2418 2419 d2f73c-d2f73f 2416->2419 2421 d2f68a-d2f68e 2417->2421 2422 d2f6bf-d2f6e5 GetLastError call d2efa1 2417->2422 2418->2407 2435 d2f72c-d2f737 call d2efd7 2418->2435 2425 d2f741-d2f746 2419->2425 2426 d2f748-d2f74e 2419->2426 2421->2422 2427 d2f690-d2f6bd call d2f303 2421->2427 2422->2407 2431 d2f752-d2f7a0 call d35cbe 2425->2431 2426->2431 2432 d2f750 2426->2432 2427->2416 2427->2422 2438 d2f7a2-d2f7ae call d2f514 2431->2438 2439 d2f7b0-d2f7d4 call d2f0b6 2431->2439 2432->2431 2435->2407 2438->2439 2445 d2f7d8-d2f7e2 call d30c91 2438->2445 2446 d2f7d6 2439->2446 2447 d2f7e7-d2f82a 2439->2447 2445->2414 2446->2445 2449 d2f84b-d2f859 2447->2449 2450 d2f82c-d2f830 2447->2450 2451 d2f8e4 2449->2451 2452 d2f85f-d2f863 2449->2452 2450->2449 2454 d2f832-d2f846 2450->2454 2451->2414 2452->2451 2455 d2f865-d2f898 CloseHandle call d2f303 2452->2455 2454->2449 2458 d2f89a-d2f8c6 GetLastError call d2efa1 call d35e87 2455->2458 2459 d2f8cc-d2f8e0 2455->2459 2458->2459 2459->2451
                      APIs
                        • Part of subcall function 00D2F303: CreateFileW.KERNELBASE(00000000,00000000,?,00D2F66D,?,?,00000000,?,00D2F66D,00000000,0000000C), ref: 00D2F320
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D2F6D8
                      • __dosmaperr.LIBCMT ref: 00D2F6DF
                      • GetFileType.KERNELBASE(00000000), ref: 00D2F6EB
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D2F6F5
                      • __dosmaperr.LIBCMT ref: 00D2F6FE
                      • CloseHandle.KERNEL32(00000000), ref: 00D2F71E
                      • CloseHandle.KERNEL32(?), ref: 00D2F868
                      • GetLastError.KERNEL32 ref: 00D2F89A
                      • __dosmaperr.LIBCMT ref: 00D2F8A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                      • String ID: H
                      • API String ID: 4237864984-2852464175
                      • Opcode ID: 1ded99c6e517336cc59d6fc311549296927197123dfb5aea958e391869a163c8
                      • Instruction ID: 1951ffe6796e16820d5fc339ddaa11a1d8b11f69260c3814feb723ba663526b1
                      • Opcode Fuzzy Hash: 1ded99c6e517336cc59d6fc311549296927197123dfb5aea958e391869a163c8
                      • Instruction Fuzzy Hash: ECA1E432A042648FDF199F68E851BAD7BB0EF16329F280169F811DB3E1D7319912CB71

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2486 d430cc-d430ce 2487 d430e6-d430f7 LoadLibraryExA 2486->2487 2488 d430d0-d430e4 2486->2488 2489 d43147-d43150 2487->2489 2490 d430f9-d4310a GetLastError 2487->2490 2488->2487 2488->2489 2491 d43152-d43153 FreeLibrary 2489->2491 2492 d43159-d43164 2489->2492 2494 d43122-d43142 call d42f7b RaiseException 2490->2494 2495 d4310c-d43120 2490->2495 2491->2492 2497 d43166-d43176 2492->2497 2498 d43178-d4317a 2492->2498 2508 d43245-d43249 2494->2508 2495->2489 2495->2494 2497->2498 2502 d43215-d43222 2498->2502 2503 d43180-d43188 2498->2503 2506 d43224-d4323c 2502->2506 2507 d4323e-d43243 call d42f7b 2502->2507 2504 d431b7-d431c5 GetProcAddress 2503->2504 2505 d4318a-d4318d 2503->2505 2504->2502 2512 d431c7-d431d8 GetLastError 2504->2512 2505->2504 2510 d4318f-d43199 2505->2510 2506->2507 2507->2508 2510->2504 2514 d4319b-d431a2 2510->2514 2516 d431f0-d43212 call d42f7b RaiseException call d42d3e 2512->2516 2517 d431da-d431ee 2512->2517 2514->2504 2520 d431a4-d431a8 2514->2520 2516->2502 2517->2502 2517->2516 2520->2504 2522 d431aa-d431b5 2520->2522 2522->2502 2522->2504
                      APIs
                      • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00D430ED
                      • GetLastError.KERNEL32 ref: 00D430F9
                      • DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D43128
                      • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 00D43139
                      • FreeLibrary.KERNEL32(00000000), ref: 00D43153
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00D431BB
                      • GetLastError.KERNEL32 ref: 00D431C7
                      • DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D431F6
                      • RaiseException.KERNEL32(C06D007F,00000000,00000001,?), ref: 00D43207
                      • DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D4323E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AccessDloadReleaseSectionWrite$ErrorExceptionLastLibraryRaise$AddressFreeLoadProc
                      • String ID:
                      • API String ID: 202095176-0
                      • Opcode ID: 9251c5b9f4a33aa2f4aeb882874df71cd2f7ff94cdfd6747c6d73fc10190f11c
                      • Instruction ID: a98c163e5d6f46ecb5282a9cfe1afb371597b2fea22ad4a08bf4699929cc4e2c
                      • Opcode Fuzzy Hash: 9251c5b9f4a33aa2f4aeb882874df71cd2f7ff94cdfd6747c6d73fc10190f11c
                      • Instruction Fuzzy Hash: 45415C3990131A9FDF11DF98D984AADB7B9EF55350B590069F900E7350DB70DE05CAB0
                      APIs
                      • PathFindExtensionW.SHLWAPI(?,70CDB3AB,?,?,?), ref: 00D1C585
                        • Part of subcall function 00D1D0B0: RegQueryValueExW.KERNELBASE(00000000,00D4D2B8,00000000,00000001,00000000,?), ref: 00D1D18A
                      • _wcschr.LIBVCRUNTIME ref: 00D1C701
                        • Part of subcall function 00D1D0B0: RegCloseKey.KERNELBASE(00000000), ref: 00D1D1FF
                        • Part of subcall function 00D1D0B0: RegQueryValueExW.KERNELBASE(00000000,00D4D2B8,00000000,00D1C5B1,00000000,00000000,80000000,70CDB3AB,00D1C5B1,\shell\open\command,00000013), ref: 00D1D25E
                        • Part of subcall function 00D1D0B0: RegCloseKey.KERNELBASE(00000000), ref: 00D1D2E5
                        • Part of subcall function 00D1D0B0: RegCloseKey.ADVAPI32(00000000,80000000,?,?), ref: 00D1D31D
                      • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104,?,00D4D464,-00000010), ref: 00D1CBAB
                      • _wcschr.LIBVCRUNTIME ref: 00D1CBEF
                        • Part of subcall function 00D20150: _wcsstr.LIBVCRUNTIME ref: 00D201D5
                        • Part of subcall function 00D20150: _wcsstr.LIBVCRUNTIME ref: 00D201E9
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,?,000000FF,?,00000000,?,00000001,?,?,?,00D4D464,-00000010), ref: 00D1CFD8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Close$QueryValue_wcschr_wcsstr$CompareEnvironmentExpandExtensionFindPathStringStrings
                      • String ID: "%1"$"%L"$"%l"
                      • API String ID: 1226520755-2359337105
                      • Opcode ID: 14089e4a97db8bd49c51948f718572ea66194308e5d336f193cf97c9286410df
                      • Instruction ID: ea33c2d0d0c618b4c0e3224064a150f652fea7ae73f88f8dc4f26daf059e2067
                      • Opcode Fuzzy Hash: 14089e4a97db8bd49c51948f718572ea66194308e5d336f193cf97c9286410df
                      • Instruction Fuzzy Hash: 66827035A41215AFDB24DF68D888BA9B7B1FF58310F1481D9E4099B291DF30AE85CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2950 d2d410-d2d456 call d11910 2953 d2d515-d2d51a call d116f0 2950->2953 2954 d2d45c-d2d47d call d11910 2950->2954 2957 d2d51f-d2d5c3 call d116f0 call d12ef0 * 2 GetModuleFileNameW GetFileVersionInfoSizeW call d11a30 2953->2957 2954->2957 2962 d2d483-d2d4d6 call d204d0 2954->2962 2976 d2d8ea-d2d907 call d416e0 2957->2976 2977 d2d5c9-d2d5e0 GetFileVersionInfoW 2957->2977 2974 d2d4e5-d2d4f7 2962->2974 2975 d2d4d8-d2d4e0 call d12e00 2962->2975 2978 d2d501-d2d514 2974->2978 2979 d2d4f9-d2d4fc 2974->2979 2975->2974 2980 d2d8e1-d2d8e7 call d11a40 2977->2980 2981 d2d5e6-d2d60c VerQueryValueW 2977->2981 2979->2978 2980->2976 2981->2980 2984 d2d612-d2d622 call d11910 2981->2984 2990 d2d908-d2d912 call d116f0 2984->2990 2991 d2d628-d2d652 2984->2991 2995 d2d658 2991->2995 2996 d2d8bf-d2d8d1 2991->2996 2999 d2d660-d2d69b call d2d410 2995->2999 2997 d2d8d3-d2d8d6 2996->2997 2998 d2d8db 2996->2998 2997->2998 2998->2980 3002 d2d6f0-d2d707 2999->3002 3003 d2d69d-d2d6a4 2999->3003 3004 d2d711-d2d716 3002->3004 3005 d2d709-d2d70c 3002->3005 3006 d2d6a6-d2d6aa 3003->3006 3007 d2d6db-d2d6ea call d12e00 3003->3007 3009 d2d718-d2d724 3004->3009 3010 d2d77d-d2d7b9 call d2d410 3004->3010 3005->3004 3006->3007 3011 d2d6ac-d2d6c0 call d115a0 3006->3011 3007->3002 3009->3010 3014 d2d726-d2d72e 3009->3014 3021 d2d7bb-d2d7c2 3010->3021 3022 d2d80e-d2d825 3010->3022 3019 d2d6c2-d2d6c5 3011->3019 3020 d2d6ca-d2d6d9 3011->3020 3014->3010 3017 d2d730-d2d734 3014->3017 3023 d2d770-d2d778 call d12e00 3017->3023 3024 d2d736-d2d73a 3017->3024 3019->3020 3020->3002 3028 d2d7c4-d2d7c8 3021->3028 3029 d2d7f9-d2d808 call d12e00 3021->3029 3025 d2d827-d2d82a 3022->3025 3026 d2d82f-d2d834 3022->3026 3023->3010 3024->3023 3030 d2d73c-d2d753 call d115a0 3024->3030 3025->3026 3032 d2d836-d2d842 3026->3032 3033 d2d89b-d2d8b9 3026->3033 3028->3029 3034 d2d7ca-d2d7de call d115a0 3028->3034 3029->3022 3040 d2d755-d2d758 3030->3040 3041 d2d75d-d2d76e 3030->3041 3032->3033 3038 d2d844-d2d84c 3032->3038 3033->2996 3033->2999 3046 d2d7e0-d2d7e3 3034->3046 3047 d2d7e8-d2d7f7 3034->3047 3038->3033 3042 d2d84e-d2d852 3038->3042 3040->3041 3041->3010 3044 d2d854-d2d858 3042->3044 3045 d2d88e-d2d896 call d12e00 3042->3045 3044->3045 3049 d2d85a-d2d871 call d115a0 3044->3049 3045->3033 3046->3047 3047->3022 3052 d2d873-d2d876 3049->3052 3053 d2d87b-d2d88c 3049->3053 3052->3053 3053->3033
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,70CDB3AB,?,00000000), ref: 00D2D58A
                      • GetFileVersionInfoSizeW.KERNELBASE(?,?,?,00000000), ref: 00D2D5A8
                      • GetFileVersionInfoW.KERNELBASE(?,00000000,00000000,00000000), ref: 00D2D5D8
                      • VerQueryValueW.KERNELBASE(00000000,\VarFileInfo\Translation,?,?), ref: 00D2D604
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$InfoInit_thread_footerVersion$HeapModuleNameProcessQuerySizeValue
                      • String ID: PackagerCID$PackagerLID$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                      • API String ID: 2707572544-3816212884
                      • Opcode ID: feb68c5642b69aed5bd12259c8bbc975442f22255ef5d51c1c42dbd1fcf24c27
                      • Instruction ID: e896e7c9984f1b53607ae5368c8e0f0e4a01426b422158f0fa277f8c466997e0
                      • Opcode Fuzzy Hash: feb68c5642b69aed5bd12259c8bbc975442f22255ef5d51c1c42dbd1fcf24c27
                      • Instruction Fuzzy Hash: 37F1B371A006199FDB10DF68D888BAEF7B5FF54318F144199E819E7291DB34AD84CFA0

                      Control-flow Graph

                      APIs
                      • PathFileExistsW.KERNELBASE(00D45778,?,70CDB3AB,00D45778,Execution_x86), ref: 00D27C15
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: AdditionalOptionsForGuiMode$AdditionalOptionsForSilentMode$FileName$ForceElevation$Options$WaitMode$WaitTimeout
                      • API String ID: 1174141254-4188049611
                      • Opcode ID: 2a98b9577860f1cd89359bcec0cfd5202d799c7ec89f7cb5cea3b8ce72717f58
                      • Instruction ID: 0d1fc4426629198f5c1cff542b25d9163ed2add6480d1360ac3e4843d3b16eab
                      • Opcode Fuzzy Hash: 2a98b9577860f1cd89359bcec0cfd5202d799c7ec89f7cb5cea3b8ce72717f58
                      • Instruction Fuzzy Hash: 2D21FB72B001186BCB01AB54AC81ABF7B5EDFA5319F184069FC04A7342DE329E1797F5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3079 d2ff2c-d2ff3c 3080 d2ff56-d2ff58 3079->3080 3081 d2ff3e-d2ff51 call d2efc4 call d2efd7 3079->3081 3083 d302c0-d302cd call d2efc4 call d2efd7 3080->3083 3084 d2ff5e-d2ff64 3080->3084 3095 d302d8 3081->3095 3102 d302d3 call d2eefe 3083->3102 3084->3083 3087 d2ff6a-d2ff95 3084->3087 3087->3083 3090 d2ff9b-d2ffa4 3087->3090 3093 d2ffa6-d2ffb9 call d2efc4 call d2efd7 3090->3093 3094 d2ffbe-d2ffc0 3090->3094 3093->3102 3098 d2ffc6-d2ffca 3094->3098 3099 d302bc-d302be 3094->3099 3101 d302db-d302e0 3095->3101 3098->3099 3100 d2ffd0-d2ffd4 3098->3100 3099->3101 3100->3093 3104 d2ffd6-d2ffed 3100->3104 3102->3095 3107 d3000a-d30013 3104->3107 3108 d2ffef-d2fff2 3104->3108 3112 d30031-d3003b 3107->3112 3113 d30015-d3002c call d2efc4 call d2efd7 call d2eefe 3107->3113 3110 d2fff4-d2fffa 3108->3110 3111 d2fffc-d30005 3108->3111 3110->3111 3110->3113 3114 d300a6-d300c0 3111->3114 3116 d30042-d30060 call d36357 call d359e0 * 2 3112->3116 3117 d3003d-d3003f 3112->3117 3144 d301f3 3113->3144 3120 d300c6-d300d6 3114->3120 3121 d30194-d3019d call d36301 3114->3121 3148 d30062-d30078 call d2efd7 call d2efc4 3116->3148 3149 d3007d-d300a3 call d3109c 3116->3149 3117->3116 3120->3121 3122 d300dc-d300de 3120->3122 3133 d30210 3121->3133 3134 d3019f-d301b1 3121->3134 3122->3121 3126 d300e4-d3010a 3122->3126 3126->3121 3130 d30110-d30123 3126->3130 3130->3121 3135 d30125-d30127 3130->3135 3137 d30214-d3022c ReadFile 3133->3137 3134->3133 3139 d301b3-d301c2 GetConsoleMode 3134->3139 3135->3121 3140 d30129-d30154 3135->3140 3142 d30288-d30293 GetLastError 3137->3142 3143 d3022e-d30234 3137->3143 3139->3133 3145 d301c4-d301c8 3139->3145 3140->3121 3147 d30156-d30169 3140->3147 3150 d30295-d302a7 call d2efd7 call d2efc4 3142->3150 3151 d302ac-d302af 3142->3151 3143->3142 3152 d30236 3143->3152 3146 d301f6-d30200 call d359e0 3144->3146 3145->3137 3153 d301ca-d301e4 ReadConsoleW 3145->3153 3146->3101 3147->3121 3157 d3016b-d3016d 3147->3157 3148->3144 3149->3114 3150->3144 3154 d302b5-d302b7 3151->3154 3155 d301ec-d301f2 call d2efa1 3151->3155 3161 d30239-d3024b 3152->3161 3162 d301e6 GetLastError 3153->3162 3163 d30205-d3020e 3153->3163 3154->3146 3155->3144 3157->3121 3166 d3016f-d3018f 3157->3166 3161->3146 3170 d3024d-d30251 3161->3170 3162->3155 3163->3161 3166->3121 3174 d30253-d30263 call d2fc48 3170->3174 3175 d3026a-d30275 3170->3175 3184 d30266-d30268 3174->3184 3176 d30281-d30286 call d2fa64 3175->3176 3177 d30277 call d2fd98 3175->3177 3185 d3027c-d3027f 3176->3185 3177->3185 3184->3146 3185->3184
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 048f235fcb9d8ec86a230828980a61b143b0a658da8711d3d214dd67c5457a94
                      • Instruction ID: 808e29c2af20830b453c38f6577fcf261ddfaf7c8e48c28bad0e8abeb14a5ef2
                      • Opcode Fuzzy Hash: 048f235fcb9d8ec86a230828980a61b143b0a658da8711d3d214dd67c5457a94
                      • Instruction Fuzzy Hash: DAC1D274A04359AFCF11DFA8E865BAEBFB0AF1A314F184194E940EB392C7709941CB75
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,70CDB3AB,?,00000000), ref: 00D2D58A
                      • GetFileVersionInfoSizeW.KERNELBASE(?,?,?,00000000), ref: 00D2D5A8
                      • GetFileVersionInfoW.KERNELBASE(?,00000000,00000000,00000000), ref: 00D2D5D8
                      • VerQueryValueW.KERNELBASE(00000000,\VarFileInfo\Translation,?,?), ref: 00D2D604
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$InfoInit_thread_footerVersion$HeapModuleNameProcessQuerySizeValue
                      • String ID: PackagerCID$PackagerLID$\VarFileInfo\Translation
                      • API String ID: 2707572544-2772592279
                      • Opcode ID: fbd2bbed7754aac7e4e17ab7371fe932394835e1c801ba59c484e0a1e901e316
                      • Instruction ID: 894148ae8d283ca01794e5fee5dcce82898b28f1ae8cbba76501af256a00ee92
                      • Opcode Fuzzy Hash: fbd2bbed7754aac7e4e17ab7371fe932394835e1c801ba59c484e0a1e901e316
                      • Instruction Fuzzy Hash: 4AC1C331A00619DFDB20DF28D888BA9F7B5FF55318F1842A9E819D7291DB34AD85CF60
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                        • Part of subcall function 00D20690: GetModuleHandleW.KERNEL32(Advapi32.dll,?,000000BC,00000000,?,?,00D1F996,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D206B4
                        • Part of subcall function 00D20690: RegCloseKey.ADVAPI32(00000000,?,000000BC,00000000,?,?,00D1F996,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D20717
                      • RegQueryValueExW.KERNELBASE(00000000,00D4D2B8,00000000,00000001,00000000,?), ref: 00D1D18A
                      • RegCloseKey.KERNELBASE(00000000), ref: 00D1D1FF
                      • RegQueryValueExW.KERNELBASE(00000000,00D4D2B8,00000000,00D1C5B1,00000000,00000000,80000000,70CDB3AB,00D1C5B1,\shell\open\command,00000013), ref: 00D1D25E
                      • RegCloseKey.KERNELBASE(00000000), ref: 00D1D2E5
                      • RegCloseKey.ADVAPI32(00000000,80000000,?,?), ref: 00D1D31D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Close$Init_thread_footerQueryValue$HandleHeapModuleProcess
                      • String ID: \shell\open\command
                      • API String ID: 2189336815-3053425699
                      • Opcode ID: f8aee6302a868b4335a54069b11bbcee82e64b1f761ef8aea186f0b8e5daf7e4
                      • Instruction ID: 8b284285158cd82e4318b1c408e0217268ad463172724205004bbfd904552b7d
                      • Opcode Fuzzy Hash: f8aee6302a868b4335a54069b11bbcee82e64b1f761ef8aea186f0b8e5daf7e4
                      • Instruction Fuzzy Hash: 0A81AA71A00219AFDB14CFA8EC94BEEBBB9EF45304F14412CE911E7290DB78A944CB75
                      APIs
                      • __fread_nolock.LIBCMT ref: 00D17CE0
                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00D17D2A
                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D17D52
                      • __aulldvrm.LIBCMT ref: 00D17D71
                      • __fread_nolock.LIBCMT ref: 00D17DE9
                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00500000,00000000,?,?,?), ref: 00D17E2F
                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,00500000,00000000,?,?,?), ref: 00D17E56
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterLeave__fread_nolock$__aulldvrm
                      • String ID:
                      • API String ID: 209981013-0
                      • Opcode ID: 4edaf15e390278b78a94b40f838a695801668b3de52f5ae70b7c553a1f2ffa0e
                      • Instruction ID: e2f945ca2c8c6ef746f1d10844f7ef5526f7cdcd3bd543699ba6c9ae5a5cee81
                      • Opcode Fuzzy Hash: 4edaf15e390278b78a94b40f838a695801668b3de52f5ae70b7c553a1f2ffa0e
                      • Instruction Fuzzy Hash: 7351A375A0420AEBDF149F54E881BEEBBB5FF44310F18856AF8049B351EB759D808BB1
                      APIs
                      • GetWindowLongW.USER32(?,000000F0), ref: 00D227E7
                      • SetDlgItemTextW.USER32(?,000003F3,00000000), ref: 00D22842
                      • SetWindowLongW.USER32(?,000000F0,?), ref: 00D22876
                      • SendMessageW.USER32(?,0000040A,00000000,00000000), ref: 00D2288F
                      • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 00D228D0
                      • SendMessageW.USER32(?,00000402,00000064,00000000), ref: 00D228E3
                      • SendMessageW.USER32(?,00000410,00000002,00000000), ref: 00D228F1
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                        • Part of subcall function 00D18780: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,?,00D45778), ref: 00D187BE
                        • Part of subcall function 00D18780: FindResourceW.KERNEL32(00000000,?,00000006), ref: 00D18809
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: MessageSend$FindInit_thread_footerLongResourceWindow$HeapItemProcessText
                      • String ID:
                      • API String ID: 1252265373-0
                      • Opcode ID: c95d15568ac940e0c89bb5f56a952fc10e83bef342187646de9b90e1a5414c5e
                      • Instruction ID: 2f154a03d9b311731a6c656e6a13b66faaefabccec191394570f1b568549b2d4
                      • Opcode Fuzzy Hash: c95d15568ac940e0c89bb5f56a952fc10e83bef342187646de9b90e1a5414c5e
                      • Instruction Fuzzy Hash: 7A412670600755FFE7118B24DC85F69BBA0FF01324F184229F6259A5D1CBB0ED60CBA0
                      APIs
                        • Part of subcall function 00D15B20: GetNamedSecurityInfoW.ADVAPI32(?,00000001,00000004,00000000,00000000,00000000,00000000,00000000,?,70CDB3AB), ref: 00D15B86
                      • GetSecurityDescriptorDacl.ADVAPI32(00000000,00000000,00000000,?), ref: 00D152DE
                      • GetAce.ADVAPI32(00000000,00000000,?), ref: 00D1532D
                      • LocalFree.KERNEL32(00000000), ref: 00D153B9
                      • LocalAlloc.KERNEL32(00000000,00000008), ref: 00D153C3
                      • InitializeAcl.ADVAPI32(00000000,00000008,00000002), ref: 00D153D4
                      • GetLastError.KERNEL32 ref: 00D153DE
                      • LocalFree.KERNEL32(00000000), ref: 00D153F8
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Local$FreeSecurity$AllocDaclDescriptorErrorInfoInitializeLastNamed
                      • String ID:
                      • API String ID: 303464733-0
                      • Opcode ID: 863bfbecefa788af4ee3bd09193fd2c36fa55b1785dfa64341cf227217e5a0f6
                      • Instruction ID: ed16e50bf6f35651876518fff337ed9d63ee8c3f12a97383704861c83a793b54
                      • Opcode Fuzzy Hash: 863bfbecefa788af4ee3bd09193fd2c36fa55b1785dfa64341cf227217e5a0f6
                      • Instruction Fuzzy Hash: 73410674A05604FBDB108B64B844BEFBBF8AF92340F084059E855E7385DBB99985CBB0
                      APIs
                      • GetModuleHandleW.KERNEL32(Advapi32.dll,?,000000BC,00000000,?,?,00D1F996,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D206B4
                      • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00D206CB
                      • RegOpenKeyExW.KERNELBASE(000000BC,00020019,00000000,?,00000000,?,000000BC,00000000,?,?,00D1F996,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D20704
                      • RegCloseKey.ADVAPI32(00000000,?,000000BC,00000000,?,?,00D1F996,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D20717
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AddressCloseHandleModuleOpenProc
                      • String ID: Advapi32.dll$RegOpenKeyTransactedW
                      • API String ID: 823179699-3913318428
                      • Opcode ID: 912a74258ebc0a3f3cc8ffc4bf654518636e21834fb75fb637ff0fa73d7d37e1
                      • Instruction ID: bd95f74549fac4d22b61ed366f87fa82d9d420df6f30db1f741425c1e27117b2
                      • Opcode Fuzzy Hash: 912a74258ebc0a3f3cc8ffc4bf654518636e21834fb75fb637ff0fa73d7d37e1
                      • Instruction Fuzzy Hash: 1E11D031601215FBDB208F54EC48F5ABBB9EF68305F188025F905D7291D771E910DB70
                      APIs
                        • Part of subcall function 00D17C70: __fread_nolock.LIBCMT ref: 00D17CE0
                        • Part of subcall function 00D17C70: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00D17D2A
                        • Part of subcall function 00D17C70: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D17D52
                      • CreateFileW.KERNELBASE(?,C0000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,?), ref: 00D17BE8
                      • GetLastError.KERNEL32(?,?,?,?,80004005), ref: 00D17BF0
                      • SetFileTime.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,80004005), ref: 00D17C10
                      • CloseHandle.KERNEL32(00000000,?,?,?,?,80004005), ref: 00D17C1D
                      • GetLastError.KERNEL32(?,?,?,?,80004005), ref: 00D17C2E
                      • CloseHandle.KERNEL32(00000000,?,?,?,?,80004005), ref: 00D17C44
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CloseCriticalErrorFileHandleLastSection$CreateEnterLeaveTime__fread_nolock
                      • String ID:
                      • API String ID: 328854730-0
                      • Opcode ID: bd89c6959bc1fd25508bc1a0115d38d0c672a76982791b2331eef8c3139e745d
                      • Instruction ID: 069ed6057d8a3c34c9026aeafaa32d94f01e60fa2a8c1b24e81bb63ed2470dea
                      • Opcode Fuzzy Hash: bd89c6959bc1fd25508bc1a0115d38d0c672a76982791b2331eef8c3139e745d
                      • Instruction Fuzzy Hash: 7F2105377043147BDB310E59AC05BAA7B76EB40761F140225FE05E62E0EB62AD649BF0
                      APIs
                      • CreateFileW.KERNELBASE(?,C0000000,00000001,00000000,00000003,00000080,00000000), ref: 00D12C10
                      • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 00D12C31
                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00D12C60
                      • SetFileTime.KERNELBASE(00000000,?,00000000,?), ref: 00D12C6F
                      • CloseHandle.KERNEL32(00000000), ref: 00D12C76
                      • SetFileAttributesW.KERNELBASE(?,?), ref: 00D12C83
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$Time$AttributesCloseCreateDateHandleLocal
                      • String ID:
                      • API String ID: 820720069-0
                      • Opcode ID: e7abd0d4e5daeebe780968291b4c9d9931c39e9cfeef48a9a855455d4e656ab2
                      • Instruction ID: 0360583c1cbce167d58fc4a71c469ccfa5bbf9d403dcc9648073a0904394c126
                      • Opcode Fuzzy Hash: e7abd0d4e5daeebe780968291b4c9d9931c39e9cfeef48a9a855455d4e656ab2
                      • Instruction Fuzzy Hash: D5118C35604305BBD711DF24DC48BAB7BA9EF89720F044A19F954D62A0DB709A548AA2
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,70CDB3AB,00000000,00000000,00000000), ref: 00D2D96B
                      • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 00D2D989
                      • GetFileVersionInfoW.KERNELBASE(?,00000000,00000000,00000000), ref: 00D2D9B9
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$InfoInit_thread_footerVersion$HeapModuleNameProcessSize
                      • String ID: ProductName$\VarFileInfo\Translation
                      • API String ID: 374866722-1082745354
                      • Opcode ID: dc7a2a6360f563586a34ae60ccc20f99e528f47f31028dbcf49c9f3236bb4f07
                      • Instruction ID: b9fef218f4580aa7d437f6c3dbf2b3972e426996cf5a6699e48121f5dccdc511
                      • Opcode Fuzzy Hash: dc7a2a6360f563586a34ae60ccc20f99e528f47f31028dbcf49c9f3236bb4f07
                      • Instruction Fuzzy Hash: EBA1D571A006199FCB20DF68EC98BA9B7F5FF55324F1442A9E819D7290DB30AD84CF60
                      APIs
                      • GetModuleHandleW.KERNEL32(Advapi32.dll,70CDB3AB,00000000,00000000,?,?,?,?,00000000,00D44D28,000000FF,?,00D156E1,00000000,?,00000001), ref: 00D159E4
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00D15A19
                      • TreeResetNamedSecurityInfoW.ADVAPI32(?,00000001,20000004,00000000,00000000,00000001,00000000,00D156E1,00000000,00000001,00000000,?), ref: 00D15A68
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AddressHandleInfoModuleNamedProcResetSecurityTree
                      • String ID: Advapi32.dll$foW
                      • API String ID: 4240558307-761691787
                      • Opcode ID: d12c642c07335672d3266635ee1ead3490547d39d0f0961a1171389913d6bde3
                      • Instruction ID: 18e871093ba562c7ce268d5061bef8629c5a75207a36267095bd882e6707dfda
                      • Opcode Fuzzy Hash: d12c642c07335672d3266635ee1ead3490547d39d0f0961a1171389913d6bde3
                      • Instruction Fuzzy Hash: DB318F35E41B19ABD710CF68EC45B9DB7B4FF05720F048355F811A7290EB74A9408BA0
                      APIs
                        • Part of subcall function 00D1DC20: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 00D1DC8A
                      • WaitForSingleObject.KERNEL32(000003E8,000003E8,70CDB3AB), ref: 00D1FBC1
                      • SendMessageW.USER32(00000000,00008116,00000000,00000000), ref: 00D1FCF9
                      • SendMessageW.USER32(00000000,00008116,00000000,00000000), ref: 00D1FD3C
                      • PostMessageW.USER32(00000000,0000811E,00000000,00000000), ref: 00D1FD57
                      • PostMessageW.USER32(?,00008120,00000000,00000000), ref: 00D1FD7A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Message$PostSend$FileModuleNameObjectSingleWait
                      • String ID:
                      • API String ID: 3772598651-0
                      • Opcode ID: bef21c163474575ec0e27095b6a841ebf488b2bd9374790d00cba279332e8c4e
                      • Instruction ID: a4348a7b85a45e0f3d05d680e7937c982f5dc0714a095e98dc5c9483c2792f54
                      • Opcode Fuzzy Hash: bef21c163474575ec0e27095b6a841ebf488b2bd9374790d00cba279332e8c4e
                      • Instruction Fuzzy Hash: 6B71E770604745BBDB21CF28E885BAAB7E6EF45720F18466DE9559B2D1DF30D880CBB0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: __fread_nolock
                      • String ID:
                      • API String ID: 2638373210-0
                      • Opcode ID: c1e3b38c02735ddfd460862a487928dc54cc803e5fa17e6ca5c4c77eebdd6cf7
                      • Instruction ID: 4ca1d12c01ad13dd8e7cddd02053b1138ac62ca82692fde5fad9576dc1bdc966
                      • Opcode Fuzzy Hash: c1e3b38c02735ddfd460862a487928dc54cc803e5fa17e6ca5c4c77eebdd6cf7
                      • Instruction Fuzzy Hash: 86419471D00219ABDF20DE58DC91BEEB7A9FF55310F088955FD18AB280EB71D9808BB1
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                        • Part of subcall function 00D18780: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,?,00D45778), ref: 00D187BE
                        • Part of subcall function 00D18780: FindResourceW.KERNEL32(00000000,?,00000006), ref: 00D18809
                      • SetDlgItemTextW.USER32(00000006,00000002,?), ref: 00D22E95
                      • IsWindow.USER32(?), ref: 00D22E9E
                      • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00D22EAD
                      • GetSystemMenu.USER32(00000006,00000000,?,?,?,00000000,00D45AE8,000000FF,?,00D21549), ref: 00D22EB8
                      • EnableMenuItem.USER32(00000000,0000F060,00000000), ref: 00D22ECA
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: FindInit_thread_footerItemMenuResource$CallbackDispatcherEnableHeapProcessSystemTextUserWindow
                      • String ID:
                      • API String ID: 2041721316-0
                      • Opcode ID: 3c2a0dafa08b96aea9afb27e2e6db3ddb41a79086546b249013e0693627dd1ac
                      • Instruction ID: bf9a87007080fa6b7cce980e85f733e939d08da18918b056ef644aa93fa00f65
                      • Opcode Fuzzy Hash: 3c2a0dafa08b96aea9afb27e2e6db3ddb41a79086546b249013e0693627dd1ac
                      • Instruction Fuzzy Hash: 7421D731600B05BFD7119F64EC1AF6ABBA8FF04721F144629F921D76E0DB71A910CB60
                      APIs
                      • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?), ref: 00D31008
                      • GetLastError.KERNEL32(?,?,?), ref: 00D31012
                      • __dosmaperr.LIBCMT ref: 00D31019
                      • SetFilePointerEx.KERNELBASE(?,?,?,?,?), ref: 00D31037
                      • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 00D3105D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: FilePointer$ErrorLast__dosmaperr
                      • String ID:
                      • API String ID: 1114809156-0
                      • Opcode ID: f4c23f9b4583be1b38f4580999bdc326d0d70dbef90d44a45e7f06c2b607a9bc
                      • Instruction ID: 61ca9fee09eb79219dc7f42790289d1930dc473ae254883dcf8050c1d0fdf7da
                      • Opcode Fuzzy Hash: f4c23f9b4583be1b38f4580999bdc326d0d70dbef90d44a45e7f06c2b607a9bc
                      • Instruction Fuzzy Hash: 7E018C79901269BBCF209FA5DD088EF7F3DEF05760F104295F928962A0C7318A90DBB0
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • GetTempPathW.KERNEL32(00000105,?,?,00000010,?,00000000,00D4527D,000000FF,?,80004005,80004005), ref: 00D1A4B2
                      • PathFileExistsW.KERNELBASE(00000000,?,00000001,?,?,00000010,?,00000000,00D4527D,000000FF,?,80004005,80004005), ref: 00D1A56E
                      • CreateDirectoryW.KERNEL32(00000000,00000000,?,?,00000010,?,00000000,00D4527D,000000FF,?,80004005,80004005), ref: 00D1A57A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Init_thread_footerPath$CreateDirectoryExistsFileHeapProcessTemp
                      • String ID: SPackTool
                      • API String ID: 1121568719-339126481
                      • Opcode ID: 38d0cdc79e87d82e84c87a5b003b6e86f24a4424b7e49cdc5cbad47b26acae3d
                      • Instruction ID: 494510994bbd5139f437b71cc7ba7c26e11550b6a3cb91b412f01863af283b63
                      • Opcode Fuzzy Hash: 38d0cdc79e87d82e84c87a5b003b6e86f24a4424b7e49cdc5cbad47b26acae3d
                      • Instruction Fuzzy Hash: BA41FF71A02601AFEB149F28E859BEEF3A2EF44710F084169E5059B290EF759980CB71
                      APIs
                      • PathFileExistsW.KERNELBASE(?,?,70CDB3AB,?,?,00000000,00D45778,000000FF,?,80004005,70CDB3AB), ref: 00D28491
                      • PathIsDirectoryW.SHLWAPI(?), ref: 00D284A0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Path$DirectoryExistsFile
                      • String ID: Package$ProductName
                      • API String ID: 1302732169-1800297090
                      • Opcode ID: 5a9bdd6c92c27d5f42a0b87d3aae13eba564fcd5ef1c1d3873f6f649befcc696
                      • Instruction ID: 7dbb387e59431812746485b35670132fa16a3b9ec6cca0414ac1b929cb54711b
                      • Opcode Fuzzy Hash: 5a9bdd6c92c27d5f42a0b87d3aae13eba564fcd5ef1c1d3873f6f649befcc696
                      • Instruction Fuzzy Hash: 78119D71601615EBC710DFA9EC85B6ABBA8FB59724F14832EF421D7391DF35A8009BB0
                      APIs
                      Strings
                      • !!!53AAED7C-68E7-413C-A5FD-D9F76477D66A, xrefs: 00D16A7C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: __fread_nolock
                      • String ID: !!!53AAED7C-68E7-413C-A5FD-D9F76477D66A
                      • API String ID: 2638373210-1292548740
                      • Opcode ID: 5743fb7abff1d69542ff11b66e53157634e9d689be8ee593fba9336cdcd7064c
                      • Instruction ID: ae1c5183733f37550155dccd1a2f826b29465944990794c573e68bb525ea43a1
                      • Opcode Fuzzy Hash: 5743fb7abff1d69542ff11b66e53157634e9d689be8ee593fba9336cdcd7064c
                      • Instruction Fuzzy Hash: 25A18271A00209AFDB00DFA8D940BDEB7F5EF55314F188169E815EB245EB31D984CBB0
                      APIs
                      • WaitForSingleObject.KERNEL32(?,00000000,70CDB3AB), ref: 00D12359
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ObjectSingleWait
                      • String ID: W
                      • API String ID: 24740636-2737232454
                      • Opcode ID: 34ae646482d671f5816c51a2e70c70c54cceb6811744e8e6b45bab1b1acc568e
                      • Instruction ID: 5a9090a027646064587a90c5dc0dcc2b1b2e8f9f034d97832f31ebd683446084
                      • Opcode Fuzzy Hash: 34ae646482d671f5816c51a2e70c70c54cceb6811744e8e6b45bab1b1acc568e
                      • Instruction Fuzzy Hash: EBA19070A0150AABDB10DF68DC98BE9F7B5FF54310F188299E41997291EB31EE94CF60
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,00000000), ref: 00D23D1A
                      • SetWindowLongW.USER32(00000001,00000000,00000000), ref: 00D23D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CallbackDispatcherLongUserWindow
                      • String ID: $
                      • API String ID: 2095706538-3993045852
                      • Opcode ID: 68a43232f1c147dc8301eb4b63065fafb0a0d134188fa48f6fe61f9dc528e01d
                      • Instruction ID: 0da1ded19e2b46461f7146f37f8cf48ab9fcbf0d74b98c7791db27862db0a109
                      • Opcode Fuzzy Hash: 68a43232f1c147dc8301eb4b63065fafb0a0d134188fa48f6fe61f9dc528e01d
                      • Instruction Fuzzy Hash: 2F315A75900218ABCF24CF59E48479EBBB1EF58718F28815AE8089B295C378DE55CFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4f849e85d34b290ee65b87c1a66f2721674c3226c8fffa89d5f9bd067347709
                      • Instruction ID: 431237681359f1838a28d0c586f2cc4ae00a8d1d774fc10fe1301e658496d420
                      • Opcode Fuzzy Hash: a4f849e85d34b290ee65b87c1a66f2721674c3226c8fffa89d5f9bd067347709
                      • Instruction Fuzzy Hash: AD51CE71E0021AABDB11DFA8E865FAEBFB8EF15318F180059F504AB292D7319901CB71
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00D11CED
                      • TlsSetValue.KERNEL32(00000001,00000000,?,?,?,?,Function_000349A0,000000FF), ref: 00D11D21
                      • TlsGetValue.KERNEL32(?,?,?,?,Function_000349A0,000000FF), ref: 00D11D31
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Value$CurrentThread
                      • String ID:
                      • API String ID: 1393879374-0
                      • Opcode ID: 207e391c3163a5f01672625201fd23027e46c55a4e2aaa1e497e77c9c99dc316
                      • Instruction ID: ea803571c7e9ee27ce7481f8a8714a69dfacbdf057f93c2d8457731a39efec0c
                      • Opcode Fuzzy Hash: 207e391c3163a5f01672625201fd23027e46c55a4e2aaa1e497e77c9c99dc316
                      • Instruction Fuzzy Hash: 1A515175600902AFE311CF29D948A55F7E5FF45321B58C769E525C76A5EB30EC80CFA0
                      APIs
                      • CloseHandle.KERNELBASE(00000000,00000000,00000000,?,00D30BAF,00000000,00D52558,0000000C), ref: 00D30CE7
                      • GetLastError.KERNEL32(?,00D30BAF,00000000,00D52558,0000000C), ref: 00D30CF1
                      • __dosmaperr.LIBCMT ref: 00D30D1C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CloseErrorHandleLast__dosmaperr
                      • String ID:
                      • API String ID: 2583163307-0
                      • Opcode ID: 15f67b5c786f8116082337cd4230d082eaecd62e344d3072f9f4e14b9032a630
                      • Instruction ID: 0a803311aa56cb2cb7c1a9537c6fb69b7604da92054bdbf26f351d0d34a02e3a
                      • Opcode Fuzzy Hash: 15f67b5c786f8116082337cd4230d082eaecd62e344d3072f9f4e14b9032a630
                      • Instruction Fuzzy Hash: 8B0189336096204AC6241374BD6573E6FA9CF82B30F3D0349F804CB2C2DA21CC8182F0
                      APIs
                      • CreateThread.KERNELBASE(00000000,?,Function_0002392B,00000000,00000000,00000000), ref: 00D33AC8
                      • GetLastError.KERNEL32(?,?,?,00D21F10,00000000,00000000), ref: 00D33AD4
                      • __dosmaperr.LIBCMT ref: 00D33ADB
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CreateErrorLastThread__dosmaperr
                      • String ID:
                      • API String ID: 2744730728-0
                      • Opcode ID: 11080d1ea32cc92ca153ff43be3ff403032bfc7f282562366cb2542e5403a885
                      • Instruction ID: 4e92fc7631bdc960b850e8212bca89f64f067209456a3eeb9857f7222f3b027c
                      • Opcode Fuzzy Hash: 11080d1ea32cc92ca153ff43be3ff403032bfc7f282562366cb2542e5403a885
                      • Instruction Fuzzy Hash: F401BC37108229AFCB25AFA1DD05AAF7F69EF85320F150068F94587250DB72DA11DBB0
                      APIs
                      • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,?,00000000,00000010,00000000,00D525D8,00D525D8,?,00D310B2,?,00000000,00000002,00000000), ref: 00D30FAD
                      • GetLastError.KERNEL32(?,00D310B2,?,00000000,00000002,00000000,?,00D30A14,00000000,00000000,00000000,00000002,00000000,?,00000000), ref: 00D30FB7
                      • __dosmaperr.LIBCMT ref: 00D30FBE
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ErrorFileLastPointer__dosmaperr
                      • String ID:
                      • API String ID: 2336955059-0
                      • Opcode ID: 045e361a883f49026b0e59e098879ce30780647fc9b99c9cb2a397935fd92821
                      • Instruction ID: d12762620a21139c2a88af6336cb705980a99bbb808b816fa15cae5179d037f8
                      • Opcode Fuzzy Hash: 045e361a883f49026b0e59e098879ce30780647fc9b99c9cb2a397935fd92821
                      • Instruction Fuzzy Hash: 57012432614618AFCB259F99EC158AE3F29EF85331F280249F910CB2D0EA31DD018BB0
                      APIs
                      • TlsGetValue.KERNEL32(00000001,?), ref: 00D11A81
                      • SetFileAttributesW.KERNEL32(?,00000080,?), ref: 00D11A96
                      • __wsopen_s.LIBCMT ref: 00D11AB6
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AttributesFileValue__wsopen_s
                      • String ID:
                      • API String ID: 1350581000-0
                      • Opcode ID: 7904fc4f3c40392e366d5e53de8a8346910346630528dc9a371f7147c5158d94
                      • Instruction ID: 7b1e84bbeb18c608a0c53fe9ee7728c375b11268d12a2676889e5a44a2696f6d
                      • Opcode Fuzzy Hash: 7904fc4f3c40392e366d5e53de8a8346910346630528dc9a371f7147c5158d94
                      • Instruction Fuzzy Hash: C3018074A00209ABCB14EF64DC45AEA7778EF15310F044698F95997290DB70AED5CFA0
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00D11F5D
                      • DeleteFileW.KERNEL32(?), ref: 00D122C9
                        • Part of subcall function 00D116F0: __CxxThrowException@8.LIBVCRUNTIME ref: 00D11706
                        • Part of subcall function 00D116F0: HeapAlloc.KERNEL32(?,00000000,?,?,?,00D52C84,?,?,00D136E6,80070057,?,?,?,00D12FB0,?,?), ref: 00D1171B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AllocCurrentDeleteException@8FileHeapThreadThrow
                      • String ID:
                      • API String ID: 276536369-0
                      • Opcode ID: 467e37480c7cb6fd5c1553f92751082925891b26fc45a82d257e2d288e19bf18
                      • Instruction ID: 7713b4f5a6c637de1c6ad93646da753a5b3d3959e8e240507c725a71417c9201
                      • Opcode Fuzzy Hash: 467e37480c7cb6fd5c1553f92751082925891b26fc45a82d257e2d288e19bf18
                      • Instruction Fuzzy Hash: 07D1AD31600705AFD724CF28E889BAAB3F1FF54314F148658E54A97691EB32E995CFA0
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00D11F5D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CurrentThread
                      • String ID:
                      • API String ID: 2882836952-0
                      • Opcode ID: eded8f80f7523502387687017f5f7e5d5988a5b662b9cbedd5046f32eeb1b94b
                      • Instruction ID: 678fe5967f9148156f647c817014aac053fe4b5ff92e9bed0ba1c6d15bb6d9ed
                      • Opcode Fuzzy Hash: eded8f80f7523502387687017f5f7e5d5988a5b662b9cbedd5046f32eeb1b94b
                      • Instruction Fuzzy Hash: 59C19C31600705AFD724CF24E889BAAB3F1FF15314F148659E44A97691EB32E9D5CF60
                      APIs
                      • GetLastError.KERNEL32(00D52678,00000010), ref: 00D3393E
                      • ExitThread.KERNEL32 ref: 00D33945
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ErrorExitLastThread
                      • String ID:
                      • API String ID: 1611280651-0
                      • Opcode ID: fc7979c7565b1c6fcba05c25cbc2435badaa8a83074f8b540be18c41f3bac2e4
                      • Instruction ID: 1aa74f68573eec032f7dc7be925b6f80c735288a764bb14869e1954714a5c6f7
                      • Opcode Fuzzy Hash: fc7979c7565b1c6fcba05c25cbc2435badaa8a83074f8b540be18c41f3bac2e4
                      • Instruction Fuzzy Hash: 4FF0A974900304AFCB04AFB0D90AB6D7B74FF45710F140588F801AB2A2CBB06944DFB0
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00D42B37
                        • Part of subcall function 00D415F8: RaiseException.KERNEL32(?,?,?,?,?,?,?), ref: 00D41658
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00D42B54
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Exception@8Throw$ExceptionRaise
                      • String ID:
                      • API String ID: 3476068407-0
                      • Opcode ID: c08d14f7850ffa4c9c2120366221c36c26e74e3a8681b825060470b7858cbe62
                      • Instruction ID: f3c19c37bf5fc46af15dfca114f57c6561cacb3dcad0ee37f26403eda3ba97ec
                      • Opcode Fuzzy Hash: c08d14f7850ffa4c9c2120366221c36c26e74e3a8681b825060470b7858cbe62
                      • Instruction Fuzzy Hash: AAF0BE3894020DBB8B04BEA4ED5ADACB33CCA00320F904120BD25E18D1EB70EA8D86F0
                      APIs
                      • PathFileExistsW.KERNELBASE(?,00000008,00D1E4B7,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D1FE64
                      • CreateDirectoryW.KERNELBASE(?,00000000,?,00000008,00D1E4B7), ref: 00D1FE70
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CreateDirectoryExistsFilePath
                      • String ID:
                      • API String ID: 2624722123-0
                      • Opcode ID: c85c15a70cff9e00c8f961d343d66d2ba06533ad02aedb3e345d818eb7e21de2
                      • Instruction ID: ed361985fba8658739d150964ca467a93e292377d6c1e105b7e2acda1b991707
                      • Opcode Fuzzy Hash: c85c15a70cff9e00c8f961d343d66d2ba06533ad02aedb3e345d818eb7e21de2
                      • Instruction Fuzzy Hash: 05C08C3221A7307B2E512F747C09AEB339C9F132A130D01A6F801C2229EB908EC325F4
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 547b9d3942d9302d61c2489017d13f62519e86ce4d6c7339f332d6fe9d214fb0
                      • Instruction ID: dc102fc85a15879ce2cafade15897528a9e4b3796023635921615b143b04c9ce
                      • Opcode Fuzzy Hash: 547b9d3942d9302d61c2489017d13f62519e86ce4d6c7339f332d6fe9d214fb0
                      • Instruction Fuzzy Hash: 1151D479A00259AFDB10CF68C841EA97BB5EF85364F198168E8499B391C731ED42CBB0
                      APIs
                      • PostMessageW.USER32(?,00008115,?,00000000), ref: 00D1E7EA
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 5ba5da73776e69eb224e393582df4d06a3db3504408f46d2084778e25a60f5e3
                      • Instruction ID: 2921c76010ac4c7a72454f4170449eebf01d2ad34e915b27e2f061fc00dad713
                      • Opcode Fuzzy Hash: 5ba5da73776e69eb224e393582df4d06a3db3504408f46d2084778e25a60f5e3
                      • Instruction Fuzzy Hash: 3B11DA30640605ABFB248B58A8C57ADB3A5EB84724F28436AED15AB2D2CF356CC1C774
                      APIs
                      • GetNamedSecurityInfoW.ADVAPI32(?,00000001,00000004,00000000,00000000,00000000,00000000,00000000,?,70CDB3AB), ref: 00D15B86
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: InfoNamedSecurity
                      • String ID:
                      • API String ID: 1443090519-0
                      • Opcode ID: e9076c2db63c378bf64d4d102ea92e09f2c5ba475ef56ebcfa3b9fe56622aebb
                      • Instruction ID: 89d7f9e493b7c650796acdaa68fb8c79b89f8e07d56114f173489e1ee6d7dba5
                      • Opcode Fuzzy Hash: e9076c2db63c378bf64d4d102ea92e09f2c5ba475ef56ebcfa3b9fe56622aebb
                      • Instruction Fuzzy Hash: 5E119031A00605AFD720CF58DC45FAAF7B8EB85720F204769F825E73D0DB75A9048B60
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: __wsopen_s
                      • String ID:
                      • API String ID: 3347428461-0
                      • Opcode ID: 22a7f07ef3925f1fd86ca61bc1bdab885ff9f32ed90bac70dd5b566d4cf24e5c
                      • Instruction ID: 0312a07d96f2df39c0250cb0ca131075d38244e2e3d500809178619c713d7a71
                      • Opcode Fuzzy Hash: 22a7f07ef3925f1fd86ca61bc1bdab885ff9f32ed90bac70dd5b566d4cf24e5c
                      • Instruction Fuzzy Hash: 4A111871A0420AAFCB05DF58E94199ABBF5EF48310F1444A9F809EB351D631DA258B75
                      APIs
                      • RegQueryValueExW.KERNELBASE(00000000,00D4D2B8,00000000,00000000,00000000,?,00000000,70CDB3AB,?,00D1D2A7,00000000,?,00D1C5B1), ref: 00D2063A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 0dae8f5dfc396b89dbe79c59eea6437211354e3605d61112e87d25eda769eaa3
                      • Instruction ID: 06523744cf8f83d9d47b4dc6b10a44d005e042242e21a1be08f5ee5c367247c8
                      • Opcode Fuzzy Hash: 0dae8f5dfc396b89dbe79c59eea6437211354e3605d61112e87d25eda769eaa3
                      • Instruction Fuzzy Hash: BE0171326002259BDB248F59E841FAAB7A8EFA4715F18442AED14C7291D3B1D860C7E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4f407dd03f602743dff2079fdc306f43a2bce5ca4ed51b34785bbfad9e7900a3
                      • Instruction ID: 26baa46daada1279504dd552e5027d38b9840c28a1096aefd29cfe12e71b9d23
                      • Opcode Fuzzy Hash: 4f407dd03f602743dff2079fdc306f43a2bce5ca4ed51b34785bbfad9e7900a3
                      • Instruction Fuzzy Hash: A4F0C83E500A246AD6223A69AC03B5B3B98CF42374F158715F864D75D2CEB4E90297BD
                      APIs
                      • RtlAllocateHeap.NTDLL(00000000,00D42D2F,?,?,00D41564,?,?,?,?,?,00D42CC0,00D42D2F,?,?,?,?), ref: 00D36389
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: 2360420286ab3f018b898826e140c47c20abb1d966afc7bdf5e7f91c3e93d35c
                      • Instruction ID: 6d3e40018f9b5d7122cac877c994a67a5b4d73b45fb11bddfb27d8f2b3896d67
                      • Opcode Fuzzy Hash: 2360420286ab3f018b898826e140c47c20abb1d966afc7bdf5e7f91c3e93d35c
                      • Instruction Fuzzy Hash: B5E09231205324BBEB213AA5AC04B9A7A88DF827B0F2E8120FC49DB1D0DB61DC4085F1
                      APIs
                      • LookupAccountSidW.ADVAPI32(00000000,-00000008,?,00000100,?,?,?), ref: 00D15B07
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AccountLookup
                      • String ID:
                      • API String ID: 4168731179-0
                      • Opcode ID: 1afef272e2d43a8b81e3739848559f03ab19dc32762a30d6fd6c842cec4135b2
                      • Instruction ID: a0511f35712f1a050ce519413d664b3093736b2f324dc4da44ca9bb08d132f18
                      • Opcode Fuzzy Hash: 1afef272e2d43a8b81e3739848559f03ab19dc32762a30d6fd6c842cec4135b2
                      • Instruction Fuzzy Hash: B4F012B590131C9BD711DF50DC49BDBB7BCEB04300F1042DAA859D2241DA746E888EA0
                      APIs
                      • CreateFileW.KERNELBASE(00000000,00000000,?,00D2F66D,?,?,00000000,?,00D2F66D,00000000,0000000C), ref: 00D2F320
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 60df5843aac4221d648910f79729a2d328cc2f2db55d1e07d7dc04e4cf692faf
                      • Instruction ID: c8f6d7d5d587b0b10488c7e11dc79a56819fad9b61aa2508e96ad20720de3209
                      • Opcode Fuzzy Hash: 60df5843aac4221d648910f79729a2d328cc2f2db55d1e07d7dc04e4cf692faf
                      • Instruction Fuzzy Hash: A4D06C3200020DBFDF128F84DC06EDA3BAAFB48714F014000BA1896160C732E861AB90
                      APIs
                      • TlsGetValue.KERNEL32(00000001), ref: 00D11BD0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 9db1aa600665f5a6ea7e741822f274f8a8bc8f42e0f91a2c108bf4e1a1cec67f
                      • Instruction ID: e43488d35136769993ecc3b79cfe05e742c32f0a01478a56741c065cd0ebe47c
                      • Opcode Fuzzy Hash: 9db1aa600665f5a6ea7e741822f274f8a8bc8f42e0f91a2c108bf4e1a1cec67f
                      • Instruction Fuzzy Hash: 67D0C9342043086B8F081B78AC0586937A9AB197257404A14F92AC62A0EB31D8A18664
                      APIs
                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,00000000,70CDB3AB,74DEDFCE,00000000,?), ref: 00D2BF2E
                      • ResetEvent.KERNEL32(?), ref: 00D2BF3F
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D2BF92
                      • GetLastError.KERNEL32 ref: 00D2BF9A
                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,00000000), ref: 00D2BFB3
                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D2C005
                      • Process32FirstW.KERNEL32(00000000,?), ref: 00D2C028
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00D2C0AA
                      • CloseHandle.KERNEL32(00000000), ref: 00D2C0B9
                      • __dtol3.LIBCMT ref: 00D2C127
                      • __dtol3.LIBCMT ref: 00D2C142
                      • EnterCriticalSection.KERNEL32(?), ref: 00D2C165
                      • CloseHandle.KERNEL32(00000000), ref: 00D2C233
                      • LeaveCriticalSection.KERNEL32(?), ref: 00D2C28C
                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,00000000), ref: 00D2C2A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Wait$MultipleObjects$CloseCriticalHandleProcess32Section__dtol3$CreateEnterErrorEventFirstLastLeaveNextObjectResetSingleSnapshotToolhelp32
                      • String ID:
                      • API String ID: 2898051543-0
                      • Opcode ID: 18ecfca1edee7ed565f4b96e58503e5cb8545a737e27cd638b8ef6bdb31667aa
                      • Instruction ID: 4a7c8dee27aaa98d387c68d0f011213179aeae240b28526a13851392c3bfd222
                      • Opcode Fuzzy Hash: 18ecfca1edee7ed565f4b96e58503e5cb8545a737e27cd638b8ef6bdb31667aa
                      • Instruction Fuzzy Hash: 57424D30A113298FDB20DF54DC88B6DB7B5EF65318F1851D9D409AB2A1DB70AD85CF60
                      APIs
                      • _wcsrchr.LIBVCRUNTIME ref: 00D1B3BA
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00D1B454
                      • DeleteFileW.KERNEL32(00000010,?,?,?,?,?,?,?,?,00000000), ref: 00D1B654
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00D1B65C
                      • GetFileAttributesW.KERNEL32(00000010,?,?,?,?,?,?,?,?,00000000), ref: 00D1B66C
                      • SetFileAttributesW.KERNEL32(00000010,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00D1B682
                      • DeleteFileW.KERNEL32(00000010,?,?,?,?,?,?,?,?,00000000), ref: 00D1B689
                        • Part of subcall function 00D116F0: __CxxThrowException@8.LIBVCRUNTIME ref: 00D11706
                        • Part of subcall function 00D116F0: HeapAlloc.KERNEL32(?,00000000,?,?,?,00D52C84,?,?,00D136E6,80070057,?,?,?,00D12FB0,?,?), ref: 00D1171B
                      • FindNextFileW.KERNEL32(000000FF,?,?,?,?,?,?,00000000), ref: 00D1B69D
                      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00D1B6AB
                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,00000000), ref: 00D1B6B2
                      • RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00000000), ref: 00D1B6C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$Find$AttributesDeleteErrorLast$AllocCloseDirectoryException@8FirstHeapNextRemoveThrow_wcsrchr
                      • String ID:
                      • API String ID: 1402220867-0
                      • Opcode ID: 95efc7d7f6e8b6c45a8f5c527b0449736866491b0ee4ecac7f2db6504423b215
                      • Instruction ID: 1ab5ff267d3c9119f12ee5b3569578b317c435e2027373bf790d91fce175aae4
                      • Opcode Fuzzy Hash: 95efc7d7f6e8b6c45a8f5c527b0449736866491b0ee4ecac7f2db6504423b215
                      • Instruction Fuzzy Hash: 1AC1B230A04616AFDB24EF24DC48BA9B3B1FF51324F184299E4199B291DF319E85CF60
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000C,00D2E594,?,00000000,00D23C5D,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E68A
                      • GetProcessHeap.KERNEL32(00000008,00000008,00000000,?,0000000C,00D2E594,?,00000000,00D23C5D,?,?,80004005,80004005,?,00D230FB,?), ref: 00D2E6B0
                      • HeapAlloc.KERNEL32(00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E6B7
                      • InitializeSListHead.KERNEL32(00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E6C4
                      • GetProcessHeap.KERNEL32(00000000,00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E6D9
                      • HeapFree.KERNEL32(00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D2E6E0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
                      • String ID: X[x
                      • API String ID: 1475849761-2592070539
                      • Opcode ID: 0c8c9c8f7db3b50aea7f722c5beb44f7a8c756a4b2d307447efa41481d0f9ce2
                      • Instruction ID: fef615e5a80a1f3604f43018683b231c1db50b0b5e092aa49bca9c88d568ddd3
                      • Opcode Fuzzy Hash: 0c8c9c8f7db3b50aea7f722c5beb44f7a8c756a4b2d307447efa41481d0f9ce2
                      • Instruction Fuzzy Hash: 61F062356457119BEB219F79BC08B1677F8EFA5717F190869F995D3390DB70840086B0
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: 7dce635ba7f5d401cca2635f4705057b58689ce5253567bd79388c193500d6dd
                      • Instruction ID: 00711a9bbfd8fb287cf1285753f23dcbc72fa5fa53cac29e47788709209e8e73
                      • Opcode Fuzzy Hash: 7dce635ba7f5d401cca2635f4705057b58689ce5253567bd79388c193500d6dd
                      • Instruction Fuzzy Hash: 94C25D72E046288FDB25CF28DD407EAB7B5EB44315F1941EAD48DE7240E778AE818F61
                      APIs
                      • GetSystemDirectoryW.KERNEL32(00000010,00000104), ref: 00D111B8
                      • LoadLibraryW.KERNEL32(?), ref: 00D1122E
                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D1127A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AddressDirectoryLibraryLoadProcSystem
                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                      • API String ID: 1849391631-3689287502
                      • Opcode ID: fd7c4870cd8946546f98359930205a48459db51ad174b7731f0d953471f9fe8a
                      • Instruction ID: 3fbf1bb4c91b40e8ea86fbfa0b668371149faeb6c3e09fbfb405a8547f61d699
                      • Opcode Fuzzy Hash: fd7c4870cd8946546f98359930205a48459db51ad174b7731f0d953471f9fe8a
                      • Instruction Fuzzy Hash: 1B41F235A01606AFD700DF68EC45B9AF7B4FF00321F18426DEA24D7390EB749984CBA0
                      APIs
                      • _wcsrchr.LIBVCRUNTIME ref: 00D24398
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000250,000000BC), ref: 00D2443B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: FileFindFirst_wcsrchr
                      • String ID:
                      • API String ID: 2346706130-0
                      • Opcode ID: 70071b3a12100e61eca742e342a6651e9f5f9d2650e5552dddd660f87e2661a8
                      • Instruction ID: 76c8162c37db0e4ca3a5c79024b21f0acda3b10a9f294e8414c5f40284973d19
                      • Opcode Fuzzy Hash: 70071b3a12100e61eca742e342a6651e9f5f9d2650e5552dddd660f87e2661a8
                      • Instruction Fuzzy Hash: 2BC1D534901225DFDB24DF24D848BADB7B1FF25318F1842D9E8599B291DB31AE85CFA0
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000105,?,74DF18A0), ref: 00D261A3
                      • PathFileExistsW.SHLWAPI(?), ref: 00D26270
                        • Part of subcall function 00D41DCD: ___report_securityfailure.LIBCMT ref: 00D41DD2
                        • Part of subcall function 00D262C0: FormatMessageW.KERNEL32(00002400,?,00000000,00000000,?,00000400,?,?,00D262B8,?), ref: 00D2631C
                        • Part of subcall function 00D262C0: ExitProcess.KERNEL32 ref: 00D26358
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$ExistsExitFormatMessageModuleNamePathProcess___report_securityfailure
                      • String ID: \
                      • API String ID: 2526623405-2967466578
                      • Opcode ID: e50e165a89059ebb6f03aaeb76198cbd6db79af248e4e5ee6e0af8c2c0e5dd10
                      • Instruction ID: 5d8a73d8dbccabd0a3643522f2148cd334e0160b21e3ad7818f4d695c08d0911
                      • Opcode Fuzzy Hash: e50e165a89059ebb6f03aaeb76198cbd6db79af248e4e5ee6e0af8c2c0e5dd10
                      • Instruction Fuzzy Hash: 39319335900319DBDB20DF64EC89BEA73B4FF64305F4909A9E819D7241EA70EE448BB4
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00D2EE2C
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00D2EE36
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00D2EE43
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: cd0fd5314887fd29a919820390f03d15b2f94aa143996d3a0c96271ed323be5a
                      • Instruction ID: 5f7bf6735572e55953b991dbdaf971e13e145c30338b8d3cdf8c80fbb906bcf6
                      • Opcode Fuzzy Hash: cd0fd5314887fd29a919820390f03d15b2f94aa143996d3a0c96271ed323be5a
                      • Instruction Fuzzy Hash: 3C31B47590122CABCB21DF64D889799BBB4FF18310F5045EAE81CA6260E7709B858F64
                      APIs
                      • GetCurrentProcess.KERNEL32(00000003,?,00D3832D,00000003,00D527E0,0000000C,00D38484,00000003,00000002,00000000,?,00D38C28,00000003), ref: 00D38378
                      • TerminateProcess.KERNEL32(00000000,?,00D3832D,00000003,00D527E0,0000000C,00D38484,00000003,00000002,00000000,?,00D38C28,00000003), ref: 00D3837F
                      • ExitProcess.KERNEL32 ref: 00D38391
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: f124ad5dda26fc48b2ba3992d0be6c0539982bc32326d66bd1da18dd32f1b909
                      • Instruction ID: 8fd9fa24e320fb79daa9cd9ff2fcb9937d182c6e5c3ca7ef6a2173e2a8e19eec
                      • Opcode Fuzzy Hash: f124ad5dda26fc48b2ba3992d0be6c0539982bc32326d66bd1da18dd32f1b909
                      • Instruction Fuzzy Hash: 72E09235004348AFCB116F64D909A593B69EF45741F080514F905DA231DF75DD46EAB0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b6577380b73edbc4b63dbb8dd09a5e825a3226a4ce9f38be01e8e5c6190e2d4f
                      • Instruction ID: 07967fdd111f5562f4b1c8eec02b40f05a15fb752c687db6967c833b457ef050
                      • Opcode Fuzzy Hash: b6577380b73edbc4b63dbb8dd09a5e825a3226a4ce9f38be01e8e5c6190e2d4f
                      • Instruction Fuzzy Hash: C3023D71E016199FDF18CFA9D8806AEB7F1FF48314F298169D819EB344D731AA418BA4
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • GetLocaleInfoW.KERNEL32(?,00000059,-00000010,00000055,?,?,?,?,?,?), ref: 00D27498
                      • GetLocaleInfoW.KERNEL32(00000055,0000005A,00000010,00000055,?,?,?,?,?,?), ref: 00D27521
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: InfoInit_thread_footerLocale$HeapProcess
                      • String ID:
                      • API String ID: 1688948774-0
                      • Opcode ID: d8a2b072e8caf622a898955ea07d8d2daff796cc25cf207f0e952828248c29f3
                      • Instruction ID: 902d6fca4c501121192002aed3bcd131f2bb727bb510355c53d42ec0ec988266
                      • Opcode Fuzzy Hash: d8a2b072e8caf622a898955ea07d8d2daff796cc25cf207f0e952828248c29f3
                      • Instruction Fuzzy Hash: 58A1C130A00A169FDB14DF68D894AAEF7B1FF54315F188269E501AB391DB35AD40CFB1
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D3E276,?,?,00000008,?,?,00D3DE8B,00000000), ref: 00D3E4A8
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 756e61a6746402f6f40965048e00eb7c61413651fa870ae8449eed31ad99e4ae
                      • Instruction ID: a250bc7488881f8c21ad8149e2631ec3d03a426ca907a2714cd41e5995711aaf
                      • Opcode Fuzzy Hash: 756e61a6746402f6f40965048e00eb7c61413651fa870ae8449eed31ad99e4ae
                      • Instruction Fuzzy Hash: AFB11731610609DFDB19CF28C48AB657BA0FF49365F298658E8DACF2E1C335E981CB50
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00032434,00D41F68), ref: 00D4242D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 2bb4f9bb5b2bccc48c255fdef3da659192d384df430040d3c113a0f0b842585f
                      • Instruction ID: 1504e0cd157e88b6740dea9e94f6df8ba9fc4aff07086d1bc56667b8154841d5
                      • Opcode Fuzzy Hash: 2bb4f9bb5b2bccc48c255fdef3da659192d384df430040d3c113a0f0b842585f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 083147a5da8526bdb83dd6901ea744af8df62b964b145b96448c638da553af26
                      • Instruction ID: 53567a4d71d1223348f14bdc06f14637210050473d10cc29b0fd30053fc5cddc
                      • Opcode Fuzzy Hash: 083147a5da8526bdb83dd6901ea744af8df62b964b145b96448c638da553af26
                      • Instruction Fuzzy Hash: EA616872E0070967DA389E6A4E96BBE63B4EF01744F1C451AF882DB291D611EE42C375
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1677516f7373781ef9d4a44839d3ede3a2748da950797cbd942917065d14b12e
                      • Instruction ID: c07b39908a6bfb4b846254f4b3027af614e3e7642a3a822fd0817a4eebfc261c
                      • Opcode Fuzzy Hash: 1677516f7373781ef9d4a44839d3ede3a2748da950797cbd942917065d14b12e
                      • Instruction Fuzzy Hash: EFF08C32648A489FD301CF28D844B55F7E8FB49724F1087AAE829C7B90EB35A8008A90
                      APIs
                      • InterlockedIncrement.KERNEL32(?), ref: 00D22F89
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: IncrementInterlocked
                      • String ID: ...$C
                      • API String ID: 3508698243-3570410515
                      • Opcode ID: e5506c1ae59b4ca40217bec64f341491c4f60b954fe30e3ce241c27d3cec9785
                      • Instruction ID: c41dcdb2d496e9d3808e433691d53a541131a8267fd7e51ddfde5758d0a9f2ff
                      • Opcode Fuzzy Hash: e5506c1ae59b4ca40217bec64f341491c4f60b954fe30e3ce241c27d3cec9785
                      • Instruction Fuzzy Hash: A7129EB0A012199FDB20DF68DC98B99B7B8FF54314F0442E9E509A7291DB34AF84CF64
                      APIs
                      • RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted,00000000,00020006,00D1D8B5,?,8004000B,00000000), ref: 00D1DAB9
                      • RegDeleteValueW.ADVAPI32(00000000,?,?,8004000B,00000000), ref: 00D1DACF
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1DAE7
                      • RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers,00000000,00020006,00000000,?,8004000B,00000000), ref: 00D1DB12
                      • RegDeleteValueW.ADVAPI32(00000000,?,?,8004000B,00000000), ref: 00D1DB22
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1DB3A
                      • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers,00000000,00020006,00000000,?,8004000B,00000000), ref: 00D1DB65
                      • RegDeleteValueW.ADVAPI32(00000000,?,?,8004000B,00000000), ref: 00D1DB75
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1DB8D
                      • GetNativeSystemInfo.KERNEL32(?,?,8004000B,00000000), ref: 00D1DBA7
                      • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers,00000000,00020106,00000000,?,8004000B,00000000), ref: 00D1DBDC
                      • RegDeleteValueW.ADVAPI32(00000000,?,?,8004000B,00000000), ref: 00D1DBEA
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1DC02
                      Strings
                      • SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers, xrefs: 00D1DB08, 00D1DB5B, 00D1DBD2
                      • SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted, xrefs: 00D1DAAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CloseDeleteOpenValue$InfoNativeSystem
                      • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted$SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
                      • API String ID: 3037930393-3357135698
                      • Opcode ID: 0014a6b6550e02b07a273b32bfd13daee3a862a762d4c42aa0a1ce4a34a58153
                      • Instruction ID: 123b769b5c1067680a329812cfe5172c8f282c1854c2a9ed01cdc382c8ff9d92
                      • Opcode Fuzzy Hash: 0014a6b6550e02b07a273b32bfd13daee3a862a762d4c42aa0a1ce4a34a58153
                      • Instruction Fuzzy Hash: 8F41CA34A45314FBDF288AA9AD8ABEE76FBEF85301F144066F806E1160DB704D449670
                      APIs
                      • RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted,00000000,00020019,00D1D8A6,?,8004000B,00000000), ref: 00D1D96F
                      • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,?,8004000B,00000000), ref: 00D1D97D
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1D993
                      • RegOpenKeyExW.ADVAPI32(80000001,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers,00000000,00020019,00000000,?,8004000B,00000000), ref: 00D1D9B5
                      • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,?,8004000B,00000000), ref: 00D1D9C3
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1D9D9
                      • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers,00000000,00020019,00000000,?,8004000B,00000000), ref: 00D1D9FB
                      • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,?,8004000B,00000000), ref: 00D1DA09
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1DA1F
                      • GetNativeSystemInfo.KERNEL32(?,?,8004000B,00000000), ref: 00D1DA30
                      • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers,00000000,00020119,00000000,?,8004000B,00000000), ref: 00D1DA5C
                      • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,?,8004000B,00000000), ref: 00D1DA6A
                      • RegCloseKey.ADVAPI32(00000000,?,8004000B,00000000), ref: 00D1DA80
                      Strings
                      • SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers, xrefs: 00D1D9AB, 00D1D9F1, 00D1DA52
                      • SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted, xrefs: 00D1D95A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CloseOpenQueryValue$InfoNativeSystem
                      • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted$SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
                      • API String ID: 3098212041-3357135698
                      • Opcode ID: 99f382a3ab46edce2d2c64988b506e8ad9665b8f4e75d638b541ea8ae5926af6
                      • Instruction ID: d4b7d81bff8a4ae234e9fb2b049ee73dac4172572b44f8a3cb845c22b80e5abd
                      • Opcode Fuzzy Hash: 99f382a3ab46edce2d2c64988b506e8ad9665b8f4e75d638b541ea8ae5926af6
                      • Instruction Fuzzy Hash: E8314B75A41318FFFB209FA19D49FFA7ABDEB09705F500055BD04E2190DB748E04AAB0
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll,70CDB3AB,?,?,?), ref: 00D1D3D5
                      • GetProcAddress.KERNEL32(00000000,IsWow64Process2), ref: 00D1D403
                      • GetCurrentProcess.KERNEL32(00000000,00000000), ref: 00D1D421
                      • GetProcAddress.KERNEL32(?,IsWow64GuestMachineSupported), ref: 00D1D469
                      • FreeLibrary.KERNEL32(?), ref: 00D1D52A
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000100,?,?,?), ref: 00D1D58A
                      • GetNativeSystemInfo.KERNEL32(?), ref: 00D1D5B0
                      • EnterCriticalSection.KERNEL32(00D56B68), ref: 00D1D678
                      • LeaveCriticalSection.KERNEL32(00D56B68), ref: 00D1D6F4
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,?,?), ref: 00D1D895
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Module$AddressCriticalFileNameProcSection$CurrentEnterFreeHandleInfoLeaveLibraryNativeProcessSystem
                      • String ID: IsWow64GuestMachineSupported$IsWow64Process2$Sony Corporation$kernel32.dll
                      • API String ID: 4244204107-2597118593
                      • Opcode ID: 9a1866619576bb4df56e6f95f0fd4c715a89fe9eda8ceab4fa9df4910cdc6a28
                      • Instruction ID: cf12a35bd84a8a6e8d3fab37c04dd46cd1942e4ffc0799b6ec4384fab474e679
                      • Opcode Fuzzy Hash: 9a1866619576bb4df56e6f95f0fd4c715a89fe9eda8ceab4fa9df4910cdc6a28
                      • Instruction Fuzzy Hash: 9DF1B5B0A00215ABEB20DF64E884BE9B7B6FF15314F480199E949A7281DF74ADC4CF75
                      APIs
                      • PathFindExtensionW.SHLWAPI(?,00000000,?,?,?,80070002,70CDB3AB,?), ref: 00D14AA5
                      • CompareStringW.KERNEL32(0000007F,00000001,00000000,000000FF,.exe,000000FF,?,80070002,70CDB3AB,?), ref: 00D14ACF
                      • CompareStringW.KERNEL32(0000007F,00000001,00000000,000000FF,.dll,000000FF,?,80070002,70CDB3AB,?), ref: 00D14AF8
                      • CompareStringW.KERNEL32(0000007F,00000001,00000000,000000FF,.sys,000000FF,?,80070002,70CDB3AB,?), ref: 00D14B21
                      • CompareStringW.KERNEL32(0000007F,00000001,00000000,000000FF,.cab,000000FF,?,80070002,70CDB3AB,?), ref: 00D14B42
                      • CompareStringW.KERNEL32(0000007F,00000001,00000000,000000FF,.ini,000000FF,?,80070002,70CDB3AB,?), ref: 00D14B63
                      • CompareStringW.KERNEL32(0000007F,00000001,00000000,000000FF,.msi,000000FF,?,80070002,70CDB3AB,?), ref: 00D14B84
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CompareString$ExtensionFindPath
                      • String ID: .cab$.dll$.exe$.ini$.msi$.sys
                      • API String ID: 1827704098-1439086709
                      • Opcode ID: 79d118c381862a39df4c3418b27e54485ee24d7f8c23bdff01f1467c9fb23ce0
                      • Instruction ID: f17265734a9393a1335fc4444c8207b3bba0728ab3c898bb1598b3e048c66a2e
                      • Opcode Fuzzy Hash: 79d118c381862a39df4c3418b27e54485ee24d7f8c23bdff01f1467c9fb23ce0
                      • Instruction Fuzzy Hash: 3131A33174C381BBDB204B1CED49FAA35619B42734F3803A5B979A73E5CE7498848570
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • GetSystemDirectoryW.KERNEL32(00000010,00000105), ref: 00D2406D
                      • LoadLibraryW.KERNEL32(00000000,Rstrtmgr.dll,0000000C), ref: 00D24142
                      • GetProcAddress.KERNEL32(00000000,RmStartSession), ref: 00D2415B
                      • GetProcAddress.KERNEL32(00000001,RmRegisterResources), ref: 00D24168
                      • GetProcAddress.KERNEL32(00000001,RmGetList), ref: 00D24175
                      • GetProcAddress.KERNEL32(00000001,RmEndSession), ref: 00D24182
                      • FreeLibrary.KERNEL32(00000001), ref: 00D241C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AddressProc$Init_thread_footerLibrary$DirectoryFreeHeapLoadProcessSystem
                      • String ID: RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr.dll
                      • API String ID: 4048991055-3940193402
                      • Opcode ID: 94a41b03042874b25c6453a43f668d5a4b0bee60f8da2f605aca74274ed0783d
                      • Instruction ID: 473ed6b470a2d3a359cf219aee8313d64154b4df37536cbd356cbefbccf903c7
                      • Opcode Fuzzy Hash: 94a41b03042874b25c6453a43f668d5a4b0bee60f8da2f605aca74274ed0783d
                      • Instruction Fuzzy Hash: DA71DD31900316DBEB11DF68D849BAEBBB1FF20318F084558E910AB2D5DBB59984CFB0
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 00D38CEA
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B52B
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B53D
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B54F
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B561
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B573
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B585
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B597
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B5A9
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B5BB
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B5CD
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B5DF
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B5F1
                        • Part of subcall function 00D3B50E: _free.LIBCMT ref: 00D3B603
                      • _free.LIBCMT ref: 00D38CDF
                        • Part of subcall function 00D359E0: RtlFreeHeap.NTDLL(00000000,00000000,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105), ref: 00D359F6
                        • Part of subcall function 00D359E0: GetLastError.KERNEL32(00000105,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105,00000105), ref: 00D35A08
                      • _free.LIBCMT ref: 00D38D01
                      • _free.LIBCMT ref: 00D38D16
                      • _free.LIBCMT ref: 00D38D21
                      • _free.LIBCMT ref: 00D38D43
                      • _free.LIBCMT ref: 00D38D56
                      • _free.LIBCMT ref: 00D38D64
                      • _free.LIBCMT ref: 00D38D6F
                      • _free.LIBCMT ref: 00D38DA7
                      • _free.LIBCMT ref: 00D38DAE
                      • _free.LIBCMT ref: 00D38DCB
                      • _free.LIBCMT ref: 00D38DE3
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID:
                      • API String ID: 161543041-0
                      • Opcode ID: 9a4d76235b78ea379a7d9a1c4eedf1430ce15bfd7963dd64fcfd0495eb374271
                      • Instruction ID: 73e2d45247f58c4576d3e1a003994301b01bbe392d6d708be3ac714126f029e0
                      • Opcode Fuzzy Hash: 9a4d76235b78ea379a7d9a1c4eedf1430ce15bfd7963dd64fcfd0495eb374271
                      • Instruction Fuzzy Hash: F4314931600B05DFEB21AA38F846B5AB3E8EF103A0F59442AF458D7195DF71AD90EB34
                      APIs
                      • GetSystemTime.KERNEL32(?,?,?,00000000), ref: 00D2A188
                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,00000000), ref: 00D2A1A2
                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,00000000), ref: 00D2A1CE
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 00D2A1DE
                      • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,00000000), ref: 00D2A1FD
                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?,?,?,00000000), ref: 00D2A216
                      • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 00D2A21D
                      • FileTimeToSystemTime.KERNEL32(?,?,?,?,00000000), ref: 00D2A26D
                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,00000000), ref: 00D2A28B
                      • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,00000000), ref: 00D2A2E8
                      • FileTimeToSystemTime.KERNEL32(?,?,?,?,00000000), ref: 00D2A2FB
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Time$File$System$CloseCreateHandleLocalModuleName
                      • String ID:
                      • API String ID: 730736748-0
                      • Opcode ID: 3d86327bd285ab1c47736e61e83daa27212f8bc23b043da90e74c7d44c95fe4b
                      • Instruction ID: 6fb1a2e4154344d60e74f765e3352579b3c72d33110ffc1c5b56787e1745d56b
                      • Opcode Fuzzy Hash: 3d86327bd285ab1c47736e61e83daa27212f8bc23b043da90e74c7d44c95fe4b
                      • Instruction Fuzzy Hash: 4B5109759013299BCB20DFA8DC88BD9B7B8FB19305F1411EAE509A6250DB34AF84CF65
                      APIs
                      • _wcschr.LIBVCRUNTIME ref: 00D2668E
                      • LCMapStringW.KERNEL32(0000007F,00000100,?,00000000,?,00000000,00D45E41,00000001,?,?,00000000,?,00000000), ref: 00D26709
                      • LCMapStringW.KERNEL32(0000007F,00000200,00D45E41,C3FFFCB5,00D45E41,C3FFFCB5), ref: 00D2675E
                      • LCMapStringW.KERNEL32(0000007F,00000100,00000000,?,00000000,?,70CDB3AB,?,?,00000000), ref: 00D2690F
                      • GetModuleHandleW.KERNEL32(kernel32.dll,70CDB3AB,00000010,00000010,00000000,00000010,00000010,00000000,?,00000000,00D45F00,000000FF,?,00D220A0,?), ref: 00D269BB
                      • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 00D269CF
                      • GetThreadLocale.KERNEL32(?,00000000,00D45F00,000000FF,?,00D220A0,?,?,00D4D2B8,00000000), ref: 00D26A6A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: String$AddressHandleLocaleModuleProcThread_wcschr
                      • String ID: GetThreadPreferredUILanguages$kernel32.dll
                      • API String ID: 44655413-1646127487
                      • Opcode ID: 825ab30476ee240535b01c111ce95579ccbfd660805795781cc6b34182bcce02
                      • Instruction ID: 56f624f909e48aa191b4641aa43f3a26928de2cc5c9795410a156054dad8b9c0
                      • Opcode Fuzzy Hash: 825ab30476ee240535b01c111ce95579ccbfd660805795781cc6b34182bcce02
                      • Instruction Fuzzy Hash: BCF1BE71A002169FDB14DF68D885BAEF7B5EF55324F188269E811EB291DB30ED44CBB0
                      APIs
                      • CoInitializeEx.COMBASE(00000000,00000000), ref: 00D2CEEC
                      • CoCreateInstance.COMBASE(00D4FB6C,00000000,00000001,00D474AC,00000000), ref: 00D2CF25
                      • EnterCriticalSection.KERNEL32(00D56B68), ref: 00D2D06F
                      • LeaveCriticalSection.KERNEL32(00D56B68), ref: 00D2D0DB
                      • EnterCriticalSection.KERNEL32 ref: 00D2D111
                      • LeaveCriticalSection.KERNEL32(00D56B68), ref: 00D2D187
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterLeave$CreateInitializeInstance
                      • String ID: Manufacturer$Model$\\.\root\CIMV2
                      • API String ID: 3488008144-3560815201
                      • Opcode ID: 7449a3664f0fbcc5c9003373f4fd86bd16322ae69cb63c4f887f34a961946947
                      • Instruction ID: 3bf88237aca032657633810e9240f9da0d8d88ae017681fba5efb1267e246c09
                      • Opcode Fuzzy Hash: 7449a3664f0fbcc5c9003373f4fd86bd16322ae69cb63c4f887f34a961946947
                      • Instruction Fuzzy Hash: E4B1BA70A003169FDB10CFA8D858BAEBBB6EF55319F284168E911EB391CB71D904CB71
                      APIs
                      • SetDllDirectoryW.KERNEL32(00D4D2B8), ref: 00D25F7A
                      • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00D25FA2
                      • GetVersionExW.KERNEL32(?), ref: 00D26044
                      • GetModuleHandleW.KERNEL32(?), ref: 00D2604D
                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00D2605D
                      • GetVersionExW.KERNEL32(?), ref: 00D260B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: DirectoryVersion$AddressHandleModuleProcSystem
                      • String ID: SetDefaultDllDirectories$\$kernel32.dll
                      • API String ID: 1445527400-3881611067
                      • Opcode ID: d64b2f801104d7e729b0f03bf445466cdf10db675dd96e267ccdfc93ddb3ee04
                      • Instruction ID: d99bf1567e5dacc848554f44896b31f2386f7e24af949e7aee58ab89f42d4dad
                      • Opcode Fuzzy Hash: d64b2f801104d7e729b0f03bf445466cdf10db675dd96e267ccdfc93ddb3ee04
                      • Instruction Fuzzy Hash: 7F510474D44329AFDF209F64EC49B9AB7A8FF20708F0444A5E909D3281E774EA44CBB1
                      APIs
                      • GetWindowLongW.USER32(?,000000F0), ref: 00D20910
                      • GetWindow.USER32(00000000,00000004), ref: 00D20935
                      • GetWindowRect.USER32(?,?), ref: 00D20948
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00D2095C
                      • MonitorFromWindow.USER32(?,00000002), ref: 00D20974
                      • GetMonitorInfoW.USER32(00000000,?), ref: 00D2098C
                      • GetWindowRect.USER32(00000000,?), ref: 00D209B6
                      • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 00D20A9A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Window$LongMonitorRect$FromInfo
                      • String ID: (
                      • API String ID: 2882702216-3887548279
                      • Opcode ID: 817630538e2d3a3356769dc014769d55dcdeac334044b273a378d4a0f0909fdc
                      • Instruction ID: 4e179f14ec605f6dd4bb84411c94622bd6fa724aa4f12dbf69b4c2afbf11a614
                      • Opcode Fuzzy Hash: 817630538e2d3a3356769dc014769d55dcdeac334044b273a378d4a0f0909fdc
                      • Instruction Fuzzy Hash: 7451BE325087119FD711CF28DC09A1BBBE9FB98725F580619F885E32A5DB70ED44CBA2
                      APIs
                      • SetEvent.KERNEL32(?,70CDB3AB,?,?,?,00D44B30,000000FF), ref: 00D2BC54
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,70CDB3AB), ref: 00D2BC60
                      • WaitForSingleObject.KERNEL32(?,00002710,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D2BC75
                      • TerminateThread.KERNEL32(?,80004004,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D2BC8A
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,70CDB3AB), ref: 00D2BC98
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,70CDB3AB), ref: 00D2BCBD
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,70CDB3AB), ref: 00D2BCCE
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,70CDB3AB), ref: 00D2BCDF
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,70CDB3AB), ref: 00D2BCF0
                      • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,70CDB3AB), ref: 00D2BD05
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CloseHandle$Event$CriticalDeleteObjectSectionSingleTerminateThreadWait
                      • String ID:
                      • API String ID: 559389250-0
                      • Opcode ID: 2ab5aec6705c4f90ae73698142d3704c51ec7e0dd32c33600cadf50b8360f5f4
                      • Instruction ID: b856d1ffc0a477696e9231efa9846117e7ab72c7f0e15c5c31a9fefe78f04360
                      • Opcode Fuzzy Hash: 2ab5aec6705c4f90ae73698142d3704c51ec7e0dd32c33600cadf50b8360f5f4
                      • Instruction Fuzzy Hash: E1317A70604B449BD7209F7AD944B57F7E8FF11728F080A1EE886C3B90DBB4E804CA60
                      APIs
                      • _free.LIBCMT ref: 00D357B1
                        • Part of subcall function 00D359E0: RtlFreeHeap.NTDLL(00000000,00000000,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105), ref: 00D359F6
                        • Part of subcall function 00D359E0: GetLastError.KERNEL32(00000105,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105,00000105), ref: 00D35A08
                      • _free.LIBCMT ref: 00D357BD
                      • _free.LIBCMT ref: 00D357C8
                      • _free.LIBCMT ref: 00D357D3
                      • _free.LIBCMT ref: 00D357DE
                      • _free.LIBCMT ref: 00D357E9
                      • _free.LIBCMT ref: 00D357F4
                      • _free.LIBCMT ref: 00D357FF
                      • _free.LIBCMT ref: 00D3580A
                      • _free.LIBCMT ref: 00D35818
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 4b5d2b2e0bf0fb4d764771599d277bf64c56846dd9f8efa6120d78828f91fa4a
                      • Instruction ID: 709474b37edefcf80fcebf3ec9a2dfb7c4fdd846e87a3779681096d88d80ea4c
                      • Opcode Fuzzy Hash: 4b5d2b2e0bf0fb4d764771599d277bf64c56846dd9f8efa6120d78828f91fa4a
                      • Instruction Fuzzy Hash: 0E117476510508EFCB01EF54E942DDA3BA5EF043A0F9640A5BA488B226DA31DF60DFB0
                      APIs
                      • DeleteCriticalSection.KERNEL32(00D558B4,00000000,00D2BB15,?,?,?,?,?,?,?,?,?,80004005,80004005,80004005,70CDB3AB), ref: 00D208CE
                      • GetWindowLongW.USER32(?,000000F0), ref: 00D20910
                      • GetWindowRect.USER32(?,?), ref: 00D20948
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00D2095C
                      • MonitorFromWindow.USER32(?,00000002), ref: 00D20974
                      • GetMonitorInfoW.USER32(00000000,?), ref: 00D2098C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Window$LongMonitor$CriticalDeleteFromInfoRectSection
                      • String ID: (
                      • API String ID: 1644989510-3887548279
                      • Opcode ID: 44a2e471d39bd8f7d70960316942da67ab3deff5dd12f6883f479bfd38cdf4ed
                      • Instruction ID: 0c1c278e1522574d7c763aaa60b7567f63b9df7e5132d697c3b41be432b24d25
                      • Opcode Fuzzy Hash: 44a2e471d39bd8f7d70960316942da67ab3deff5dd12f6883f479bfd38cdf4ed
                      • Instruction Fuzzy Hash: 3A51DE32504721CFD721DF28ED49A1ABBE4FB98755F580618F884E73A5DB70EC448BA2
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • IsWindow.USER32(?), ref: 00D22C15
                      • SetForegroundWindow.USER32(?), ref: 00D22C22
                      • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 00D22C7D
                      • SendMessageW.USER32(?,00000402,00000064,00000000), ref: 00D22C90
                      • SendMessageW.USER32(?,00000410,00000002,00000000), ref: 00D22C9E
                      • SetDlgItemTextW.USER32(?,000003F3,?), ref: 00D22CB8
                      • SetDlgItemTextW.USER32(?,00000002,?), ref: 00D22CF6
                        • Part of subcall function 00D18780: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,?,00D45778), ref: 00D187BE
                        • Part of subcall function 00D18780: FindResourceW.KERNEL32(00000000,?,00000006), ref: 00D18809
                      • IsWindow.USER32(?), ref: 00D22D2B
                      • SetForegroundWindow.USER32(?), ref: 00D22D38
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Window$MessageSend$FindForegroundInit_thread_footerItemResourceText$HeapProcess
                      • String ID:
                      • API String ID: 492539667-0
                      • Opcode ID: a905ae4887016b7170df5f032a0f36f8d86c0a80dfabcd4f17208f6f77529b20
                      • Instruction ID: 7cd5f09ed9bfcc3525009efb978411779cac5241187f6e82667a514b83ff365f
                      • Opcode Fuzzy Hash: a905ae4887016b7170df5f032a0f36f8d86c0a80dfabcd4f17208f6f77529b20
                      • Instruction Fuzzy Hash: 44B1C230600645FBDB01DF68DC49BADBBA0EF11315F188198F955AB2A2CBB1DE44CBB0
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll,70CDB3AB,00000010,00000010,00000000,00000010,00000010,00000000,?,00000000,00D45F00,000000FF,?,00D220A0,?), ref: 00D269BB
                      • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 00D269CF
                      • GetThreadLocale.KERNEL32(?,00000000,00D45F00,000000FF,?,00D220A0,?,?,00D4D2B8,00000000), ref: 00D26A6A
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                        • Part of subcall function 00D27420: GetLocaleInfoW.KERNEL32(?,00000059,-00000010,00000055,?,?,?,?,?,?), ref: 00D27498
                        • Part of subcall function 00D27420: GetLocaleInfoW.KERNEL32(00000055,0000005A,00000010,00000055,?,?,?,?,?,?), ref: 00D27521
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Locale$InfoInit_thread_footer$AddressHandleHeapModuleProcProcessThread
                      • String ID: GetThreadPreferredUILanguages$GetUserPreferredUILanguages$en-US$kernel32.dll
                      • API String ID: 158005059-2515003104
                      • Opcode ID: 531cf09026f9e115821e3e09a63fb7844a9a7af7f7dff6e066c825d144e1ca40
                      • Instruction ID: 6f02f678c2d4065d136ebe09d6e818d18243949337738ddbc72b1f7ff3555ac7
                      • Opcode Fuzzy Hash: 531cf09026f9e115821e3e09a63fb7844a9a7af7f7dff6e066c825d144e1ca40
                      • Instruction Fuzzy Hash: A951E571A00316AFDB10DFA4E845BAFB7A9FF51314F188129E915A7281DB71ED04CBB1
                      APIs
                      • PathFileExistsW.SHLWAPI(00000010), ref: 00D14D8E
                      • PathIsDirectoryW.SHLWAPI(00000010), ref: 00D14D9F
                      • SHCreateDirectoryExW.SHELL32(?,00000010,00000000,?,00000001,?), ref: 00D14E38
                      • CreateFileW.KERNEL32(00000010,C0000000,00000000,00000000,00000002,00000080,00000000,?,00000001,?), ref: 00D14E5A
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00D14E6E
                      • SetEndOfFile.KERNEL32(00000000), ref: 00D14E75
                      • CloseHandle.KERNEL32(00000000), ref: 00D14E7C
                      • PathFileExistsW.SHLWAPI(00000010), ref: 00D14E83
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: File$Path$CreateDirectoryExists$CloseHandlePointer
                      • String ID:
                      • API String ID: 1363924364-0
                      • Opcode ID: 6da37d6d5f7df1eaac62015c21b8746d0aac7893b08bd045f41c916a28f4b8d1
                      • Instruction ID: a81112029b17ab3c9934e9cea22b9b42160a6972ee732a6bbf68cff4c74e7a9f
                      • Opcode Fuzzy Hash: 6da37d6d5f7df1eaac62015c21b8746d0aac7893b08bd045f41c916a28f4b8d1
                      • Instruction Fuzzy Hash: 74D1B130A00605AFDB10DF68E884BEEB7B5FF55324F188268E415AB291DB70DD85CBB0
                      APIs
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,00000000,000000FF), ref: 00D28F2E
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,?,000000FF), ref: 00D28F50
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,00000000,000000FF), ref: 00D28F8A
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,00000000,000000FF), ref: 00D28FAB
                        • Part of subcall function 00D297C0: CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,00000000,000000FF,00000000,?,?,?,?,?,?,?,80004005), ref: 00D29847
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,?,000000FF), ref: 00D28FEE
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,?,000000FF), ref: 00D29013
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,?,000000FF), ref: 00D2906A
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,?,000000FF), ref: 00D2908F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CompareString
                      • String ID:
                      • API String ID: 1825529933-0
                      • Opcode ID: fc59ecdb246c8e8d81a84e2dcf6d3796052d238700e0ebc4b2445e5ea884897f
                      • Instruction ID: b090c13b523b17558f4bf4071cd2425a6988c1eab58899d1d68650a716be79db
                      • Opcode Fuzzy Hash: fc59ecdb246c8e8d81a84e2dcf6d3796052d238700e0ebc4b2445e5ea884897f
                      • Instruction Fuzzy Hash: 26B19275A05125ABDF14CF58DD9097DF7A6AFA5328F284369F822A73C4DB70AD00C670
                      APIs
                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00D2CE1D
                      • GetCurrentProcess.KERNEL32(00000000), ref: 00D2CE2A
                      • DuplicateHandle.KERNEL32(00000000), ref: 00D2CE31
                      • CreateThread.KERNEL32(00000000,00000000,00D2CEC0,00000000,00000000,?), ref: 00D2CE51
                      • GetLastError.KERNEL32 ref: 00D2CE5A
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00D2CE79
                      • GetLastError.KERNEL32 ref: 00D2CE83
                      • CloseHandle.KERNEL32(00000000), ref: 00D2CEA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CurrentErrorHandleLastProcess$CloseCreateDuplicateObjectSingleThreadWait
                      • String ID:
                      • API String ID: 3681073619-0
                      • Opcode ID: a6ced7efc2b635edfd4b56c63293570d50ee2f0765372027ec1a27256065471e
                      • Instruction ID: 357dcc71162951e8cfce04b3c2154444a7c264c6ebb3a5c4c4d8a36728e055de
                      • Opcode Fuzzy Hash: a6ced7efc2b635edfd4b56c63293570d50ee2f0765372027ec1a27256065471e
                      • Instruction Fuzzy Hash: 72216774A05308AFEB248FA0EC09B6D3BB9AB25306F544198F905D73E0E7719D00CB74
                      APIs
                      • GetConsoleCP.KERNEL32(00000010,00000000,?,?,?,?,?,?,?,00D30A56,?,00000000,00000010,00000000,00000000), ref: 00D30323
                      • __fassign.LIBCMT ref: 00D3039E
                      • __fassign.LIBCMT ref: 00D303B9
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000010,00000005,00000000,00000000), ref: 00D303DF
                      • WriteFile.KERNEL32(?,00000010,00000000,00D30A56,00000000,?,?,?,?,?,?,?,?,?,00D30A56,?), ref: 00D303FE
                      • WriteFile.KERNEL32(?,?,00000001,00D30A56,00000000,?,?,?,?,?,?,?,?,?,00D30A56,?), ref: 00D30437
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID:
                      • API String ID: 1324828854-0
                      • Opcode ID: e93aa382a857f4cae6bfc9590dfa0b4d37133973488bba5007cad4e9c890214a
                      • Instruction ID: 9bff1e148eb7bd4b493515db6d5184c79fdc8e32faddc28b2c5bc8d2058e56df
                      • Opcode Fuzzy Hash: e93aa382a857f4cae6bfc9590dfa0b4d37133973488bba5007cad4e9c890214a
                      • Instruction Fuzzy Hash: FA517F71E002499FCB10CFA8D895AEEBBF8EF09310F18455AEA55E7291D7709A41CB70
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 00D3F86B
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00D3F873
                      • _ValidateLocalCookies.LIBCMT ref: 00D3F901
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00D3F92C
                      • _ValidateLocalCookies.LIBCMT ref: 00D3F981
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: dcbc7ab7cb47e180f1e6bd2567a7d80c583b2f8a3f0b488f406e615cd9274be4
                      • Instruction ID: b082ea01f903c5e2c17f4038a3e843f587d72754d8891f622af8772c607289bb
                      • Opcode Fuzzy Hash: dcbc7ab7cb47e180f1e6bd2567a7d80c583b2f8a3f0b488f406e615cd9274be4
                      • Instruction Fuzzy Hash: 4A418275E0030DABCF14DF68C844A9EBBB5EF45324F188165E9189B392D731EA55CBB0
                      APIs
                        • Part of subcall function 00D3B675: _free.LIBCMT ref: 00D3B69E
                      • _free.LIBCMT ref: 00D3B6FF
                        • Part of subcall function 00D359E0: RtlFreeHeap.NTDLL(00000000,00000000,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105), ref: 00D359F6
                        • Part of subcall function 00D359E0: GetLastError.KERNEL32(00000105,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105,00000105), ref: 00D35A08
                      • _free.LIBCMT ref: 00D3B70A
                      • _free.LIBCMT ref: 00D3B715
                      • _free.LIBCMT ref: 00D3B769
                      • _free.LIBCMT ref: 00D3B774
                      • _free.LIBCMT ref: 00D3B77F
                      • _free.LIBCMT ref: 00D3B78A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: e9b08168233b1a37d51ad6ce9417977ce59fca0c8bd4effaac19f4f1c359b236
                      • Instruction ID: 5c99d4d9f5aad46404b7027580aaafd1bf62bf6376a4a5dd6f26472484a46a35
                      • Opcode Fuzzy Hash: e9b08168233b1a37d51ad6ce9417977ce59fca0c8bd4effaac19f4f1c359b236
                      • Instruction Fuzzy Hash: 63112171540B08FAE520B7B0DC47FCB779CDF04764F844856B3996A057DB65B9148BB0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: __dtol3
                      • String ID:
                      • API String ID: 148231140-0
                      • Opcode ID: 68f0746eec6a068ba6d46c3a961596a888d1a76934460aa2926a96ae41d3b940
                      • Instruction ID: 84d72100a2d03c422f630cb503c4638583e4a2ebc8a19dbe2a722a8fa89464dd
                      • Opcode Fuzzy Hash: 68f0746eec6a068ba6d46c3a961596a888d1a76934460aa2926a96ae41d3b940
                      • Instruction Fuzzy Hash: 38A1C471600B159FD724DF39E840A2AB7E5EF59324B18872DE85A977A5E730F880CB70
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 00D21FF2
                      • CoCreateInstance.COMBASE(00D4FCA8,00000000,00000017,00D4FC98,00000000), ref: 00D2204B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Init_thread_footer$CreateHeapInitializeInstanceProcess
                      • String ID: Message$MessageInfo/$Title
                      • API String ID: 3177609248-2381594295
                      • Opcode ID: 5eef45f38e8de3c1be254c9ed47acf2935153547733b194dcf6c07f679a3a85d
                      • Instruction ID: e42f2a46f68e4fc5c404d541c0fdfcff7b4cf08ecb270c25e44a1b2f25aa7d2e
                      • Opcode Fuzzy Hash: 5eef45f38e8de3c1be254c9ed47acf2935153547733b194dcf6c07f679a3a85d
                      • Instruction Fuzzy Hash: 1702B070A00215EFDB04DFA8D894BAEBBB4EF65318F18815CE811AB291DB75AD05CB70
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00D332F9,00D332F9,?,?,?,00D3A01B,00000001,00000001,6FE85006), ref: 00D39E24
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00D3A01B,00000001,00000001,6FE85006,?,?,?), ref: 00D39EAA
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,6FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00D39FA4
                      • __freea.LIBCMT ref: 00D39FB1
                        • Part of subcall function 00D36357: RtlAllocateHeap.NTDLL(00000000,00D42D2F,?,?,00D41564,?,?,?,?,?,00D42CC0,00D42D2F,?,?,?,?), ref: 00D36389
                      • __freea.LIBCMT ref: 00D39FBA
                      • __freea.LIBCMT ref: 00D39FDF
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                      • String ID:
                      • API String ID: 1414292761-0
                      • Opcode ID: 67a11612f21d7c0c27176585c36981eabde0678d9b1ec7f0d947b75399043e0f
                      • Instruction ID: 1f618e948bb3010d27f240c477b3bfdfda7307bc62629c3cfaba8db6285d5eed
                      • Opcode Fuzzy Hash: 67a11612f21d7c0c27176585c36981eabde0678d9b1ec7f0d947b75399043e0f
                      • Instruction Fuzzy Hash: 2151D0B2610216ABDB259F64CC91EBBF7AAEF40750F294628FD05D6244EBB4DC40C6B0
                      APIs
                      • EnterCriticalSection.KERNEL32(00D558B4,?,00000010,?,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D23BEE
                      • GetCurrentThreadId.KERNEL32 ref: 00D23BFE
                      • LeaveCriticalSection.KERNEL32(00D558B4,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D23C2E
                      • GetCurrentProcess.KERNEL32(?,0000000D,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D23C7E
                      • FlushInstructionCache.KERNEL32(00000000,?,?,80004005,80004005,?,00D230FB,?,000000A0,?,?), ref: 00D23C85
                      • SetWindowLongW.USER32(?,00000004,?), ref: 00D23C95
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CriticalCurrentSection$CacheEnterFlushInstructionLeaveLongProcessThreadWindow
                      • String ID:
                      • API String ID: 3823208529-0
                      • Opcode ID: 594f758285fb91aa9af746211d6b89859b75f33fb722e5837c356a8f5d19bbc8
                      • Instruction ID: 82a92dc464457f4bb25929a284e3ee1645d9d3779d6a1026ac10b04665915c10
                      • Opcode Fuzzy Hash: 594f758285fb91aa9af746211d6b89859b75f33fb722e5837c356a8f5d19bbc8
                      • Instruction Fuzzy Hash: FA511432601715AFCB10DF68E844A5ABBA4FF45324B08852AFD55DB350DB30ED00CBB0
                      APIs
                      • GetLastError.KERNEL32(?,?,00D401E8,00D3E9B0), ref: 00D401FF
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D4020D
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D40226
                      • SetLastError.KERNEL32(00000000,?,00D401E8,00D3E9B0), ref: 00D40278
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 5efa4b951d605ae81e0e5b84453d7ef33db6253dcde3634a1e36566a977325ba
                      • Instruction ID: aefeb495e83525c06590cd90e69e59038e89e63033415e168d692ed9a114c34c
                      • Opcode Fuzzy Hash: 5efa4b951d605ae81e0e5b84453d7ef33db6253dcde3634a1e36566a977325ba
                      • Instruction Fuzzy Hash: B801D436109712AFAB2536787CCD96A2F84EB02775B24023DF610D66E4EFB19C40A174
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: d1797b10f6a190724681fad8aff96d323a62be0e6684c04846e63e0bf0e9bd6a
                      • Instruction ID: 80b3a6465eaa84038181b46e1cf3920ebcf8f2abcef7ee66b1b9e5e9ba989021
                      • Opcode Fuzzy Hash: d1797b10f6a190724681fad8aff96d323a62be0e6684c04846e63e0bf0e9bd6a
                      • Instruction Fuzzy Hash: CDF0C23A248F01ABD6123734BC0AF1A2A69DFD2772F290624F914D32DAFF20CD029571
                      APIs
                        • Part of subcall function 00D20690: GetModuleHandleW.KERNEL32(Advapi32.dll,?,000000BC,00000000,?,?,00D1F996,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D206B4
                        • Part of subcall function 00D20690: RegCloseKey.ADVAPI32(00000000,?,000000BC,00000000,?,?,00D1F996,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D20717
                      • RegQueryValueExW.ADVAPI32(00000000,SilentExecution,00000000,?,?,?,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D1F9BB
                      • RegCloseKey.ADVAPI32(00000000), ref: 00D1F9C6
                      • RegCloseKey.ADVAPI32(00000000,80000002,SOFTWARE\Sony Corporation\VAIO update,00020019,000000BC), ref: 00D1F9E1
                      Strings
                      • SOFTWARE\Sony Corporation\VAIO update, xrefs: 00D1F96D
                      • SilentExecution, xrefs: 00D1F9B5
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Close$HandleModuleQueryValue
                      • String ID: SOFTWARE\Sony Corporation\VAIO update$SilentExecution
                      • API String ID: 2971604672-3095134017
                      • Opcode ID: a73c00c0017f7b0bff7a604b26312e224dc3e8a18ebbc1850cd2cd7993da12d2
                      • Instruction ID: f8044a608e4ef1ef64ce1e965cd507bdc63be43a5d6d6ee9c3017b9e76ac7d4b
                      • Opcode Fuzzy Hash: a73c00c0017f7b0bff7a604b26312e224dc3e8a18ebbc1850cd2cd7993da12d2
                      • Instruction Fuzzy Hash: BA015E75D42228BFDB10AFA49C46BEFBBBCAF05705F100156E901B7241DB745A488AF1
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00D3838D,00000003,?,00D3832D,00000003,00D527E0,0000000C,00D38484,00000003,00000002), ref: 00D383FC
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D3840F
                      • FreeLibrary.KERNEL32(00000000,?,?,?,00D3838D,00000003,?,00D3832D,00000003,00D527E0,0000000C,00D38484,00000003,00000002,00000000), ref: 00D38432
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 705088d4b9f8065be4fe72d338db6023d5bd0e577bd8556bec6124878f16f37a
                      • Instruction ID: 7bb1f1042cf840ae04e1fb215fd9fce1ad43c4931cbcd044aa5fcf21e4ef00f6
                      • Opcode Fuzzy Hash: 705088d4b9f8065be4fe72d338db6023d5bd0e577bd8556bec6124878f16f37a
                      • Instruction Fuzzy Hash: 4CF04F34A05318BFCB11AF91DC59B9EBFB5EB05752F0441A4F805E22A0CB709984DAB0
                      APIs
                        • Part of subcall function 00D11910: GetProcessHeap.KERNEL32(?,?,00000000), ref: 00D1193C
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D11967
                        • Part of subcall function 00D11910: __Init_thread_footer.LIBCMT ref: 00D119E5
                      • OpenProcess.KERNEL32(00000410,00000000,?), ref: 00D2C87D
                      • OpenProcess.KERNEL32(00001010,00000000,?), ref: 00D2C88C
                      • OpenProcess.KERNEL32(00000400,00000000,?), ref: 00D2C89B
                      • OpenProcess.KERNEL32(00001000,00000000,?), ref: 00D2C8AA
                      • CloseHandle.KERNEL32(00000000,?,?), ref: 00D2C90B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Process$Open$Init_thread_footer$CloseHandleHeap
                      • String ID:
                      • API String ID: 2529047482-0
                      • Opcode ID: 04bda7e630de7ab769f8d31685375f3a0baafc7000aeea6e7e7f56aaeb28054c
                      • Instruction ID: 2899ce8d097421428100bb8f9df5c54a53d552dd6fef77122698261fd1f82f29
                      • Opcode Fuzzy Hash: 04bda7e630de7ab769f8d31685375f3a0baafc7000aeea6e7e7f56aaeb28054c
                      • Instruction Fuzzy Hash: DF31E971940229ABDB219F54DC59FEEB7B8FF48714F4401A9F908E7280DB709E808AB4
                      APIs
                      • GetLastError.KERNEL32(?,?,?,00D2EFDC,00D33BC6,?,?,?,00D26001,?,00000105,kernel32.dll,00000104), ref: 00D3591A
                      • _free.LIBCMT ref: 00D3594F
                      • _free.LIBCMT ref: 00D35976
                      • SetLastError.KERNEL32(00000000,00000105,kernel32.dll,00000104), ref: 00D35983
                      • SetLastError.KERNEL32(00000000,00000105,kernel32.dll,00000104), ref: 00D3598C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID:
                      • API String ID: 3170660625-0
                      • Opcode ID: 99225b312e80dff97eca6a9e1a40dff492ddc7cc907e935c4531599def0c25ab
                      • Instruction ID: 247fdc67ec03696a89f97313f00e3988b09703f52c0350f57f4db6b88db2193e
                      • Opcode Fuzzy Hash: 99225b312e80dff97eca6a9e1a40dff492ddc7cc907e935c4531599def0c25ab
                      • Instruction Fuzzy Hash: EC01F436204F00FBC60227347C46F2B2669EBD17B2F290524F915D229AEF20CC054930
                      APIs
                      • _free.LIBCMT ref: 00D3B624
                        • Part of subcall function 00D359E0: RtlFreeHeap.NTDLL(00000000,00000000,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105), ref: 00D359F6
                        • Part of subcall function 00D359E0: GetLastError.KERNEL32(00000105,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105,00000105), ref: 00D35A08
                      • _free.LIBCMT ref: 00D3B636
                      • _free.LIBCMT ref: 00D3B648
                      • _free.LIBCMT ref: 00D3B65A
                      • _free.LIBCMT ref: 00D3B66C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: c7216eac94f9206d6604a5577df04fb717c5233f000e2687e4f81f26b6f92016
                      • Instruction ID: 9c9c2a0930dc07d047fa9400af792cc98178d4d6c09ca2546f1fd427a9c19e30
                      • Opcode Fuzzy Hash: c7216eac94f9206d6604a5577df04fb717c5233f000e2687e4f81f26b6f92016
                      • Instruction Fuzzy Hash: 73F01232504B04EB8625EB54F993D1A77D9EA04771F9D0806F549DB616CB30FD804BB8
                      APIs
                      • SetEvent.KERNEL32(?), ref: 00D1FE01
                      • WaitForSingleObject.KERNEL32(?,00002710), ref: 00D1FE14
                      • GetExitCodeThread.KERNEL32(?,00000000), ref: 00D1FE25
                      • TerminateThread.KERNEL32(?,00000000), ref: 00D1FE3A
                      • CloseHandle.KERNEL32(?), ref: 00D1FE48
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Thread$CloseCodeEventExitHandleObjectSingleTerminateWait
                      • String ID:
                      • API String ID: 1204855442-0
                      • Opcode ID: 8e8a5e89fba283afd62f1bc9ee8ea79ade35d42713a6d8890e821bad715de14f
                      • Instruction ID: 39f499f5f83786bd8508f480bb478dc61e26eb6d15cc8742573fa438fb0aca6c
                      • Opcode Fuzzy Hash: 8e8a5e89fba283afd62f1bc9ee8ea79ade35d42713a6d8890e821bad715de14f
                      • Instruction Fuzzy Hash: 3BF01478604304EFDB308FA5EC08B9BBBF9EB05300F144969F946D2261EB71ED549AA0
                      APIs
                      • _free.LIBCMT ref: 00D43818
                        • Part of subcall function 00D359E0: RtlFreeHeap.NTDLL(00000000,00000000,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105), ref: 00D359F6
                        • Part of subcall function 00D359E0: GetLastError.KERNEL32(00000105,?,00D3B6A3,00000105,00000000,00000105,00000000,?,00D3B6CA,00000105,00000007,00000105,?,00D38E3E,00000105,00000105), ref: 00D35A08
                      • _free.LIBCMT ref: 00D4382A
                      • _free.LIBCMT ref: 00D4383D
                      • _free.LIBCMT ref: 00D4384E
                      • _free.LIBCMT ref: 00D4385F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 6dfd9f185c38dd7616b3830091acdad813321b1ac1bd80c141e28df9e7fd267e
                      • Instruction ID: 32417b9babb4d192c5c9b9dd269599b954cc48d79b7fd342a68020f349ebbccd
                      • Opcode Fuzzy Hash: 6dfd9f185c38dd7616b3830091acdad813321b1ac1bd80c141e28df9e7fd267e
                      • Instruction Fuzzy Hash: C3F0B770800B20DB8B52AF18BC429147EA4E7097727EA1106FC10D736ACA31DF91CFB5
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\IEW113_2311a.exe,00000104), ref: 00D43287
                      • _free.LIBCMT ref: 00D43352
                      • _free.LIBCMT ref: 00D4335C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: C:\Users\user\Desktop\IEW113_2311a.exe
                      • API String ID: 2506810119-18735487
                      • Opcode ID: 3884189b1fadc830bb290bf0d866a36a3ae8c3102e008b6c2c645662119c0cea
                      • Instruction ID: 2373d32821ab8dd136564832c2bf7b9c4137983bb138e001253dd2df4d7d8ac3
                      • Opcode Fuzzy Hash: 3884189b1fadc830bb290bf0d866a36a3ae8c3102e008b6c2c645662119c0cea
                      • Instruction Fuzzy Hash: 41315B71A04758EFDB21DF9D9889DAEBBB8EF85310B5840A6E904D7211DB709F40CBB0
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,?,?,00D2E653,?,?,00D21AD5,00000000,70CDB3AB,00000000,?,00000000,00D45980,000000FF,?,00D2193B), ref: 00D2E670
                      • HeapFree.KERNEL32(00000000,?,00D2E653,?,?,00D21AD5,00000000,70CDB3AB,00000000,?,00000000,00D45980,000000FF,?,00D2193B), ref: 00D2E677
                      • InterlockedPushEntrySList.KERNEL32(00785B58,?,?,00D2E653,?,?,00D21AD5,00000000,70CDB3AB,00000000,?,00000000,00D45980,000000FF,?,00D2193B), ref: 00D2E680
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Heap$EntryFreeInterlockedListProcessPush
                      • String ID: X[x
                      • API String ID: 1982578398-2592070539
                      • Opcode ID: 1d276bd836190d71e942525549253db8087f5d9f3004498b0cfb0bfa86b06e69
                      • Instruction ID: 311a009920cce7d1fc08a75faa6d8f7480b0d3c33625c3ca174050f16956e30b
                      • Opcode Fuzzy Hash: 1d276bd836190d71e942525549253db8087f5d9f3004498b0cfb0bfa86b06e69
                      • Instruction Fuzzy Hash: D6D05E351453149BCE105FB4BC48EAA376CEB29606F044844F60EC2251CB31D4408670
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: __alldvrm$_strrchr
                      • String ID:
                      • API String ID: 1036877536-0
                      • Opcode ID: ede50d2eaaeaadc1b7ac278e27b05d16cf2698b90d07cad9e01e171b5a337d04
                      • Instruction ID: 8e6907a73c229cd77dccca3eaadbc16188fd719f9849b085c711a6780fea604b
                      • Opcode Fuzzy Hash: ede50d2eaaeaadc1b7ac278e27b05d16cf2698b90d07cad9e01e171b5a337d04
                      • Instruction Fuzzy Hash: 3DA148F2D08B869FEB318F68C8927AEBBE5EF55350F28416DE4859B281C2748D41C770
                      APIs
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,00D4F584,000000FF,?,?,?,?,?,?,00D27085,00D4F590,en-US,70CDB3AB), ref: 00D27301
                      • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,00D4D2B8,000000FF,?,?,?,?,?,?,00D27085,00D4F590,en-US,70CDB3AB), ref: 00D27330
                      • CompareStringW.KERNEL32(0000007F,00000001,-00000010,000000FF,00D4F584,000000FF,?,?,?,?,?,?,00D27085,00D4F590,en-US,70CDB3AB), ref: 00D27359
                      • CompareStringW.KERNEL32(0000007F,00000001,-00000010,000000FF,00D4D2B8,000000FF,?,?,?,?,?,?,00D27085,00D4F590,en-US,70CDB3AB), ref: 00D2737C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CompareString
                      • String ID:
                      • API String ID: 1825529933-0
                      • Opcode ID: 73eee8bb4358c1437a764473948d6e4f38fc8f8258fd19733794a214addecc79
                      • Instruction ID: 26f55647d16d358f428f574b31e898b8028c37525b5a3fe07dd867799cd5b451
                      • Opcode Fuzzy Hash: 73eee8bb4358c1437a764473948d6e4f38fc8f8258fd19733794a214addecc79
                      • Instruction Fuzzy Hash: 63B19374A04216DFDB24CF68D884AAAB7B1FF55324F284759E821AB3D1DB709D01CBB4
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _wcsstr
                      • String ID:
                      • API String ID: 1512112989-0
                      • Opcode ID: 5a3e33e9c02627e6ada18dcc88ae25b6154d977897f62d69eb298dad7a47b168
                      • Instruction ID: 50bc610639c81d1b4a92e5624b8f3e67b7f5a20f09c6f70c5c6d1bce06a75a0e
                      • Opcode Fuzzy Hash: 5a3e33e9c02627e6ada18dcc88ae25b6154d977897f62d69eb298dad7a47b168
                      • Instruction Fuzzy Hash: 7171C435E0022ADFCF14DFA8D8805AEBBB5EF68308B184569DD05A7311E770AE11CBB0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: 01d586954f726e401c93bf37fe3c4151a4167a3b809c43ef36ae2792dcb86b82
                      • Instruction ID: b284ee5984ab057528185dc105239a49642e6581a51333b7daa0616bd75a48ae
                      • Opcode Fuzzy Hash: 01d586954f726e401c93bf37fe3c4151a4167a3b809c43ef36ae2792dcb86b82
                      • Instruction Fuzzy Hash: 04413B31A00510BBDB386B789C43A7E3BB4DF02374F288665F518D71D1DB75C84196B2
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,6FE85006,00D3299B,00000000,00000000,00D332F9,?,00D332F9,?,00000001,00D3299B,6FE85006,00000001,00D332F9,00D332F9), ref: 00D3B827
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D3B8B0
                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00D3B8C2
                      • __freea.LIBCMT ref: 00D3B8CB
                        • Part of subcall function 00D36357: RtlAllocateHeap.NTDLL(00000000,00D42D2F,?,?,00D41564,?,?,?,?,?,00D42CC0,00D42D2F,?,?,?,?), ref: 00D36389
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                      • String ID:
                      • API String ID: 2652629310-0
                      • Opcode ID: f9bf8a886c63aaae09ce5a6ea37c3d247015390902cb03f89e83cc63bfa6ebe8
                      • Instruction ID: 840d84459509eb36eafa60cc982a5b0ddae9a605094356aa0859397569b0f2d8
                      • Opcode Fuzzy Hash: f9bf8a886c63aaae09ce5a6ea37c3d247015390902cb03f89e83cc63bfa6ebe8
                      • Instruction Fuzzy Hash: 2031BC72A0020AABDF259FA4DC85DBE7BA9EF40320F08422AFD04D6250E735DD54CBB0
                      APIs
                      • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,000000BC), ref: 00D19A4C
                      • VerSetConditionMask.KERNEL32(00000000,?,?,000000BC), ref: 00D19A50
                      • VerSetConditionMask.KERNEL32(00000000,?,?,?,000000BC), ref: 00D19A54
                      • VerifyVersionInfoW.KERNEL32(?,00000023,00000000), ref: 00D19A77
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ConditionMask$InfoVerifyVersion
                      • String ID:
                      • API String ID: 2793162063-0
                      • Opcode ID: 8a1227918c7d8ebfef3ccd9d069d2062fc258ec864b27d78f233e15f5d3829a7
                      • Instruction ID: cabe982458339f137cf7bf9145f648b17777a2ef1d78aa3e302f01b8344d0302
                      • Opcode Fuzzy Hash: 8a1227918c7d8ebfef3ccd9d069d2062fc258ec864b27d78f233e15f5d3829a7
                      • Instruction Fuzzy Hash: 69111FB16483446FE730DF25DC5ABABBAE8EF88714F00091EB588D72D0D67496048BA6
                      APIs
                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00D404C3
                        • Part of subcall function 00D40410: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00D4043F
                        • Part of subcall function 00D40410: ___AdjustPointer.LIBCMT ref: 00D4045A
                      • _UnwindNestedFrames.LIBCMT ref: 00D404D8
                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00D404E9
                      • CallCatchBlock.LIBVCRUNTIME ref: 00D40511
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                      • String ID:
                      • API String ID: 737400349-0
                      • Opcode ID: bd712df2a7aa408fd8cba9d741fe825c15ea50af91ee3bde0799e399d2f385d3
                      • Instruction ID: a246cc2f86aebab17f2ea695fe4fd354f4d5e86d06bd3006605e324ed16ee895
                      • Opcode Fuzzy Hash: bd712df2a7aa408fd8cba9d741fe825c15ea50af91ee3bde0799e399d2f385d3
                      • Instruction Fuzzy Hash: A301D372100148BBDF12AE95CC45EEB7F6AEF88754F044518FB18A6122C736E961DFB0
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00D26001,00000000,00000000,?,00D3851A,00D26001,00000000,00000000,00000000,?,00D38717,00000006,FlsSetValue), ref: 00D385A5
                      • GetLastError.KERNEL32(?,00D3851A,00D26001,00000000,00000000,00000000,?,00D38717,00000006,FlsSetValue,00D49608,FlsSetValue,00000000,00000364,?,00D35963), ref: 00D385B1
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00D3851A,00D26001,00000000,00000000,00000000,?,00D38717,00000006,FlsSetValue,00D49608,FlsSetValue,00000000), ref: 00D385BF
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: 3cba80ca85e1123c9b22f90e7d4a28a8abb27086f3349322771146d9ec826f4c
                      • Instruction ID: d6688f9716a0d0f5cec7caf9d9f5a8e957b47c6aac5a8f622b7f7923600a34ad
                      • Opcode Fuzzy Hash: 3cba80ca85e1123c9b22f90e7d4a28a8abb27086f3349322771146d9ec826f4c
                      • Instruction Fuzzy Hash: A101DB366063229BC7218F699C44A977768AF46BA1F180620FD55D7340DF30DD05DAF0
                      APIs
                      • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003), ref: 00D19E4D
                      • VerSetConditionMask.KERNEL32(00000000,?,00000001,00000003), ref: 00D19E55
                      • VerSetConditionMask.KERNEL32(00000000,?,00000004,00000003,?,00000001,00000003), ref: 00D19E5D
                      • VerifyVersionInfoW.KERNEL32(?,00000007,00000000), ref: 00D19E68
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ConditionMask$InfoVerifyVersion
                      • String ID:
                      • API String ID: 2793162063-0
                      • Opcode ID: e432ec167840cfecf92dce5ca68e4a01bb3d09c439cff42f0fa6d18fa8a3d1f3
                      • Instruction ID: a2c8ccc96637c80072f37f0de573d2a0040c8bd29510ca17764d388bae03c828
                      • Opcode Fuzzy Hash: e432ec167840cfecf92dce5ca68e4a01bb3d09c439cff42f0fa6d18fa8a3d1f3
                      • Instruction Fuzzy Hash: B30144B06443047BF6209F61DC1BF6B7BDCDB85B14F404919B6849A2C0D7B499148BE6
                      APIs
                      • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00D26516
                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00D265D4
                        • Part of subcall function 00D41DCD: ___report_securityfailure.LIBCMT ref: 00D41DD2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: DirectoryLibraryLoadSystem___report_securityfailure
                      • String ID: \
                      • API String ID: 2038868494-2967466578
                      • Opcode ID: bda3e07fbc389975428dcc00d6575ae1573799b90331961625d7ebef69c7b10b
                      • Instruction ID: 61b0bd172e1c753aec08400eaf1dc7c142a610b570cd98e90cd28a7c89bfab2a
                      • Opcode Fuzzy Hash: bda3e07fbc389975428dcc00d6575ae1573799b90331961625d7ebef69c7b10b
                      • Instruction Fuzzy Hash: A831A17594032D9BCB24DF68EC89BEA77B4EB54304F0409A9E919D7244EB70DE848AA0
                      APIs
                      • GetCurrentProcessId.KERNEL32 ref: 00D22748
                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00D22789
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CurrentMessageProcessSend
                      • String ID: <
                      • API String ID: 689086146-4251816714
                      • Opcode ID: f1b514ece41683bb53d41da057a4256b31c50e39f41bafb6a19b15f956994a60
                      • Instruction ID: 67504ad12e221adab0952a0fdd15752d8c20b30a806489c5188e834ef005bf04
                      • Opcode Fuzzy Hash: f1b514ece41683bb53d41da057a4256b31c50e39f41bafb6a19b15f956994a60
                      • Instruction Fuzzy Hash: C311A931604318AFDB21DF68E885BBEBBB8FB59741F510029F801E7240DB70AE05DAB1
                      APIs
                        • Part of subcall function 00D43E50: GetEnvironmentStringsW.KERNEL32 ref: 00D43E54
                      • _free.LIBCMT ref: 00D43593
                      • _free.LIBCMT ref: 00D4359A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: _free$EnvironmentStrings
                      • String ID: xAw
                      • API String ID: 3523873077-2191555105
                      • Opcode ID: 65f7005a3384f363738583fdebf0090ca1f8cf82d64b7be0882165005566b7b5
                      • Instruction ID: 1fd840f5696f1f4c9935d470c33998553472f954c9c6e081d6e554fb2d4bb37e
                      • Opcode Fuzzy Hash: 65f7005a3384f363738583fdebf0090ca1f8cf82d64b7be0882165005566b7b5
                      • Instruction Fuzzy Hash: B6E09216A49B1147EA61323D7C56A6A1605CBD1375F990326FC64DB1C3DEA0CF0601B6
                      APIs
                        • Part of subcall function 00D19970: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,00D2E499,70CDB3AB,8007000E,00000000,?,00D2DD39,?,70CDB3AB,00000010,00000010,?,?,00000000,00D465D0), ref: 00D19973
                        • Part of subcall function 00D19970: GetLastError.KERNEL32(?,00D2DD39,?,70CDB3AB,00000010,00000010,?,?,00000000,00D465D0,000000FF,?,00D22070,?,?,00D4D2B8), ref: 00D1997D
                      • IsDebuggerPresent.KERNEL32(70CDB3AB,8007000E,00000000,?,00D2DD39,?,70CDB3AB,00000010,00000010,?,?,00000000,00D465D0,000000FF,?,00D22070), ref: 00D2E49D
                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,00D2DD39,?,70CDB3AB,00000010,00000010,?,?,00000000,00D465D0,000000FF,?,00D22070,?), ref: 00D2E4AC
                      Strings
                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00D2E4A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: CountCriticalDebugDebuggerErrorInitializeLastOutputPresentSectionSpinString
                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                      • API String ID: 450123788-631824599
                      • Opcode ID: 9f7c4a8288b308b96d9aafb86e4acc41d0d8beee70bcc12167ea7be45351a281
                      • Instruction ID: f7a8c9ead40a40a1a364206a1865d566395aa1ed8d81b2acc2d33b3870042817
                      • Opcode Fuzzy Hash: 9f7c4a8288b308b96d9aafb86e4acc41d0d8beee70bcc12167ea7be45351a281
                      • Instruction Fuzzy Hash: 23E06D746047608BC320AF24F808782BBE0AF14304F04895DE8A6C3790EBB4D4888BB1
                      APIs
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,?), ref: 00D12FBF
                      • GetLastError.KERNEL32 ref: 00D12FD0
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 00D12FEB
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,00000000), ref: 00D13012
                      Memory Dump Source
                      • Source File: 00000000.00000002.4181945815.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                      • Associated: 00000000.00000002.4181911062.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182035078.0000000000D47000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182083439.0000000000D55000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4182134713.0000000000D57000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d10000_IEW113_2311a.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast
                      • String ID:
                      • API String ID: 1717984340-0
                      • Opcode ID: d9d906596e89e9befddd8eff3a7ee3411cef804eb8a5f725697b1f9f10b4e730
                      • Instruction ID: 663322f48ef9742c186ee9ed33ac75f04768270ae0ecf84d6d14c9b3e48e0223
                      • Opcode Fuzzy Hash: d9d906596e89e9befddd8eff3a7ee3411cef804eb8a5f725697b1f9f10b4e730
                      • Instruction Fuzzy Hash: 812137B9700306BFD7105F95EC85FA7BB6EEF45340F14422AF90187240EBA16E1887B0