Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE

Overview

General Information

Sample name:Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Analysis ID:1544696
MD5:51ef7e32d7120c644fabee284af7501a
SHA1:a20a8860ce64896c98754d14e7c1d5c9e9649a25
SHA256:f8ee0959e12e3a3537cc2f7290f06b4a18303543c6988df99599bb0cf80732a3
Infos:

Detection

Score:18
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Queries sensitive service information (via WMI, MSSMBios_RawSMBiosTables, often done to detect sandboxes)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to query locales information (e.g. system language)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: certificate valid
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\x86\MiniUnzipRelease\miniunz.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\IC\libraries\zlib\src\contrib\vstudio\vc17\ARM64\Release\miniunz.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\x86\ZlibDllRelease\zlibwapi.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\arm64\ZlibDllRelease\zlibwapi.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\x64\ZlibDllRelease\zlibwapi.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_ThirdPartyLibraries\zlib-1.2.13\contrib\vstudio\vc17_Fromvc14\x64\MiniUnzipRelease\miniunz.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_0089D3E0 FindFirstFileW,0_2_0089D3E0
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_008C7FC0 FindFirstFileW,FindNextFileW,FindClose,0_2_008C7FC0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://aia.entrust.net/evcs2-chain.p7c01
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://aia.entrust.net/ts2-chain256.p7c01
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://crl.entrust.net/csbr1.crl0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://crl.entrust.net/evcs2.crl0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://crl.entrust.net/g2ca.crl0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://crl.entrust.net/ts2ca.crl0
Source: DellPair-Setup-x64.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://ocsp.entrust.net00
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://ocsp.entrust.net01
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://ocsp.entrust.net02
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://ocsp.entrust.net03
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://relaxng.org/ns/structure/1.0
Source: mup.xmlString found in binary or memory: http://schemas.dell.com/openmanage/cm/2/0/mupdefinition.xsd
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://schemas.dell.com/openmanage/cm/2009/1/0/mupdefinition.xsd
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937854735.0000000001839000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.dell.com/openmanage/cm/2009/1/0/mupdefinition.xsdL
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://schemas.dell.com/openmanage/cm/2009/1/1/datamodelcore.xsd
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937854735.0000000001839000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.dell.com/openmanage/cm/2009/1/1/datamodelcore.xsdG
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, package.xmlString found in binary or memory: http://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverId=9DY26
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937854735.0000000001839000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverId=9DY26L
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://www.entrust.net/rpa0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://www.entrust.net/rpa03
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTD
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://www.winimage.com/zLibDll
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://www.winimage.com/zLibDll/unzip.html
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: http://www.winimage.com/zLibDllH
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, package.xmlString found in binary or memory: https://www.dell.com/support/kbdoc/000201693
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: https://www.entrust.net/rpa0
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: String function: 00828AA8 appears 295 times
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: String function: 00826690 appears 65 times
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Resource name: BIN type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Resource name: BIN type: PE32+ executable (console) x86-64, for MS Windows
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Resource name: BIN type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Resource name: BIN type: PE32 executable (console) Intel 80386, for MS Windows
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Resource name: BIN type: PE32+ executable (console) Aarch64, for MS Windows
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Resource name: BIN type: PE32+ executable (DLL) (GUI) Aarch64, for MS Windows
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000000.1690480176.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlibwapi.dll2 vs Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDUPFramework.exe , vs Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEBinary or memory string: OriginalFilenamezlibwapi.dll2 vs Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEBinary or memory string: OriginalFilenameDUPFramework.exe , vs Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean18.evad.winEXE@1/9@0/0
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_008B49A0 CoCreateInstance,0_2_008B49A0
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_0086C390 LoadResource,LockResource,SizeofResource,0_2_0086C390
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\104[1]Jump to behavior
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: # Exit Codes for Appx-Installer: Global Variable.
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: # Logging for Appx-Installer.
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: <installertype>custom</installertype>
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEString found in binary or memory: </InstallInstruction>
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEFile read: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE:Zone.IdentifierJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: msiso.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: mshtml.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: srpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: msimtf.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: jscript9.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXESection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: certificate valid
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic file information: File size 50595424 > 1048576
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x59ac00
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x110a00
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x2b7400
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: More than 200 imports for KERNEL32.dll
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\x86\MiniUnzipRelease\miniunz.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\IC\libraries\zlib\src\contrib\vstudio\vc17\ARM64\Release\miniunz.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\x86\ZlibDllRelease\zlibwapi.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\arm64\ZlibDllRelease\zlibwapi.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_GitRepos\libraries\zlib\src\contrib\vstudio\vc17\x64\ZlibDllRelease\zlibwapi.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Binary string: C:\_ThirdPartyLibraries\zlib-1.2.13\contrib\vstudio\vc17_Fromvc14\x64\MiniUnzipRelease\miniunz.pdb source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: section name: .didat
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEStatic PE information: section name: .00cfg
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\WMI : MSSMBios_RawSMBiosTables
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEMemory allocated: 3EC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEMemory allocated: 5400000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEMemory allocated: 5580000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEMemory allocated: 87D0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEMemory allocated: 9A20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEAPI coverage: 9.2 %
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_0089D3E0 FindFirstFileW,0_2_0089D3E0
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_008C7FC0 FindFirstFileW,FindNextFileW,FindClose,0_2_008C7FC0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware20,1
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0VMware20,1
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000003.1691791230.00000000018C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937854735.00000000018B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_00888820 SetDllDirectoryW,GetCurrentProcess,IsWow64Process,GetSystemWow64DirectoryA,AddDllDirectory,GetSystemDirectoryW,AddDllDirectory,SetDefaultDllDirectories,SetUnhandledExceptionFilter,0_2_00888820
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: GetLocaleInfoW,0_2_0089D870
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXECode function: 0_2_008B7180 GetVersionExW,0_2_008B7180
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net020%URL Reputationsafe
http://www.entrust.net/rpa030%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://www.winimage.com/zLibDll0%URL Reputationsafe
https://www.entrust.net/rpa00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.entrust.net/g2ca.crl0Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
    unknown
    https://www.dell.com/support/kbdoc/000201693Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, package.xmlfalse
      unknown
      http://schemas.dell.com/openmanage/cm/2009/1/1/datamodelcore.xsdGDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937854735.0000000001839000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://schemas.dell.com/openmanage/cm/2009/1/0/mupdefinition.xsdDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
          unknown
          http://schemas.dell.com/openmanage/cm/2009/1/1/datamodelcore.xsdDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
            unknown
            http://ocsp.entrust.net03Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
            • URL Reputation: safe
            unknown
            http://ocsp.entrust.net02Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
            • URL Reputation: safe
            unknown
            http://ocsp.entrust.net01Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
              unknown
              http://www.entrust.net/rpa03Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
              • URL Reputation: safe
              unknown
              http://ocsp.entrust.net00Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                unknown
                http://www.winimage.com/zLibDllHDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                  unknown
                  http://schemas.dell.com/openmanage/cm/2009/1/0/mupdefinition.xsdLDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937854735.0000000001839000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://nsis.sf.net/NSIS_ErrorErrorDellPair-Setup-x64.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtdDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                      unknown
                      http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTDDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                        unknown
                        http://www.winimage.com/zLibDll/unzip.htmlDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                          unknown
                          http://aia.entrust.net/ts2-chain256.p7c01Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                            unknown
                            http://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverId=9DY26LDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, 00000000.00000002.2937854735.0000000001839000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://crl.entrust.net/csbr1.crl0Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                unknown
                                http://www.winimage.com/zLibDllDell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                • URL Reputation: safe
                                unknown
                                http://relaxng.org/ns/structure/1.0Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                  unknown
                                  http://aia.entrust.net/evcs2-chain.p7c01Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                    unknown
                                    http://crl.entrust.net/ts2ca.crl0Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                      unknown
                                      http://schemas.dell.com/openmanage/cm/2/0/mupdefinition.xsdmup.xmlfalse
                                        unknown
                                        http://crl.entrust.net/evcs2.crl0Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                          unknown
                                          http://www.entrust.net/rpa0Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                            unknown
                                            http://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverId=9DY26Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE, package.xmlfalse
                                              unknown
                                              https://www.entrust.net/rpa0Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXEfalse
                                              • URL Reputation: safe
                                              unknown
                                              No contacted IP infos
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1544696
                                              Start date and time:2024-10-29 16:30:11 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 6m 42s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:6
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              Detection:CLEAN
                                              Classification:clean18.evad.winEXE@1/9@0/0
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:Failed
                                              Cookbook Comments:
                                              • Found application associated with file extension: .EXE
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, ocsp.entrust.net, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • VT rate limit hit for: Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              No simulations
                                              No context
                                              No context
                                              No context
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1036
                                              Entropy (8bit):3.6785900180648485
                                              Encrypted:false
                                              SSDEEP:24:Q+72MCllu3cVlorEChhdfw/rns5FCQ5WzY:r72bMcVloYyhduTsbCQ0Y
                                              MD5:09B1FEF34BE8EA5C517D016760B199C9
                                              SHA1:0BB0B458A132B8A287484AB0C306778B152D7C24
                                              SHA-256:C10444A069B8BB043CC793B8E0E1D1E65F02642FB877B0067FD67875A0A64B6C
                                              SHA-512:AC9D896E5C4AD070AD803FE5D17A0952254061281813EF18880F9CD2E16CF9B30378F115ED0FC5BC927DE0E0421B52D0E3269C4E8A3B2DDD4A940F114B9A99EA
                                              Malicious:false
                                              Reputation:low
                                              Preview:..[.T.u.e. .O.c.t. .2.9. .1.1.:.3.1.:.0.4. .2.0.2.4.]...U.p.d.a.t.e. .P.a.c.k.a.g.e. .E.x.e.c.u.t.i.o.n. .S.t.a.r.t.e.d.....[.T.u.e. .O.c.t. .2.9. .1.1.:.3.1.:.0.4. .2.0.2.4.]...O.r.i.g.i.n.a.l. .c.o.m.m.a.n.d. .l.i.n.e.:. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.D.e.s.k.t.o.p.\.D.e.l.l.-.P.a.i.r.-.A.p.p.l.i.c.a.t.i.o.n._.9.D.Y.2.6._.W.I.N._.1...2...4._.A.0.0.-.0.0...E.X.E.".....[.T.u.e. .O.c.t. .2.9. .1.1.:.3.1.:.0.4. .2.0.2.4.]...D.U.P. .F.r.a.m.e.w.o.r.k. .E.X.E. .V.e.r.s.i.o.n.:. .5...2...0...2.1.....[.T.u.e. .O.c.t. .2.9. .1.1.:.3.1.:.0.4. .2.0.2.4.]...D.U.P. .R.e.l.e.a.s.e.:. .9.D.Y.2.6.A.0.0.-.0.0.....[.T.u.e. .O.c.t. .2.9. .1.1.:.3.1.:.0.4. .2.0.2.4.]...I.n.i.t.i.a.l.i.z.i.n.g. .f.r.a.m.e.w.o.r.k...........[.T.u.e. .O.c.t. .2.9. .1.1.:.3.1.:.0.4. .2.0.2.4.]...D.a.t.a. .i.n. .s.m.b.i.o.s. .t.a.b.l.e. .i.s. .(.h.e.x.).v.a.l.u.e. .=. .1. .,. .C.h.a.s.i.s. .t.y.p.e. .(.h.e.x.).v.a.l.u.e. .=. .1. .,. .S.y.s.t.e.m. .t.y.p.e. .i.s. .:. .C.l.i.e.n.t. .....[.T.u.e. .O.c.t. .2.9. .1.1.:.3.1.:.0.
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):49120
                                              Entropy (8bit):0.0017331682157558962
                                              Encrypted:false
                                              SSDEEP:3:Ztt:T
                                              MD5:0392ADA071EB68355BED625D8F9695F3
                                              SHA1:777253141235B6C6AC92E17E297A1482E82252CC
                                              SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
                                              SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):3733
                                              Entropy (8bit):5.060783478110982
                                              Encrypted:false
                                              SSDEEP:48:omMqyjVIpOBi4HXiaxIuocTX/+lJWllmcTujIJSY2/9LsciBKewxV5lD7Kka:yHRzYuoCy4XmcT6wK/9L225c
                                              MD5:479E26A07D3D851BA0D877594B2C5956
                                              SHA1:9DBFCAC52078F282779577090358FA44972B9815
                                              SHA-256:05062B44CBAFBEAAE53AD9F5A093DB4F2A0E27548749A74FBB466091F371D302
                                              SHA-512:08DD0E3614036D79FED850531FFD5C5937B4A6360702E12907BB67A717486C0D86153FE52DFDC813C1D31AACF1F3454DDD2073F17C3E5CC8E7A22EBA8791DAF4
                                              Malicious:false
                                              Reputation:low
                                              Preview:.<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">..<html xmlns="http://www.w3.org/1999/xhtml" lang="en">..<head>.. <title>DUP Main Screen</title> this is not actually used, but the IDEs complain with no title -->.. <meta content="text/html; charset=utf-8" http-equiv="Content-Type" />.. <meta http-equiv="page-enter" content="blendTrans(Duration=.33)" />.... <link rel="stylesheet" type="text/css" href="styles.css" />.. Modified styles for legacy IE systems -->.. [if lte IE 6]>.. <link rel="stylesheet" type="text/css" href="ielegacy.css" />.. <![endif]-->.... <script type="text/javascript" src="script.js"></script>.. WARNING: only use exact px size units for OS DPI independant sizing (EVEN FONTS!) -->..</head>....<body>.. <div id="header">.. <div style="height:10px"></div>.. <label id="headLogoLPad"> space --></label>.. <label id="headLogo" sty
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:PNG image data, 17 x 17, 8-bit/color RGBA, non-interlaced
                                              Category:dropped
                                              Size (bytes):1184
                                              Entropy (8bit):6.555093314216707
                                              Encrypted:false
                                              SSDEEP:24:T1hnBWwjx82lY2T3eVacQGyJ3Vg1KzG4SE+/8w/odr3QLLv:Z1kNn2ySJ3FmE+PodMv
                                              MD5:A932EB14B05652327DE09E8194F85768
                                              SHA1:55C295383057191919963B24B57F5FAF75D2F11D
                                              SHA-256:FACF4CD9D8C8005B7A605F05491A115B20AFF914F190A49139407D7DCF5743BF
                                              SHA-512:1DCCA37C5B03C318C676A06B2E491585B804659E2376DA13C62D76B837D5E94E42E6F6A357B7003F57F6C486563304CD3BB060CD9B236059F5247D41C4934793
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:.PNG........IHDR.............;mG.....tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c021 79.155772, 2014/01/13-19:44:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)" xmpMM:InstanceID="xmp.iid:AD2B2226AB2911E49E2B82C57D30560D" xmpMM:DocumentID="xmp.did:AD2B2227AB2911E49E2B82C57D30560D"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:AD2B2224AB2911E49E2B82C57D30560D" stRef:documentID="xmp.did:AD2B2225AB2911E49E2B82C57D30560D"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>5.'+....IDATx.bd@.....d..........{ ....x.C..;d-.h.d..v .g..>.q%...........@..A.&$.`....p!.!.H..!.P}@C a.M...
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:PNG image data, 26 x 26, 8-bit/color RGB, interlaced
                                              Category:modified
                                              Size (bytes):1471
                                              Entropy (8bit):6.910245155716432
                                              Encrypted:false
                                              SSDEEP:24:j1hnBWwh82lYSKwW419aFVjV6FV4T3eyJ3V36ioG4AleoSTl6AOesxFedlO7:p1kvnLy9aFN4F2BJ3lmw3dey7
                                              MD5:01684E4CF0F22309B883AB2DA4FCDCC1
                                              SHA1:E6FBB9F52942556E6334F15F14E714E47A3E15EB
                                              SHA-256:AACAB6AE289DCD836C1DA6366B69290B389DCD89C5511A029E5A173FF272E0DC
                                              SHA-512:E820420389179A60447747CC5C811B818D8FAD99EEA62183E74FA4B83AB7C483B3BB506C13F287217CC23881D964800F8332C1EABBBB212574831ECC6C366B22
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:.PNG........IHDR.............Q/......tEXtSoftware.Adobe ImageReadyq.e<...niTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c021 79.155772, 2014/01/13-19:44:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:9EFB6187A5CAE11197DFCAEC59020C25" xmpMM:DocumentID="xmp.did:9BFC5E9BC82B11E4AE08E30DDBE65FDD" xmpMM:InstanceID="xmp.iid:9BFC5E9AC82B11E4AE08E30DDBE65FDD" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:f51d4317-4b7b-8b42-9628-ae96ad6a8e73" stRef:documentID="xmp.did:6B5F6003C81F11E4993381DFE7B8B66E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.k......IDATx.b.Yq.....xs.6.A9p...+.B8.....
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):458
                                              Entropy (8bit):4.897196426335853
                                              Encrypted:false
                                              SSDEEP:12:xbQFCv1dIDRRvyJ0rCNDRRvyJ0f9M0mDRRvyJ0NMTdIDRRvyJ0M:1e9RRvyJ0rGRRvyJ0VD+RRvyJ0NpRRvW
                                              MD5:762247EE6432B6FE87058C092B4B64EF
                                              SHA1:B7380028C839F31E7D21C59F267201C6DE130D6E
                                              SHA-256:DF735D8704AB406C120B10482BFBF7755C81E9E2BAE6B20E86793102430AEA07
                                              SHA-512:159E680C3B5534E1787B318BE449DE85393C67010FB13C8FAAE16065647675B74037BD02EF850B8233B3BE366D86ACA1D8342E3D6F1294D1F6595A9D5D900796
                                              Malicious:false
                                              Preview:..function GoPage(file)..{...window.location = file;..}....function SetPrimaryHover(name)..{...document.getElementById(name).className="primary_hover";..}.....function SetPrimaryNormal(name)..{...document.getElementById(name).className="primary_up";..}....function SetSecondaryNormal(name)..{...document.getElementById(name).className="secondary_up";..}....function SetSecondaryHover(name)..{...document.getElementById(name).className="secondary_hover";..}..
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:PNG image data, 26 x 26, 8-bit/color RGBA, interlaced
                                              Category:dropped
                                              Size (bytes):1323
                                              Entropy (8bit):6.629160627437111
                                              Encrypted:false
                                              SSDEEP:24:c1hnBWwh82lYSKwW4jiVvT3eyJ3V36ioGXGZVsb4gBaxkyG8:C1kvnLiiFBJ3lmAe6bLBaxK8
                                              MD5:476D6E57122F68EFDD4C7C36E9FE1E5D
                                              SHA1:7C665BC3CE2BCB9DB543F5DBEC812B421B6D79F3
                                              SHA-256:53B4F26194DA0CD25B57B39D205B2E3BCBD1C008DCE76C3A69FF9FF8ABF7084B
                                              SHA-512:F47B50333045C7D69C5D8FB3E167C64D3E3695873B8E09E232961238155BBD78B7C43C32B3EA7D618BBDC4B9113E841EA46389303DBD03A42E67191E370E2B16
                                              Malicious:false
                                              Preview:.PNG........IHDR..............M|X....tEXtSoftware.Adobe ImageReadyq.e<...niTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c021 79.155772, 2014/01/13-19:44:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:9EFB6187A5CAE11197DFCAEC59020C25" xmpMM:DocumentID="xmp.did:8306B931C82B11E4BAD9FF15C4406F26" xmpMM:InstanceID="xmp.iid:8306B930C82B11E4BAD9FF15C4406F26" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:f51d4317-4b7b-8b42-9628-ae96ad6a8e73" stRef:documentID="xmp.did:6B5F6003C81F11E4993381DFE7B8B66E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..h....SIDATx.b...?.2`........,P..&..@..f0a3
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:PNG image data, 30 x 30, 8-bit/color RGBA, non-interlaced
                                              Category:dropped
                                              Size (bytes):1492
                                              Entropy (8bit):6.928863482984696
                                              Encrypted:false
                                              SSDEEP:24:n1hnBWwh82lYSKw7W2+XcKAVjAT3eyJ3V9H8i1aTGadcj4J2GJCTsGRx2LRq:11kvnLN/CVABJ3vz10Z60ssGR20
                                              MD5:9EE20B8883F606D34DBE94D190A64712
                                              SHA1:6723512C89C002D68ACB77F199107A5CE432B2AC
                                              SHA-256:A2F9710779C921967E15D9B33044E97C2B34445CB73C32B615C46EDAEEFE5A05
                                              SHA-512:A51E07BC805DDD0EA14423CD313737FD3EF3BB2DC4C22A5A3F1EF75275212543C9C5F1C5E820A0E182ECE30176F7014F6DDDB5D9084CA179846972A23D962ADD
                                              Malicious:false
                                              Preview:.PNG........IHDR.............;0......tEXtSoftware.Adobe ImageReadyq.e<....iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c021 79.155772, 2014/01/13-19:44:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:253eec5c-67e3-4741-902c-87fbcba2f344" xmpMM:DocumentID="xmp.did:B482D68FC83811E4A838E1B8FBB540A9" xmpMM:InstanceID="xmp.iid:B482D68EC83811E4A838E1B8FBB540A9" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:6acbe659-eaca-0242-bc58-99e7b468083b" stRef:documentID="adobe:docid:photoshop:23ee457b-c833-11e4-b365-d86b3ace611c"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......IDATx...J.A..
                                              Process:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4637
                                              Entropy (8bit):5.075005323177124
                                              Encrypted:false
                                              SSDEEP:96:LwIbbBIQIhPmzTm58b/Lw0PZB8uoItbT10BUhFd3C3FV31E1g3T/:LwIbyHhPmzTm0/n8Yt/10BUh/3C333uc
                                              MD5:99010FE50AB0F704DCEE7428CEE81A64
                                              SHA1:6686647E7D6239DBD1562B33735803BF240098CD
                                              SHA-256:81E0E10A20913964F61DBE198382CF2CDFF0486E94068B655C288D9805EE2AEA
                                              SHA-512:D8AC222B851C0E9AC949AED8027744D51D530192C381FE7469EE818B3E34036DB2D0CBBE4E33FF46355C7E9D264B69C40A5DF6B98DE7453179B059324AEC7497
                                              Malicious:false
                                              Preview:.../* Common styles across all IE versions */../* WARNING: only use exact px size units for OS DPI independant sizing (EVEN FONTS!) */....body..{...height:286px;...background: #ffffff;...padding: 0;...margin: 0;...border-width: 1px;...border-color:#575859;...border-style:solid;...border-collapse:collapse;...color: #575859;...font: normal normal normal 100% Museo Sans For Dell, Museo Sans For Dell, sans-serif;...font-size: 12px; /* only use px size for OS DPI independant sizing (not pt) */...cursor: default;..}....table..{.. .padding: 0;...margin: 0;...border: 0px;...border-collapse: collapse;..}....tr..{...padding: 0;...margin: 0;...border-collapse:collapse..}....td..{...padding: 0;...margin: 0;...border: 0px;...border-collapse: collapse;...}....button{.....text-decoration: none;.. padding: 0;...border: 0px;...border-collapse: collapse;... cursor:pointer;...list-style-type: none;...width:100px;...height:29px;..}........img..{...border:0px..}....a..{...text-decoration: none;..}.
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.856297210469967
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              File size:50'595'424 bytes
                                              MD5:51ef7e32d7120c644fabee284af7501a
                                              SHA1:a20a8860ce64896c98754d14e7c1d5c9e9649a25
                                              SHA256:f8ee0959e12e3a3537cc2f7290f06b4a18303543c6988df99599bb0cf80732a3
                                              SHA512:5959bc6e4a13daf295bc934626b01655101954ed08cb340b2081b492a60ae3c8ff5da266ebcb9f8b3fd6278144828ced772951019a6f6101428ae3324dfebf8b
                                              SSDEEP:786432:RUDHRtr45XL1XkeeVtk42vMcftxDf8BZfWL4SVe1EhkLb2JZkFYiFDo7btGtd21:RUjRtPdf+fOmFGEhkLb2JZkFz8
                                              TLSH:43B72320795049F9E9E3003285EDEEFDA63EE1304B3865E79244076D7A293D31B35AE7
                                              File Content Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........\ly.=.*.=.*.=.*.E.+.=.*.A.*.=.*.E.+.=.*.E.+A=.*.E.+.=.*.E.+.=.*.A.+.=.*.A.+.=.*.A.+.=.*1c.+.=.*.=.*.>.*hA.+.=.*.A.+.<.*bA.+.=.
                                              Icon Hash:e4c8d8ec6cf4b186
                                              Entrypoint:0x40d3a0
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x65D73FF3 [Thu Feb 22 12:37:07 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:6
                                              OS Version Minor:0
                                              File Version Major:6
                                              File Version Minor:0
                                              Subsystem Version Major:6
                                              Subsystem Version Minor:0
                                              Import Hash:6b38e9fd2147f6565de05946cf19f483
                                              Signature Valid:true
                                              Signature Issuer:CN=Entrust Code Signing CA - OVCS2, O="Entrust, Inc.", C=US
                                              Signature Validation Error:The operation completed successfully
                                              Error Number:0
                                              Not Before, Not After
                                              • 21/09/2023 16:31:26 21/09/2024 16:31:25
                                              Subject Chain
                                              • CN=Dell Inc, OU=DUP Client Creation Service, O=Dell Inc, L=Round Rock, S=Texas, C=US
                                              Version:3
                                              Thumbprint MD5:7108E5001732E01BD0AD75719233268E
                                              Thumbprint SHA-1:BB26AF283356F485A8BC28226DE1EDEFBF6CD4C7
                                              Thumbprint SHA-256:F227A583F0ECE80C40BC513D7DA160859E95A64746E149C228B1B27D5724253B
                                              Serial:29C8CEE0AF20E1F6051698AA181E9488
                                              Instruction
                                              jmp 00007F38E4D50D98h
                                              jmp 00007F38E4DC538Eh
                                              jmp 00007F38E4C329B4h
                                              jmp 00007F38E4C00735h
                                              jmp 00007F38E4BE3359h
                                              jmp 00007F38E4B3A118h
                                              jmp 00007F38E4B1FEE9h
                                              jmp 00007F38E4B15F41h
                                              jmp 00007F38E498A498h
                                              jmp 00007F38E4DF54DAh
                                              jmp 00007F38E4D48C4Ah
                                              jmp 00007F38E4BF1A75h
                                              jmp 00007F38E4BE4B5Ch
                                              jmp 00007F38E4BB97C1h
                                              jmp 00007F38E4B5D1CBh
                                              jmp 00007F38E4A41905h
                                              jmp 00007F38E495CE00h
                                              jmp 00007F38E4DD0D4Eh
                                              jmp 00007F38E4DABDCDh
                                              jmp 00007F38E4C7CECFh
                                              jmp 00007F38E4C69EB3h
                                              jmp 00007F38E4BE182Fh
                                              jmp 00007F38E4B6C52Bh
                                              jmp 00007F38E4B1CD7Dh
                                              jmp 00007F38E4948348h
                                              jmp 00007F38E4D4660Dh
                                              jmp 00007F38E4CAEA9Ah
                                              jmp 00007F38E4B4924Bh
                                              jmp 00007F38E4B01DA4h
                                              jmp 00007F38E4B02249h
                                              jmp 00007F38E49CD4CAh
                                              jmp 00007F38E4DC41A5h
                                              jmp 00007F38E4DB6C5Ah
                                              jmp 00007F38E4B9FC20h
                                              jmp 00007F38E4B1255Eh
                                              jmp 00007F38E4B11055h
                                              jmp 00007F38E4AC3CACh
                                              jmp 00007F38E4DEEA0Dh
                                              jmp 00007F38E4D58AA3h
                                              jmp 00007F38E4D1DC86h
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x6ac4400x4a5.rdata
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x6c24440x28.idata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x6cc0000x2b7344.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x303dba80x2ab8
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x9840000x48ea8.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x64a20c0x18.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x647a400x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x6c20000x444.idata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x6c40000x2a0.didat
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x59ab350x59ac002c76e30aabcbaa3886972aff7281ea50unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x59c0000x1108e50x110a00dc5b31e4327eabd09fd270e7e9020f19False0.26783513869784503data4.540740678190066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x6ad0000x14cb80xc80094b0df406d743307fb178b3271ba3fb3False0.18298828125data4.205255949731856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .idata0x6c20000x1b7e0x1c003f1cab5646b3aaa41e954c09143ed798False0.33328683035714285data5.0144744516825925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .didat0x6c40000x5c760x5e00927951773b2a5d5f7737c54adce7513bFalse0.32509142287234044data4.458619011066555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .tls0x6ca0000x3090x400c573bd7cea296a9c5d230ca6b5aee1a6False0.021484375data0.011173818721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .00cfg0x6cb0000x10e0x2009af06137fa9cf00850c732d1a3b5890eFalse0.03515625data0.11055713125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .rsrc0x6cc0000x2b73440x2b740026f55f1af01eb0a2660d4f56c0a2b51dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x9840000x537d40x538009ea24822d078f47f6774094a2c45c383False0.46130297997754494data6.211710261042514IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              BIN0x6cd9980x96ec0PE32+ executable (DLL) (GUI) x86-64, for MS WindowsEnglishUnited States0.4270693135935397
                                              BIN0x7648580x2f4c0PE32+ executable (console) x86-64, for MS WindowsEnglishUnited States0.5464775355137099
                                              BIN0x793d180x73ec0PE32 executable (DLL) (GUI) Intel 80386, for MS WindowsEnglishUnited States0.46053418587410705
                                              BIN0x807bd80x272c0PE32 executable (console) Intel 80386, for MS WindowsEnglishUnited States0.5731451934583167
                                              BIN0x82ee980x7369Unicode text, UTF-8 (with BOM) text, with very long lines (311), with CRLF line terminatorsEnglishUnited States0.40375698087662887
                                              BIN0x8362040x539bUnicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.5652945848712797
                                              BIN0x83b5a00x2e8c0PE32+ executable (console) Aarch64, for MS WindowsEnglishUnited States0.47812290198053037
                                              BIN0x869e600xa9ac0PE32+ executable (DLL) (GUI) Aarch64, for MS WindowsEnglishUnited States0.33226615019799244
                                              RT_CURSOR0x9139200x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4805194805194805
                                              RT_CURSOR0x913a540xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"EnglishUnited States0.7
                                              RT_CURSOR0x913b080x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.36363636363636365
                                              RT_CURSOR0x913c3c0x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.35714285714285715
                                              RT_CURSOR0x913d700x134dataEnglishUnited States0.37337662337662336
                                              RT_CURSOR0x913ea40x134dataEnglishUnited States0.37662337662337664
                                              RT_CURSOR0x913fd80x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                                              RT_CURSOR0x91410c0x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.37662337662337664
                                              RT_CURSOR0x9142400x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                                              RT_CURSOR0x9143740x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                              RT_CURSOR0x9144a80x134dataEnglishUnited States0.44155844155844154
                                              RT_CURSOR0x9145dc0x134dataEnglishUnited States0.4155844155844156
                                              RT_CURSOR0x9147100x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.5422077922077922
                                              RT_CURSOR0x9148440x134dataEnglishUnited States0.2662337662337662
                                              RT_CURSOR0x9149780x134dataEnglishUnited States0.2824675324675325
                                              RT_CURSOR0x914aac0x134dataEnglishUnited States0.3246753246753247
                                              RT_BITMAP0x914be00xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80EnglishUnited States0.44565217391304346
                                              RT_BITMAP0x914c980x144Device independent bitmap graphic, 33 x 11 x 4, image size 220EnglishUnited States0.37962962962962965
                                              RT_ICON0x914ddc0x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.07998860845637187
                                              RT_ICON0x956e040x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishUnited States0.19896993903720833
                                              RT_ICON0x9602ac0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.3549792531120332
                                              RT_ICON0x9628540x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.47795497185741087
                                              RT_ICON0x9638fc0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.5655737704918032
                                              RT_ICON0x9642840x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.625886524822695
                                              RT_DIALOG0x9646ec0x40dataEnglishUnited States0.8125
                                              RT_DIALOG0x96472c0xe8dataEnglishUnited States0.6336206896551724
                                              RT_DIALOG0x9648140x34dataEnglishUnited States0.9038461538461539
                                              RT_STRING0x9648480x234dataEnglishUnited States0.48404255319148937
                                              RT_STRING0x964a7c0x338dataEnglishUnited States0.3337378640776699
                                              RT_STRING0x964db40x628dataEnglishUnited States0.258248730964467
                                              RT_STRING0x9653dc0x148dataEnglishUnited States0.4878048780487805
                                              RT_STRING0x9655240x82StarOffice Gallery theme p, 536899072 objects, 1st nEnglishUnited States0.7153846153846154
                                              RT_STRING0x9655a80x2adataEnglishUnited States0.5476190476190477
                                              RT_STRING0x9655d40x184dataEnglishUnited States0.48711340206185566
                                              RT_STRING0x9657580x4eedataEnglishUnited States0.375594294770206
                                              RT_STRING0x965c480x264dataEnglishUnited States0.3333333333333333
                                              RT_STRING0x965eac0x2dadataEnglishUnited States0.3698630136986301
                                              RT_STRING0x9661880x8adataEnglishUnited States0.6594202898550725
                                              RT_STRING0x9662140xacdataEnglishUnited States0.45348837209302323
                                              RT_STRING0x9662c00xdedataEnglishUnited States0.536036036036036
                                              RT_STRING0x9663a00x4a8dataEnglishUnited States0.3221476510067114
                                              RT_STRING0x9668480x228dataEnglishUnited States0.4003623188405797
                                              RT_STRING0x966a700x2cdataEnglishUnited States0.5227272727272727
                                              RT_STRING0x966a9c0x53edataEnglishUnited States0.2965722801788376
                                              RT_RCDATA0x966fdc0x4bf6XML 1.0 document, ASCII text, with very long lines (342), with CRLF line terminatorsEnglishUnited States0.1410058623881518
                                              RT_RCDATA0x96bbd40xb47XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3321787322480083
                                              RT_RCDATA0x96c71c0x2b76dataEnglishUnited States0.18641021031817365
                                              RT_GROUP_CURSOR0x96f2940x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0294117647058822
                                              RT_GROUP_CURSOR0x96f2b80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f2cc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f2e00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f2f40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3080x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f31c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3300x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f36c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3a80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x96f3bc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_ICON0x96f3d00x5adataEnglishUnited States0.7777777777777778
                                              RT_VERSION0x96f42c0x3f3cdataEnglishUnited States0.03317272053372869
                                              RT_HTML0x9733680xe95HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3570854540583981
                                              RT_HTML0x9742000x1649HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3030674846625767
                                              RT_MANIFEST0x97584c0x18bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.6075949367088608
                                              None0x9759d80x75GIF image data, version 89a, 11 x 11EnglishUnited States0.8974358974358975
                                              None0x975a500xdbPNG image data, 11 x 11, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9954337899543378
                                              None0x975b2c0x6b2HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.470828471411902
                                              None0x9761e00x554GIF image data, version 89a, 26 x 26EnglishUnited States0.7727272727272727
                                              None0x9767340x5bfPNG image data, 26 x 26, 8-bit/color RGB, interlacedEnglishUnited States0.8096532970768185
                                              None0x976cf40x4c3GIF image data, version 89a, 26 x 26EnglishUnited States0.7547169811320755
                                              None0x9771b80x56cPNG image data, 26 x 26, 8-bit/color RGBA, interlacedEnglishUnited States0.7694524495677233
                                              None0x9777240x552GIF image data, version 89a, 26 x 26EnglishUnited States0.7709251101321586
                                              None0x977c780x5a8PNG image data, 26 x 26, 8-bit/color RGB, interlacedEnglishUnited States0.787292817679558
                                              None0x9782200x4c3GIF image data, version 89a, 26 x 26EnglishUnited States0.7555373256767842
                                              None0x9786e40x52bPNG image data, 26 x 26, 8-bit/color RGBA, interlacedEnglishUnited States0.7732426303854876
                                              None0x978c100x11fbHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.33934390614816423
                                              None0x979e0c0x596GIF image data, version 89a, 24 x 24EnglishUnited States0.7559440559440559
                                              None0x97a3a40x5f3PNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8036769533814839
                                              None0x97a9980x57cGIF image data, version 89a, 24 x 24EnglishUnited States0.7649572649572649
                                              None0x97af140x576PNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.7811158798283262
                                              None0x97b48c0x4dcGIF image data, version 89a, 24 x 24EnglishUnited States0.7821543408360129
                                              None0x97b9680x4ccPNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.742671009771987
                                              None0x97be340x385GIF image data, version 89a, 60 x 60EnglishUnited States0.16426193118756938
                                              None0x97c1bc0x13cPNG image data, 60 x 60, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9462025316455697
                                              None0x97c2f80x1caUnicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.5611353711790393
                                              None0x97c4c40x1649HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3030674846625767
                                              None0x97db100x46fGIF image data, version 89a, 17 x 17EnglishUnited States0.760352422907489
                                              None0x97df800x498PNG image data, 17 x 17, 8-bit/color RGBA, non-interlacedEnglishUnited States0.7551020408163265
                                              None0x97e4180x4e0GIF image data, version 89a, 17 x 17EnglishUnited States0.749198717948718
                                              None0x97e8f80x4a0PNG image data, 17 x 17, 8-bit/color RGBA, non-interlacedEnglishUnited States0.731418918918919
                                              None0x97ed980x50eGIF image data, version 89a, 30 x 30EnglishUnited States0.7851622874806801
                                              None0x97f2a80x5d4PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States0.811662198391421
                                              None0x97f87c0xe95HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3570854540583981
                                              None0x9807140x1caASCII text, with CRLF line terminatorsEnglishUnited States0.3624454148471616
                                              None0x9808e00x121dUnicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.2607289195600604
                                              None0x981b000x898GIF image data, version 89a, 48 x 48EnglishUnited States1.005
                                              None0x9823980xfacPNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0027417746759721
                                              DLLImport
                                              KERNEL32.dllGetLastError, LoadResource, LockResource, SizeofResource, FindResourceW, MultiByteToWideChar, FreeLibrary, LoadLibraryExW, LocalFree, FormatMessageW, CreateDirectoryW, CreateFileW, DeleteFileW, FindClose, FindFirstFileW, FindNextFileW, GetFileAttributesW, GetFullPathNameW, GetShortPathNameW, GetTempFileNameW, ReadFile, RemoveDirectoryW, SetFileAttributesW, CloseHandle, SetUnhandledExceptionFilter, WaitForSingleObject, WaitForSingleObjectEx, GetCurrentProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, GetSystemDirectoryW, GetVersionExW, IsWow64Process, GetSystemWow64DirectoryA, GetModuleFileNameW, GetModuleHandleW, AddDllDirectory, SetDefaultDllDirectories, SetDllDirectoryW, CopyFileW, WideCharToMultiByte, GetLocaleInfoW, GetCommandLineW, FindResourceA, LocalAlloc, GetProcAddress, LoadLibraryW, GetCurrentProcessId, FreeConsole, AttachConsole, DecodePointer, HeapDestroy, HeapAlloc, HeapReAlloc, HeapFree, HeapSize, GetProcessHeap, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, GetModuleHandleA, GetModuleFileNameA, DuplicateHandle, InitializeCriticalSection, GetCurrentThread, GetCurrentThreadId, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemDirectoryA, LoadLibraryA, FindVolumeClose, RaiseException, InitializeCriticalSectionAndSpinCount, Sleep, GetLogicalDriveStringsA, GetVolumeInformationA, FindFirstVolumeA, GetSystemFirmwareTable, GetStdHandle, SetCurrentDirectoryA, GetCurrentDirectoryA, FindFirstFileA, FindNextFileA, CreateProcessA, GetStartupInfoA, SetDllDirectoryA, GetFileInformationByHandleEx, GetFileTime, SetFileTime, GetSystemTime, SystemTimeToFileTime, GetDateFormatW, GetTimeFormatW, GetTempPathW, GetSystemInfo, FileTimeToLocalFileTime, LocalFileTimeToFileTime, GetSystemTimeAsFileTime, FileTimeToSystemTime, SetLastError, GlobalAlloc, GlobalSize, GlobalUnlock, GlobalLock, GlobalFree, MulDiv, lstrcmpA, OutputDebugStringA, EncodePointer, GlobalDeleteAtom, lstrcmpW, GlobalAddAtomW, GlobalFindAtomW, CompareStringW, FlushFileBuffers, GetFileSize, GetVolumeInformationW, LockFile, SetEndOfFile, SetFilePointer, UnlockFile, WriteFile, lstrcmpiW, MoveFileW, GetStringTypeExW, GetThreadLocale, SetEvent, CreateEventW, SetThreadPriority, SuspendThread, ResumeThread, GetPrivateProfileIntW, GetPrivateProfileStringW, WritePrivateProfileStringW, CompareStringA, GlobalReAlloc, GlobalHandle, LocalReAlloc, GlobalGetAtomNameW, GetAtomNameW, GlobalFlags, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, VirtualProtect, GetFileAttributesExW, GetFileSizeEx, SystemTimeToTzSpecificLocalTime, SetErrorMode, GetCurrentDirectoryW, VerSetConditionMask, lstrcpyW, VerifyVersionInfoW, FindResourceExW, GetWindowsDirectoryW, GetTickCount64, SearchPathW, GetProfileIntW, GetDiskFreeSpaceW, ReplaceFileW, GetUserDefaultLCID, GetTickCount, LocalLock, LocalUnlock, UnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, ResetEvent, IsDebuggerPresent, QueryPerformanceCounter, InitializeSListHead, VirtualQuery, WriteConsoleW, OutputDebugStringW, FormatMessageA, GetStringTypeW, GetLocaleInfoEx, LCMapStringEx, CompareStringEx, GetCPInfo, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, ExitProcess, GetModuleHandleExW, CreateThread, ExitThread, FreeLibraryAndExitThread, SetStdHandle, VirtualAlloc, GetCommandLineA, HeapQueryInformation, QueryPerformanceFrequency, GetConsoleMode, ReadConsoleW, GetConsoleOutputCP, LCMapStringW, IsValidLocale, EnumSystemLocalesW, GetTimeZoneInformation, SetFilePointerEx, SetCurrentDirectoryW, MoveFileExW, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetConsoleCtrlHandler, LoadLibraryExA
                                              NameOrdinalAddress
                                              ??0DSMIPMIInterfaceImpl@@QAE@XZ10x40d1b1
                                              ??1DSMIPMIInterfaceImpl@@UAE@XZ20x40889b
                                              ??4DSMIPMIInterfaceImpl@@QAEAAV0@ABV0@@Z30x41976d
                                              ??_7DSMIPMIInterfaceImpl@@6B@40x9d8a50
                                              ?IPMIRequest@DSMIPMIInterfaceImpl@@QAEIPAU_DSMIPMICommandData@@@Z50x407a77
                                              ?Initialize@DSMIPMIInterfaceImpl@@QAEIPBU_DSMIPMIConfiguration@@@Z60x4229ad
                                              ?Initialize@DSMIPMIInterfaceImpl@@QAEIVDSMString@@@Z70x40b965
                                              ?InitializeDSMLogger@DSMIPMIInterfaceImpl@@AAEXXZ80x40c18f
                                              ?Release@DSMIPMIInterfaceImpl@@QAEIXZ90x4075c7
                                              ?freePMInfo@@YAHPAUPMInfo@@@Z100x40aa88
                                              ?getPMInfo@@YAHHPAPAUPMInfo@@@Z110x406410
                                              ?getPMStatus@@YAHXZ120x41279c
                                              ?getTestPMInfo@@YAHHPAPAUPMInfo@@@Z130x406ea1
                                              ?mDrvHandler@DSMIPMIInterfaceImpl@@0VDriverManager@@A140xabba80
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              No network behavior found

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:0
                                              Start time:11:31:04
                                              Start date:29/10/2024
                                              Path:C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Dell-Pair-Application_9DY26_WIN_1.2.4_A00-00.EXE"
                                              Imagebase:0x820000
                                              File size:50'595'424 bytes
                                              MD5 hash:51EF7E32D7120C644FABEE284AF7501A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:2%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:26.2%
                                                Total number of Nodes:65
                                                Total number of Limit Nodes:7
                                                execution_graph 49864 86af30 49865 86af65 49864->49865 49873 86af57 49864->49873 49866 86af96 MultiByteToWideChar 49865->49866 49867 86afc0 49866->49867 49868 86afe4 GetLastError 49867->49868 49867->49873 49869 86aff3 49868->49869 49870 86affc MultiByteToWideChar 49869->49870 49869->49873 49871 86b01d 49870->49871 49872 86b039 MultiByteToWideChar 49871->49872 49872->49873 49874 86a3b0 FindResourceW 49875 86a3e3 49874->49875 49833 887790 49834 8877f5 49833->49834 49835 887e45 49834->49835 49836 88789b 49834->49836 49837 887e4d DeleteFileW 49835->49837 49838 887e5d 49837->49838 49838->49836 49847 888820 SetDllDirectoryW 49848 88887f 49847->49848 49849 8888b9 GetCurrentProcess 49848->49849 49850 834d9e 49849->49850 49851 8888d1 IsWow64Process 49850->49851 49852 8888df 49851->49852 49853 888961 GetSystemDirectoryW 49852->49853 49854 8888e5 GetSystemWow64DirectoryA 49852->49854 49855 834d9e 49853->49855 49860 888900 49854->49860 49856 88897c AddDllDirectory 49855->49856 49862 88895f 49856->49862 49857 888992 SetDefaultDllDirectories 49858 834d9e 49857->49858 49859 8889a6 SetUnhandledExceptionFilter 49858->49859 49863 8889ba 49859->49863 49861 888946 AddDllDirectory 49860->49861 49860->49862 49861->49862 49862->49857 49831 89a780 CreateDirectoryW 49832 89a7a3 49831->49832 49839 89de10 49840 83051e 49839->49840 49841 89de64 SHGetFolderPathW 49840->49841 49842 89de8c 49841->49842 49876 89d4c0 GetFileAttributesW 49877 89d4d7 49876->49877 49878 89a7e0 49879 89a82c 49878->49879 49880 89ab63 GetLastError 49879->49880 49891 89afbf 49879->49891 49882 89ab7b 49880->49882 49881 89afa7 GetLastError 49881->49891 49883 89ac3e RemoveDirectoryW 49882->49883 49889 89ab8a 49882->49889 49884 89ac4e 49883->49884 49885 89ac56 49884->49885 49887 89ad45 49884->49887 49886 89aca4 DeleteFileW 49885->49886 49890 89acb4 49886->49890 49888 89ad9d GetLastError 49887->49888 49888->49889 49889->49881 49890->49889 49843 8cc290 49844 8cc2b0 49843->49844 49845 8cc2ba SetSecurityDescriptorControl 49844->49845 49846 8cc2d7 49844->49846 49845->49846 49892 8d07f0 49893 8d084d 49892->49893 49894 8d08c3 GetCommandLineW 49893->49894 49895 8d08d2 49893->49895 49894->49895

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 292 888820-8888e3 SetDllDirectoryW call 834d9e call 82d5ad * 2 GetCurrentProcess call 834d9e IsWow64Process call 834d9e 303 888961-88898d GetSystemDirectoryW call 834d9e AddDllDirectory call 834d9e 292->303 304 8888e5-888919 GetSystemWow64DirectoryA call 834d9e call 87ae90 292->304 311 888992-8889d8 SetDefaultDllDirectories call 834d9e SetUnhandledExceptionFilter call 834d9e call 828cbf 303->311 314 88891b-88895a call 87ae90 call 829c3c AddDllDirectory call 834d9e 304->314 315 88895f 304->315 326 8889da-8889ed call 838615 311->326 327 8889ef 311->327 314->315 315->311 329 8889f9-888a33 call 828cbf 326->329 327->329 333 888a4a 329->333 334 888a35-888a48 call 838615 329->334 336 888a54-888aba call 841003 call 82e87c call 841d00 call 82b9b5 333->336 334->336 346 888abc-888acb 336->346 347 888acd 336->347 348 888ad7-888b03 call 835343 call 82e87c call 828198 346->348 347->348 355 888b05-888b14 348->355 356 888b16 348->356 357 888b20-888c8d call 835343 call 82e87c call 828198 call 828aa8 call 82e87c call 83b7ca call 83a370 call 828aa8 call 833ddb call 83a370 call 828cbf 355->357 356->357 380 888c8f-888cb8 call 826690 call 83bdab 357->380 381 888cd1 357->381 388 888cbd-888ccf 380->388 383 888cdb-888d15 call 828cbf 381->383 389 888d59 383->389 390 888d17-888d40 call 826690 call 83cc1a 383->390 388->383 391 888d63-888da0 call 828cbf 389->391 399 888d45-888d57 390->399 397 888da2-888de2 call 826690 call 835f23 391->397 398 888de4 391->398 401 888dee-888e29 call 83e84e call 834afb 397->401 398->401 399->391 409 888e98-888edb call 821578 call 825d0d 401->409 410 888e2b-888e5b call 828aa8 call 825d0d 401->410 421 888ee9 409->421 422 888edd-888ee7 409->422 417 888e60-888e6f 410->417 419 888e7d 417->419 420 888e71-888e7b 417->420 423 888e87-888e96 419->423 420->423 424 888ef3-888efc 421->424 422->424 425 888f02-888f0e 423->425 424->425 426 888f10-888f20 call 82e6e2 425->426 427 888f25-888f32 call 834afb 425->427 432 888fd0-888fdc 426->432 433 888f6d-888fa9 call 821578 call 82325b 427->433 434 888f34-888f44 call 82cec3 427->434 435 888fde-888fee call 834afb 432->435 436 888ff0-889032 call 83212f call 830c17 call 8416c0 432->436 452 888fab-888fb5 433->452 453 888fb7 433->453 444 888f52 434->444 445 888f46-888f50 434->445 435->436 448 889037-8890e7 call 824a25 call 830c17 call 8416c0 call 828aa8 call 821816 call 83a370 call 82e74b call 8364dc 435->448 462 889330-889352 call 82e6e2 call 835ed3 436->462 449 888f5c-888f6b 444->449 445->449 488 8890e9-889107 call 82c1e9 448->488 489 88910c-889173 call 828aa8 call 821816 call 83a370 call 82e74b call 8364dc 448->489 449->432 457 888fc1-888fca 452->457 453->457 457->432 470 889357-8893bc call 83e69b call 823e27 call 83a370 call 831b9e call 82d0fd call 834d9e 462->470 488->489 504 889179-8891b9 call 826690 call 83bb2b 489->504 505 88921a-889281 call 828aa8 call 821816 call 83a370 call 82e74b call 8364dc 489->505 504->505 514 8891bb-889215 call 828aa8 call 833ddb call 83a370 call 82c1e9 504->514 526 889328-88932b call 832c2e 505->526 527 889287-8892c7 call 826690 call 82ec1e 505->527 514->505 526->462 527->526 535 8892c9-889323 call 828aa8 call 833ddb call 83a370 call 82c1e9 527->535 535->526
                                                APIs
                                                • SetDllDirectoryW.KERNEL32(00DC1DDC), ref: 00888872
                                                • GetCurrentProcess.KERNEL32(00000000), ref: 008888C4
                                                • IsWow64Process.KERNEL32(00000000), ref: 008888D2
                                                • GetSystemWow64DirectoryA.KERNEL32(?,00000104), ref: 008888F3
                                                • AddDllDirectory.KERNELBASE(?), ref: 00888952
                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0088896F
                                                • AddDllDirectory.KERNEL32(?), ref: 00888985
                                                • SetDefaultDllDirectories.KERNEL32(00000400), ref: 00888999
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_0005AEF0), ref: 008889AD
                                                Strings
                                                • DupAPI::Init, xrefs: 00888B45
                                                • freshinstall, xrefs: 00889184
                                                • Update Package Execution Started, xrefs: 00888B80
                                                • force, xrefs: 00889292
                                                • The parameter force is not found in mup file .. dropping /f from commandline, xrefs: 008892C9
                                                • passthrough, xrefs: 00888F10
                                                • debug, xrefs: 00889080
                                                • The bahaviour freshinstall is not found in mup file .. dropping /i from commandline, xrefs: 008891BB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: Directory$ProcessSystemWow64$CurrentDefaultDirectoriesExceptionFilterUnhandled
                                                • String ID: DupAPI::Init$The bahaviour freshinstall is not found in mup file .. dropping /i from commandline$The parameter force is not found in mup file .. dropping /f from commandline$Update Package Execution Started$debug$force$freshinstall$passthrough
                                                • API String ID: 3797414157-3376901661
                                                • Opcode ID: 049407f01a2760c26a5e925b919f824912315f6e4bbb9db321c30b267d3ae108
                                                • Instruction ID: 2527e39c512b70d7362b77be956e3035cbdaf3354023faefca406f7e380f109e
                                                • Opcode Fuzzy Hash: 049407f01a2760c26a5e925b919f824912315f6e4bbb9db321c30b267d3ae108
                                                • Instruction Fuzzy Hash: 6E623970D04268DADB14EB68CC55BEEBBB1FF54304F1441D9E049AB282DB756B84CFA2

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 89a7e0-89a86d call 828aa8 call 82e87c call 83b7ca call 83a370 call 83eef7 11 89a873-89a88f 0->11 12 89a912-89a92e 0->12 13 89a8d8-89a90d call 821578 call 833ddb call 83a370 11->13 14 89a891-89a8a5 call 83e0d8 11->14 15 89a930-89a944 call 83e0d8 12->15 16 89a977-89aa47 call 821578 call 82fe16 call 840e1e call 83a370 call 82781a call 833ddb call 822d83 call 83e8d0 12->16 13->12 14->13 27 89a8a7-89a8d5 call 828aa8 call 832337 call 83e53d 14->27 15->16 28 89a946-89a974 call 828aa8 call 832337 call 83e53d 15->28 56 89aa49-89aa5d call 83e0d8 16->56 57 89aa90-89aac9 call 831338 16->57 27->13 28->16 56->57 62 89aa5f-89aa8d call 830ad2 call 832337 call 83e53d 56->62 65 89aacf-89ab88 call 84013f call 83fe74 call 82f777 call 836022 call 82fe16 * 2 call 839a33 GetLastError call 834d9e 57->65 66 89b281-89b2c4 call 829728 * 2 call 83a370 call 823e27 57->66 62->57 103 89abd9-89ac03 call 83f0f0 call 830ad2 call 83061d 65->103 104 89ab8a-89ab91 65->104 89 89b2ca-89b302 call 831b9e call 82d0fd call 834d9e 66->89 121 89ac08-89ac24 103->121 106 89ab93-89abcf call 83a370 * 3 call 829728 104->106 107 89abd4 104->107 106->107 109 89af92-89afa2 call 83f0f0 call 82bd89 107->109 120 89afa7-89afce GetLastError call 834d9e 109->120 131 89b240-89b27c call 83a370 * 3 call 829728 120->131 132 89afd4-89afde 120->132 124 89ac33-89ac50 call 83f0f0 RemoveDirectoryW call 834d9e 121->124 125 89ac26-89ac2d 121->125 148 89ad45-89adc4 call 828aa8 call 833ddb call 83a370 call 83f0f0 call 82bd89 GetLastError call 834d9e 124->148 149 89ac56-89acb6 call 828aa8 call 833ddb call 83a370 call 83f0f0 DeleteFileW call 834d9e 124->149 125->124 128 89ae0e-89ae48 call 821578 call 83b3c9 125->128 156 89ae4e-89ae68 128->156 157 89af51-89af8d call 83a370 * 3 call 829728 128->157 131->66 132->131 136 89afe4-89affe 132->136 140 89b000-89b014 call 83e0d8 136->140 141 89b047-89b0ec call 821578 call 82fe16 call 840e1e call 83a370 call 82781a call 83051e call 83eb78 136->141 140->141 161 89b016-89b044 call 828aa8 call 832337 call 83e53d 140->161 242 89b178-89b23b call 833ddb call 83a370 * 5 call 829728 * 3 call 83a370 call 823e27 141->242 243 89b0f2-89b10d 141->243 236 89ae09 148->236 237 89adc6-89ae04 call 828aa8 call 833ddb call 83a370 148->237 222 89acb8-89acfb call 828aa8 call 833ddb call 83a370 149->222 223 89acfd-89ad3b call 828aa8 call 833ddb call 83a370 149->223 164 89ae6a-89ae7e call 83e0d8 156->164 165 89aeb1-89af4c call 821578 call 82fe16 call 840e1e call 83a370 call 82781a call 833ddb call 83a370 156->165 157->109 161->141 164->165 189 89ae80-89aeae call 828aa8 call 832337 call 83e53d 164->189 165->157 189->165 263 89ad40 222->263 223->263 236->157 237->236 242->89 249 89b10f-89b123 call 83e0d8 243->249 250 89b156-89b173 call 840e1e * 2 243->250 249->250 265 89b125-89b153 call 828aa8 call 832337 call 83e53d 249->265 250->242 263->236 265->250
                                                Strings
                                                • Failure creating directory: ", xrefs: 0089B01A
                                                • Symlink/Junction folder deletion Successful., xrefs: 0089AD45
                                                • Symlink/Junction folder deletion failed. Could be a file, xrefs: 0089AC56
                                                • 5, xrefs: 0089AB8A
                                                • FileUtility::CreateDirectoryTree, xrefs: 0089A81F
                                                • ;XY, xrefs: 0089B029
                                                • Creating directory tree: ", xrefs: 0089A94A
                                                • Symlink/Junction deletion failed for a file or file does not exist., xrefs: 0089ACB8
                                                • Folder creation fails after Symlink/junction deletion, xrefs: 0089ADC6
                                                • ModifyACL Error for the Folder: ", xrefs: 0089AE84
                                                • EXIT_FAILURE_CREATINGDACL: ", xrefs: 0089A8AB
                                                • Symlink/Junction deletion successful for a file., xrefs: 0089ACFD
                                                • The error message reported by the system is: , xrefs: 0089B129
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: The error message reported by the system is: $5$Creating directory tree: "$EXIT_FAILURE_CREATINGDACL: "$Failure creating directory: "$FileUtility::CreateDirectoryTree$Folder creation fails after Symlink/junction deletion$ModifyACL Error for the Folder: "$Symlink/Junction deletion failed for a file or file does not exist.$Symlink/Junction deletion successful for a file.$Symlink/Junction folder deletion Successful.$Symlink/Junction folder deletion failed. Could be a file$;XY
                                                • API String ID: 0-1638253330
                                                • Opcode ID: 14e395e1967359cff072427511192bc990f6022a36795082dd5dabe057ceb876
                                                • Instruction ID: f8227accde9090c4d458ecb765cb7ebb05c8a1364dfb682ca151112a9841818d
                                                • Opcode Fuzzy Hash: 14e395e1967359cff072427511192bc990f6022a36795082dd5dabe057ceb876
                                                • Instruction Fuzzy Hash: 4E527971800268DADB24EB68DD56BDDB770FF51304F1441E9E04AA7292EB745F88CBA3

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 543 8d07f0-8d08c1 call 828aa8 call 82e87c call 83b7ca call 83a370 call 826c85 call 833ddb call 82e6e2 call 82ce4b 560 8d08db-8d0904 call 821578 call 842930 543->560 561 8d08c3-8d08d6 GetCommandLineW call 834d9e call 82e6e2 543->561 568 8d0909-8d0920 call 834afb 560->568 561->560 571 8d0926-8d09dc call 826c85 call 82d076 call 83a370 call 82781a call 833ddb call 83a370 * 2 call 823e27 call 83a370 568->571 572 8d09e1-8d0a80 call 8229cd call 83ae88 call 833746 call 82d076 call 83a370 call 82f687 * 2 call 83a519 568->572 613 8d1202-8d123b call 831b9e call 82d0fd call 834d9e 571->613 605 8d0acb-8d0af3 call 83f0f0 call 823224 572->605 606 8d0a82-8d0a96 call 83e0d8 572->606 622 8d0af9-8d0bcc call 832a12 call 8229cd call 832a12 call 83ae88 call 833746 call 82d076 call 83a370 * 3 605->622 623 8d0bd1-8d0cd3 605->623 606->605 614 8d0a98-8d0ac8 call 83da1b call 832337 call 83e53d 606->614 614->605 622->623 633 8d0d1e-8d0d98 call 828aa8 * 2 call 821578 call 8229cd * 2 623->633 634 8d0cd5-8d0ce9 call 83e0d8 623->634 667 8d0d9e-8d0e8e call 8229cd call 83ae88 call 833746 call 82d076 call 83a370 call 828cba call 826c85 call 82d076 call 83a370 call 833ddb 633->667 668 8d0e93-8d0e9a 633->668 634->633 646 8d0ceb-8d0d1b call 83da1b call 832337 call 83e53d 634->646 646->633 726 8d111b-8d11fc call 83a370 * 3 call 83497a call 83a370 * 2 call 823e27 call 83a370 667->726 672 8d0f95-8d0fc2 call 83f0f0 call 823224 call 822b7b 668->672 673 8d0ea0-8d0f90 call 8229cd call 83ae88 call 833746 call 82d076 call 83a370 call 828cba call 826c85 call 82d076 call 83a370 call 833ddb 668->673 696 8d10cc-8d1116 call 83d9c6 call 82eca0 call 82d076 call 83a370 672->696 697 8d0fc8-8d10c7 call 82e6e2 call 826c85 call 82d076 call 83a370 call 82781a call 833ddb call 83a370 * 3 call 83497a call 83a370 * 2 call 823e27 call 83a370 672->697 673->726 696->726 697->613 726->613
                                                APIs
                                                • GetCommandLineW.KERNEL32(00DC5114,00DC5110,00000000,?), ref: 008D08C5
                                                Strings
                                                • ^[/|-]passthrough[ ]*(.*), xrefs: 008D0CF1
                                                • (Exe is empty), xrefs: 008D0972
                                                • CCommandLineParser::GetPassthroughParameters, xrefs: 008D0840
                                                • /passthrough /factoryinstall, xrefs: 008D0D36
                                                • Parse Error from fragment: , xrefs: 008D0FD9
                                                • /factoryinstall /passthrough option is given. Parameters to vendor installer: , xrefs: 008D0E29
                                                • Original command line : , xrefs: 008D0873
                                                • ^[" ]*, xrefs: 008D0A9E
                                                • /passthrough /factoryinstall option is given. Parameters to vendor installer: , xrefs: 008D0F2B
                                                • Parse Error from fragment: , xrefs: 008D092A
                                                • /factoryinstall /passthrough, xrefs: 008D0D22
                                                • (Parameters are present before passthough), xrefs: 008D1021
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: CommandLine
                                                • String ID: (Exe is empty)$ (Parameters are present before passthough)$/factoryinstall /passthrough$/factoryinstall /passthrough option is given. Parameters to vendor installer: $/passthrough /factoryinstall$/passthrough /factoryinstall option is given. Parameters to vendor installer: $CCommandLineParser::GetPassthroughParameters$Original command line : $Parse Error from fragment: $Parse Error from fragment: $^[" ]*$^[/|-]passthrough[ ]*(.*)
                                                • API String ID: 3253501508-3621482309
                                                • Opcode ID: 6bd96195dffa7001749492f60f752841c34495d7b6792ec978dfc21063fcc497
                                                • Instruction ID: f181d5fb2105a212eaa4926f4fb1e38f4349281b99c677ef492b6a3f58e1f44d
                                                • Opcode Fuzzy Hash: 6bd96195dffa7001749492f60f752841c34495d7b6792ec978dfc21063fcc497
                                                • Instruction Fuzzy Hash: C9427C71801258EADB14EB68CC95BDDBB74FF51304F5481D9E04AA7292DB705F88CFA2

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1309 86af30-86af55 1310 86af57-86af60 1309->1310 1311 86af65-86afbb call 83feba call 8232e2 MultiByteToWideChar call 834d9e 1309->1311 1312 86b0a2-86b0b0 call 834d9e 1310->1312 1320 86afc0-86afc2 1311->1320 1321 86afc4-86afcb 1320->1321 1322 86afcd 1320->1322 1323 86afd4-86afde 1321->1323 1322->1323 1324 86afe4-86aff6 GetLastError call 834d9e 1323->1324 1325 86b07d-86b081 1323->1325 1324->1325 1331 86affc-86b065 MultiByteToWideChar call 834d9e call 8232e2 MultiByteToWideChar call 834d9e 1324->1331 1325->1312 1326 86b083-86b09d call 82d512 call 835398 1325->1326 1326->1312 1339 86b067-86b06e 1331->1339 1340 86b070 1331->1340 1341 86b077-86b07a 1339->1341 1340->1341 1341->1325
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 0086AFB3
                                                • GetLastError.KERNEL32(?,?), ref: 0086AFE6
                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0086B010
                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?,?), ref: 0086B056
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$ErrorLast
                                                • String ID:
                                                • API String ID: 1717984340-0
                                                • Opcode ID: 939584872a210de9a92b547432cc0ea4cc02fda93f6e8b62e8ee4469ca0bf78a
                                                • Instruction ID: 2b54436eb712cb457e4c42d7e13d24c47bffd544bf3e19cfdb0a4752ed4989c4
                                                • Opcode Fuzzy Hash: 939584872a210de9a92b547432cc0ea4cc02fda93f6e8b62e8ee4469ca0bf78a
                                                • Instruction Fuzzy Hash: 8641E8B5D00218AFDB14DF98C892BAEBBB5FF48304F108558F515EB280D775AE409BD2

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1500 887790-8877f3 1501 88783a-88787e call 83051e * 3 call 83ed94 1500->1501 1502 8877f5-887809 call 83e0d8 1500->1502 1520 887884-887888 call 8276cb 1501->1520 1521 8879b6-8879c3 call 834afb 1501->1521 1502->1501 1508 88780b-887837 call 83051e call 832337 call 83e53d 1502->1508 1508->1501 1524 88788d-887899 1520->1524 1528 8879c9-8879ea call 828cba call 82bb9a 1521->1528 1529 887a9c-887aac call 8229cd 1521->1529 1526 88789b-8878de call 821578 call 83a370 * 3 1524->1526 1527 8878e3-8878f8 call 82bb9a 1524->1527 1585 887fdb-888013 call 831b9e call 82d0fd call 834d9e 1526->1585 1542 8878fa-88793d call 821578 call 83a370 * 3 1527->1542 1543 887942-887967 call 828cba call 822ac7 1527->1543 1555 8879ec-887a2f call 821578 call 83a370 * 3 1528->1555 1556 887a34-887a4d call 822ac7 1528->1556 1539 887aae-887ad3 call 828cba call 822ac7 1529->1539 1540 887b1f-887b40 call 828cba call 823d7d 1529->1540 1578 887b1d 1539->1578 1579 887ad5-887b18 call 821578 call 83a370 * 3 1539->1579 1576 887b8a-887b9f call 82ec19 1540->1576 1577 887b42-887b85 call 821578 call 83a370 * 3 1540->1577 1542->1585 1580 887969-8879ac call 821578 call 83a370 * 3 1543->1580 1581 8879b1 1543->1581 1555->1585 1574 887a4f-887a92 call 821578 call 83a370 * 3 1556->1574 1575 887a97 1556->1575 1574->1585 1575->1576 1600 887d31-887d99 call 834c68 call 833746 call 83f0f0 call 830ad2 call 834d94 1576->1600 1601 887ba5-887bba call 8276cb 1576->1601 1577->1585 1578->1576 1579->1585 1580->1585 1581->1576 1670 887d9b-887ded call 821578 call 83a370 * 4 1600->1670 1671 887df2-887e3a call 83f0f0 call 830ad2 call 83061d 1600->1671 1628 887bbc-887bff call 821578 call 83a370 * 3 1601->1628 1629 887c04-887c19 call 82ec19 1601->1629 1628->1585 1646 887c1b-887c5e call 821578 call 83a370 * 3 1629->1646 1647 887c63-887c78 call 82bb9a 1629->1647 1646->1585 1659 887c7a-887cbd call 821578 call 83a370 * 3 1647->1659 1660 887cc2-887ce7 call 828cba call 822ac7 1647->1660 1659->1585 1660->1600 1684 887ce9-887d2c call 821578 call 83a370 * 3 1660->1684 1670->1585 1702 887e3c-887e43 1671->1702 1703 887e45-887e5f call 83f0f0 DeleteFileW call 834d9e 1671->1703 1684->1585 1702->1703 1706 887eb8-887f11 call 83f0f0 call 83ebf0 call 826d75 call 836bf3 call 83f0f0 call 83ddf9 1702->1706 1703->1706 1721 887e61-887eb3 call 821578 call 83a370 * 4 1703->1721 1736 887f16-887f38 call 826d75 1706->1736 1721->1585 1742 887f3a-887f43 1736->1742 1743 887f61-887fd8 call 83eef2 call 82b000 call 824b83 call 82117c call 83a370 * 4 1736->1743 1742->1743 1744 887f45-887f5c call 83bf40 * 2 1742->1744 1743->1585 1744->1743
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 59862913c0e71b0d0e87bf64d5be73444231ff204e061f206234b3426621b66c
                                                • Instruction ID: 80afe8438550325fbaa37df0b3853fc90063974172b7e1065522f4720f64ea0d
                                                • Opcode Fuzzy Hash: 59862913c0e71b0d0e87bf64d5be73444231ff204e061f206234b3426621b66c
                                                • Instruction Fuzzy Hash: BD428430D05258DACF14EBA8D856BDDBB74FF65304F2080A8E056A7292DB309F49CB92

                                                Control-flow Graph

                                                APIs
                                                • SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,?,3FF913FA), ref: 0089DE7F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: FolderPath
                                                • String ID:
                                                • API String ID: 1514166925-0
                                                • Opcode ID: be68d78c73d48b748dd58518f577c8820c30785650867062ca9abed7595acd73
                                                • Instruction ID: 7b530d624186b1bf2c410c63ed8df703226fb59ff5e525fc31463325bb656a61
                                                • Opcode Fuzzy Hash: be68d78c73d48b748dd58518f577c8820c30785650867062ca9abed7595acd73
                                                • Instruction Fuzzy Hash: 1A317C719052589ADB24EB68DC4ABDDB7B4FB44300F1081A9A40AE7291DB756F88CB92

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1790 86a3b0-86a3de FindResourceW call 834d9e 1792 86a3e3-86a3ea 1790->1792 1793 86a3f0-86a401 call 837328 1792->1793 1794 86a3ec-86a3ee 1792->1794 1796 86a404-86a412 call 834d9e 1793->1796 1794->1796
                                                APIs
                                                • FindResourceW.KERNEL32(?,?,00000006), ref: 0086A3D6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: FindResource
                                                • String ID:
                                                • API String ID: 1635176832-0
                                                • Opcode ID: 11a433c60bfb1276fcc252ff759db3705b2fcf3b53337be6737e965717b6969f
                                                • Instruction ID: 64db61959bdc5eb493977acfe6d30cd1d305044cb5775c3b8d95031dc3f2d31c
                                                • Opcode Fuzzy Hash: 11a433c60bfb1276fcc252ff759db3705b2fcf3b53337be6737e965717b6969f
                                                • Instruction Fuzzy Hash: 34F090B2D14118BFCB10EF5CD982AAE37A8FB44310F108568F909DB280E675EE40A7D2
                                                APIs
                                                • SetSecurityDescriptorControl.ADVAPI32(00001000,00001000,00001000), ref: 008CC2CA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: ControlDescriptorSecurity
                                                • String ID:
                                                • API String ID: 3376414291-0
                                                • Opcode ID: 2481dc976966895101dee930fc55e58c2f770e1661cc9185fa415aec0d2bf52b
                                                • Instruction ID: 2767b421ae36052edd8ed6e714bd2991c4c979d2e2b68a61e79d016edbe2e257
                                                • Opcode Fuzzy Hash: 2481dc976966895101dee930fc55e58c2f770e1661cc9185fa415aec0d2bf52b
                                                • Instruction Fuzzy Hash: FFF08CB11402186BDB10AF95C882FAA37A8BB94394F004018F94DCF281DAB6E88187D6
                                                APIs
                                                • CreateDirectoryW.KERNEL32(?,?), ref: 0089A796
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: CreateDirectory
                                                • String ID:
                                                • API String ID: 4241100979-0
                                                • Opcode ID: 2495be8726d24eb9f90564e74427f205f42bbcd88a49de7f46a40b6d406b39c5
                                                • Instruction ID: eae75628070d65011167405e21212b5a989b61e8be8988a71c2bafffcb7d437e
                                                • Opcode Fuzzy Hash: 2495be8726d24eb9f90564e74427f205f42bbcd88a49de7f46a40b6d406b39c5
                                                • Instruction Fuzzy Hash: D5E06DB680521CBBCB10EF9D8842AEE7778EB44214F044185E84897340D671AE4097D2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2940272397.00000000055A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_55a0000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                • Instruction ID: 1a7bc2fc193db2a1a018c7319122b1fa4c48ec4ba8e059f8c95d28fd299d7ded
                                                • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2940272397.00000000055A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_55a0000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                • Instruction ID: 1a7bc2fc193db2a1a018c7319122b1fa4c48ec4ba8e059f8c95d28fd299d7ded
                                                • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                • Instruction Fuzzy Hash:
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,3FF913FA), ref: 008C803B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: FileFindFirst
                                                • String ID: %ls%ls%ls$%ls\*
                                                • API String ID: 1974802433-3890807286
                                                • Opcode ID: c74c4e7d113d85a549fa40ec0f6e84faaefb30bb40ca92025ff84634ab7129d5
                                                • Instruction ID: 117a5454a861cba112526efbb2674345990408688888980e601b0372fdb03718
                                                • Opcode Fuzzy Hash: c74c4e7d113d85a549fa40ec0f6e84faaefb30bb40ca92025ff84634ab7129d5
                                                • Instruction Fuzzy Hash: 284165B2940518DFCB20EB64DC55F9DB379FB84710F00869DA519E7180EB319E488F95
                                                APIs
                                                • LoadResource.KERNEL32(?,?), ref: 0086C3B5
                                                • LockResource.KERNEL32(00000000), ref: 0086C3D8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: Resource$LoadLock
                                                • String ID:
                                                • API String ID: 1037334470-0
                                                • Opcode ID: 8072fa292b97dfe4cf4f9fecbffe0259e048db0746b7ea4a62a812f4da78656a
                                                • Instruction ID: 81630bd1b070a8e9b64fe3436a369b0dabd77288d8b42bb9111d4ec213f3f313
                                                • Opcode Fuzzy Hash: 8072fa292b97dfe4cf4f9fecbffe0259e048db0746b7ea4a62a812f4da78656a
                                                • Instruction Fuzzy Hash: 80312670D0021DEFCB50EFA8C595ABEB7B5FB48704F218999E845EB244D730AE40DB91
                                                APIs
                                                • GetVersionExW.KERNEL32(0000011C), ref: 008B71D4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: Version
                                                • String ID:
                                                • API String ID: 1889659487-0
                                                • Opcode ID: 882a303787fa969404a246b08245efec93212e2843823d3fa132fc05a146eb16
                                                • Instruction ID: fac5fd2b195157ae8a8ee337b9927c95c6504a848a9627886178760e82732e1f
                                                • Opcode Fuzzy Hash: 882a303787fa969404a246b08245efec93212e2843823d3fa132fc05a146eb16
                                                • Instruction Fuzzy Hash: 0201DB32D002585BDB20EB6CDC02FDDB7F9EB89310F0000E5E949E7281DA755A5887D2
                                                APIs
                                                • CoCreateInstance.COMBASE(?,?,?,00DC43EC,CCCCCCCC), ref: 008B49C6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: CreateInstance
                                                • String ID:
                                                • API String ID: 542301482-0
                                                • Opcode ID: 175531ab89783753e0e9c7840212f4e0f207462ba7bb0b5ec6d4b3da678c0bbd
                                                • Instruction ID: 2298dad9f9088133ffd41630ed486964cbcd165546307ff3c6d45dca4382a2de
                                                • Opcode Fuzzy Hash: 175531ab89783753e0e9c7840212f4e0f207462ba7bb0b5ec6d4b3da678c0bbd
                                                • Instruction Fuzzy Hash: 19E01AB2D45218BF8B10EF8DD882DAFB7ACEF88350B008149F808D7300D671AE5087E6
                                                APIs
                                                • GetLocaleInfoW.KERNEL32(?,?,?,?), ref: 0089D886
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: InfoLocale
                                                • String ID:
                                                • API String ID: 2299586839-0
                                                • Opcode ID: 044bb8a885f857530cce0c5cb6002e11ec341037aa26df8a180897f8505945bf
                                                • Instruction ID: 8af049b099d40b6898194a87ec310947f9a5d28e2ded56a9bc54cedfcdf13e22
                                                • Opcode Fuzzy Hash: 044bb8a885f857530cce0c5cb6002e11ec341037aa26df8a180897f8505945bf
                                                • Instruction Fuzzy Hash: DCD0177210062C6F8B00EF9DE882C9A73ACAB8C210B404104FA1CD7640C630EC8087E2
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 0089D3EE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: FileFindFirst
                                                • String ID:
                                                • API String ID: 1974802433-0
                                                • Opcode ID: 0c0bf7eb06061cb366215cc5b8901239b988420ada33424209dcc16d7f02e180
                                                • Instruction ID: 9bb058eb9c0e011ee2d5c75a32ad75cdcd295f8996870e789495a21b32b83b5e
                                                • Opcode Fuzzy Hash: 0c0bf7eb06061cb366215cc5b8901239b988420ada33424209dcc16d7f02e180
                                                • Instruction Fuzzy Hash: 43D0123201072C6F8650BB9DD882DDD779CAE48260B404145F90CDB541CA75FC8087D2
                                                APIs
                                                • GetFileAttributesW.KERNEL32(?,?,00000000,FileUtility::WritePayloadContents,3FF913FA,?,?,?,00D78C78,000000FF), ref: 008B8AD7
                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000080,00000000,00000000,?,?), ref: 008B8C17
                                                • ReadFile.KERNEL32(?,?,00001000,?,00000000), ref: 008B8C48
                                                • CloseHandle.KERNEL32(?), ref: 008B8C98
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: File$AttributesCloseCreateHandleRead
                                                • String ID: ASCII payload log file detected: $Failed to concatenate$Failed to copy$FileUtility::WritePayloadContents$Log File Name: $No payload file log file created.$Unicode payload log file detected:
                                                • API String ID: 2880068760-1282105430
                                                • Opcode ID: a7f22dbca49be6442ade995837a613834ceda0a6b594abbb5cf73b9e39985e5c
                                                • Instruction ID: f612eab636aac92f40bb5d7bd666750d450e70d2484ee1cdbe1e30048f6b6fef
                                                • Opcode Fuzzy Hash: a7f22dbca49be6442ade995837a613834ceda0a6b594abbb5cf73b9e39985e5c
                                                • Instruction Fuzzy Hash: 92F15C71800228DACB24EB68CC96BEDB778FF54300F444199F14AE7592DF745B88CBA2
                                                APIs
                                                • SetDllDirectoryW.KERNEL32(00000000), ref: 008883FB
                                                • SetDllDirectoryW.KERNEL32(00000000), ref: 0088846D
                                                Strings
                                                • Manufacturers name : , xrefs: 0088855B
                                                • Failed to obtain Personality Information, xrefs: 00888480
                                                • Entered GetPersonalityInfo,Waiting for results...from PMDataCollector.lib->getPMInfo(), xrefs: 00888408
                                                • OFF, xrefs: 00888707
                                                • Copied all Personality Information to Framework, xrefs: 00888717
                                                • DupAPI::GetPersonalityInfo, xrefs: 0088837B
                                                • \hapi, xrefs: 008883AA
                                                • Data Location : , xrefs: 00888609
                                                • Obtained Personality Information, xrefs: 008884F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: Directory
                                                • String ID: Copied all Personality Information to Framework$Data Location : $DupAPI::GetPersonalityInfo$Entered GetPersonalityInfo,Waiting for results...from PMDataCollector.lib->getPMInfo()$Failed to obtain Personality Information$Manufacturers name : $OFF$Obtained Personality Information$\hapi
                                                • API String ID: 3297363577-1749413133
                                                • Opcode ID: d260d89ca9029011839f76cb2bfcc21b5db3a4825fde22cca70e134e53e4e283
                                                • Instruction ID: 602918edcd49e80d08998e92d6628f6a3c2573248c27918de10ac3ef5dcc382d
                                                • Opcode Fuzzy Hash: d260d89ca9029011839f76cb2bfcc21b5db3a4825fde22cca70e134e53e4e283
                                                • Instruction Fuzzy Hash: C5D13A71800258DBDB15EBA8CD91BDDBBB4FF55304F108199E14AA7292DB705F88CFA2
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,BIN,3FF913FA), ref: 0088C80D
                                                • FindResourceW.KERNEL32(00000000), ref: 0088C81B
                                                • GetModuleHandleW.KERNEL32(00000000,00000000), ref: 0088C83F
                                                • LoadResource.KERNEL32(00000000), ref: 0088C84D
                                                • LockResource.KERNEL32(?), ref: 0088C863
                                                • GetModuleHandleW.KERNEL32(00000000,00000000), ref: 0088C87D
                                                • SizeofResource.KERNEL32(00000000), ref: 0088C88B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: Resource$HandleModule$FindLoadLockSizeof
                                                • String ID: BIN
                                                • API String ID: 3835513469-1015027815
                                                • Opcode ID: 70b9f2f5dab6cacb2a96e3b6a58b6cfe01fd4f8cc60cb98fe8656fce8da7750d
                                                • Instruction ID: f290f8eaf97e5c80e4ff99b7ad6fc94e4b8d1d7a5ced95b22ea31c3dc42d8398
                                                • Opcode Fuzzy Hash: 70b9f2f5dab6cacb2a96e3b6a58b6cfe01fd4f8cc60cb98fe8656fce8da7750d
                                                • Instruction Fuzzy Hash: C3412E72900218AFCB14EFA9D946B9EB7B5FB84310F104618F515EB291DB75AE04CBE2
                                                APIs
                                                • RegOpenKeyExW.ADVAPI32(80000001,00DBD680,00000000,000F003F,?,?,00000000,EnableAutoPlay,3FF913FA), ref: 008634C7
                                                • RegCloseKey.ADVAPI32(?), ref: 00863578
                                                Strings
                                                • DisableAutoplay, xrefs: 00863504
                                                • DisableAutoplay, xrefs: 0086355C
                                                • Failed - Restoring default value for pop-up control registry, xrefs: 0086351E
                                                • EnableAutoPlay, xrefs: 0086347C
                                                • HKCU Enable Autoplay Failed, xrefs: 00863587
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: CloseOpen
                                                • String ID: DisableAutoplay$DisableAutoplay$EnableAutoPlay$Failed - Restoring default value for pop-up control registry$HKCU Enable Autoplay Failed
                                                • API String ID: 47109696-4014728294
                                                • Opcode ID: 94bb1575a5d86d3fe2879fa81ed7be4c1ee792c925dc40cada2e9f7d313f90fe
                                                • Instruction ID: 064fd38497bac728281e1364cbfb0be114161df9b735a2dadc5557dc72873218
                                                • Opcode Fuzzy Hash: 94bb1575a5d86d3fe2879fa81ed7be4c1ee792c925dc40cada2e9f7d313f90fe
                                                • Instruction Fuzzy Hash: EC419E72900218EFDB14EB98DC86FEDB774FB44704F504259E116BB291DF746A09CB92
                                                APIs
                                                Strings
                                                • Executable mentioned in MUP.xml does not contain extension: , xrefs: 0088A289
                                                • <, xrefs: 0088A30E
                                                • Shell Execute Error. System error text = , xrefs: 0088A3A5
                                                • Working Directory: , xrefs: 0088A228
                                                • DupAPI::Execute, xrefs: 0088A1B4
                                                • Command: , xrefs: 0088A1E6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: ErrorLast
                                                • String ID: <$Command: $DupAPI::Execute$Executable mentioned in MUP.xml does not contain extension: $Shell Execute Error. System error text = $Working Directory:
                                                • API String ID: 1452528299-2707517293
                                                • Opcode ID: 2202386c704aa8e46ca65951853b851c397580ce197aefb80cc97b7ec4bd052e
                                                • Instruction ID: 702a872769a103a3aad6613ac72a6fd98ac377d93f46afcd1bc95e958e659344
                                                • Opcode Fuzzy Hash: 2202386c704aa8e46ca65951853b851c397580ce197aefb80cc97b7ec4bd052e
                                                • Instruction Fuzzy Hash: B1914A71C00258DADB24EB98DC55FDDB7B4FF54300F1082A9E116A7291EB705F89CB92
                                                APIs
                                                • CoInitializeEx.COMBASE(00000000,00000002), ref: 0087043C
                                                • CoUninitialize.COMBASE ref: 0087050A
                                                Strings
                                                • DellInstaller::getOSBuildNumberAndMajorVersion, xrefs: 00870404
                                                • OS Build number and Major version are successfully fetched, xrefs: 008705EF
                                                • COM Initialization failed. CoInitializeEx() has returned , xrefs: 00870456
                                                • COM objects cleaned up, xrefs: 008704C5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: InitializeUninitialize
                                                • String ID: COM Initialization failed. CoInitializeEx() has returned $COM objects cleaned up$DellInstaller::getOSBuildNumberAndMajorVersion$OS Build number and Major version are successfully fetched
                                                • API String ID: 3442037557-3233016000
                                                • Opcode ID: 449c29eae954520c9bcd92da066cbe710a84cee4e3faba5fb21f9685a0433dcc
                                                • Instruction ID: 183505eb52292faaa8f684ab5a151b3f18a1ec3caf17eded4a54fcd4c9136d4c
                                                • Opcode Fuzzy Hash: 449c29eae954520c9bcd92da066cbe710a84cee4e3faba5fb21f9685a0433dcc
                                                • Instruction Fuzzy Hash: 55816C71801268DACB15EBA8CD56BDDBBB4FF55300F1041D9E14AB7292EB741F48CBA2
                                                APIs
                                                • CoInitializeEx.COMBASE(00000000,00000002), ref: 0088F13C
                                                • CoUninitialize.COMBASE ref: 0088F20A
                                                Strings
                                                • DupAPI::getOSBuildNumberAndMajorVersion, xrefs: 0088F104
                                                • COM Initialization failed. CoInitializeEx() has returned , xrefs: 0088F156
                                                • OS Build number and Major version are successfully fetched, xrefs: 0088F2EF
                                                • COM objects cleaned up, xrefs: 0088F1C5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: InitializeUninitialize
                                                • String ID: COM Initialization failed. CoInitializeEx() has returned $COM objects cleaned up$DupAPI::getOSBuildNumberAndMajorVersion$OS Build number and Major version are successfully fetched
                                                • API String ID: 3442037557-942405743
                                                • Opcode ID: bce0490e767ffb178f10a4aee30807a42859e6a5e1b4a134db0eeb3828d6829c
                                                • Instruction ID: 270472b982650fe7672bc372b76fb5b05be18d0d8341257464bd2f208baf9991
                                                • Opcode Fuzzy Hash: bce0490e767ffb178f10a4aee30807a42859e6a5e1b4a134db0eeb3828d6829c
                                                • Instruction Fuzzy Hash: D2815C71800268DEDB15EBA8CD52BDDB7B4FF55300F104199E14AB7292EB741F48CBA2
                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,3FF913FA), ref: 0088A02D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: ErrorLast
                                                • String ID: Verb: $<$Command: $DupAPI::Launch$Open file: $Shell Execute Error. System error text =
                                                • API String ID: 1452528299-2372720724
                                                • Opcode ID: 5508f4212bc7fdf7da3ab1ac17361c1cf1c4e8265e85fba077852d03098c4239
                                                • Instruction ID: efe439a3b4c0382e98bbe40ca2db14ea54d61df2b6c45665713e9da3eb7b9bb0
                                                • Opcode Fuzzy Hash: 5508f4212bc7fdf7da3ab1ac17361c1cf1c4e8265e85fba077852d03098c4239
                                                • Instruction Fuzzy Hash: FC814B71800258DEDB15EB98DC55BEDB7B4FF55300F008199E15AA7281EB705F89CFA2
                                                APIs
                                                • RegQueryValueExW.ADVAPI32(?,DisableAutoplay,00000000,00000004,00ECD018,00000004), ref: 00863717
                                                • RegCloseKey.ADVAPI32(?), ref: 0086372A
                                                Strings
                                                • SaveAutoPlay, xrefs: 0086367F
                                                • DisableAutoplay, xrefs: 0086370E
                                                • HKCU - Creating or opening registry for disabling Autorun failed, xrefs: 00863739
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue
                                                • String ID: DisableAutoplay$HKCU - Creating or opening registry for disabling Autorun failed$SaveAutoPlay
                                                • API String ID: 3356406503-1693785224
                                                • Opcode ID: d82ef134233e16631250dea96ff6250e7b62413081cf60a9f34db20ba2ab2564
                                                • Instruction ID: 7af3d62a421e8545d8d8dc903c149f6984cf2b9be8713fe1266f3a05264ed6c5
                                                • Opcode Fuzzy Hash: d82ef134233e16631250dea96ff6250e7b62413081cf60a9f34db20ba2ab2564
                                                • Instruction Fuzzy Hash: BB415E72900218AFDB14EB98DC42FEDB778FB44700F508269F516B7291DF752A49CBA2
                                                APIs
                                                • RegOpenKeyExW.ADVAPI32(80000001,00DBD680,00000000,000F003F,?,?,00000000,DisableAutoPlay,3FF913FA), ref: 00863319
                                                • RegCloseKey.ADVAPI32(?), ref: 00863364
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: CloseOpen
                                                • String ID: DisableAutoPlay$DisableAutoplay$HKCU Disable Autoplay Failed
                                                • API String ID: 47109696-2539090149
                                                • Opcode ID: 9fe6dd861e56dbb16d3e1025a8aaa62210b9ce45786bb2fc38e49f33316f8175
                                                • Instruction ID: c1499d890236852e52f1407d8964a1819e8b1193924e752ac70b49b9a5947923
                                                • Opcode Fuzzy Hash: 9fe6dd861e56dbb16d3e1025a8aaa62210b9ce45786bb2fc38e49f33316f8175
                                                • Instruction Fuzzy Hash: 15417F72D00258AFDB14EB98DC46BEEB775FF44704F104229E512AB291DF756A08CB92
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000), ref: 008F24A2
                                                • GetLastError.KERNEL32 ref: 008F24EA
                                                • LoadResource.KERNEL32(?,00000000), ref: 008F2508
                                                • SizeofResource.KERNEL32(?,00000000), ref: 008F2522
                                                • GetLastError.KERNEL32 ref: 008F253C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: ErrorLastResource$HandleLoadModuleSizeof
                                                • String ID:
                                                • API String ID: 1646277414-0
                                                • Opcode ID: 338674bbe57fee062e7617f74253c536bbbbcc3f69caaac898c4c696175636d3
                                                • Instruction ID: f4d56d28a36c37485b0f0cfe7eda0c531af6e74d1fa4778b4ccb68db061a6a4a
                                                • Opcode Fuzzy Hash: 338674bbe57fee062e7617f74253c536bbbbcc3f69caaac898c4c696175636d3
                                                • Instruction Fuzzy Hash: AA310CB1D00218AFCB50EFACC846BAEBBB5FF48310F504599E919EB245E7745A408BD2
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 008B6F8A
                                                • GetLastError.KERNEL32(?,?,00000000,00000000), ref: 008B6FBD
                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 008B6FEB
                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 008B7035
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$ErrorLast
                                                • String ID:
                                                • API String ID: 1717984340-0
                                                • Opcode ID: 90209bb8eaaf7a97a098d563d7527c24b5e5ab1b4a376a775715a8de424a657e
                                                • Instruction ID: e9289f674d9e879055d0ef8c068777a89c56417185f5b51edfac58b8c58cf9f8
                                                • Opcode Fuzzy Hash: 90209bb8eaaf7a97a098d563d7527c24b5e5ab1b4a376a775715a8de424a657e
                                                • Instruction Fuzzy Hash: 2051ECB5D00218AFDB54EF98C882BAEB7B5FB88704F108159F515EB381D775AE408BD1
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,3FF913FA), ref: 008B42CB
                                                • SysAllocStringLen.OLEAUT32(00000000,?), ref: 008B42F8
                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000000,000000FF,00000000,?), ref: 008B4326
                                                • SysFreeString.OLEAUT32(00000000), ref: 008B4344
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiStringWide$AllocFree
                                                • String ID:
                                                • API String ID: 447844807-0
                                                • Opcode ID: ca81056457b9a33ef41b764ee0fff29abb123d5b40184f831156b8736eb8141c
                                                • Instruction ID: 093c190172576b022d48690104194f2d8d422d88bf8b8e0325f4b5411f74de7f
                                                • Opcode Fuzzy Hash: ca81056457b9a33ef41b764ee0fff29abb123d5b40184f831156b8736eb8141c
                                                • Instruction Fuzzy Hash: 37410772900218AFCB14EFA8D986FDEB7B5FB48720F108219F525AB390D7356D44CB91
                                                APIs
                                                • FreeLibrary.KERNEL32(00000000), ref: 00871510
                                                • LocalFree.KERNEL32(00000000), ref: 008715CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: Free$LibraryLocal
                                                • String ID: wmiutils.dll
                                                • API String ID: 3007483513-1385082176
                                                • Opcode ID: a54192a5e262c2b680565a1491781e3c4af26dc68fddeab8798565415dc9f0b4
                                                • Instruction ID: cfbb19047097b71d3ec3c2ec35463952dd7f187bafdd2bd496e60d3e81969a4d
                                                • Opcode Fuzzy Hash: a54192a5e262c2b680565a1491781e3c4af26dc68fddeab8798565415dc9f0b4
                                                • Instruction Fuzzy Hash: 00518171D042489FCF14EFACD855BEDBBB4FF44304F248119E416AB286DB349949CB92
                                                APIs
                                                • RemoveDirectoryW.KERNEL32(00000000,00000000,?,00DC1BFC,3FF913FA), ref: 008866EA
                                                Strings
                                                • DupAPI::CleanupPayloadFolder, xrefs: 008865A4
                                                • Empty Payload Extract path. Exiting, xrefs: 008865E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2936357900.0000000000863000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                                • Associated: 00000000.00000002.2936325310.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000852000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000895000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.00000000008FC000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000B3E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000D6D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2936357900.0000000000DB8000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000E6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937017795.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937179704.0000000000ECD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937198074.0000000000ED0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000ED9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937218956.0000000000EDD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937267653.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937290705.0000000000EE4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937313094.0000000000EE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937332451.0000000000EE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000000EEC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001176000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2937355037.0000000001193000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_820000_Dell-Pair-Application_9DY26_WIN_1.jbxd
                                                Similarity
                                                • API ID: DirectoryRemove
                                                • String ID: DupAPI::CleanupPayloadFolder$Empty Payload Extract path. Exiting
                                                • API String ID: 597925465-655005624
                                                • Opcode ID: b811b08bdbd47bff1af112cce2e874031b3dd61771a6df7f4410d75a2e5ad98d
                                                • Instruction ID: 3d34621bb2387e39077cd706bd9e41a22f93cb5f5bda22b237b8bca472ca6606
                                                • Opcode Fuzzy Hash: b811b08bdbd47bff1af112cce2e874031b3dd61771a6df7f4410d75a2e5ad98d
                                                • Instruction Fuzzy Hash: 00516F71900268DEDB14EBA8C956BEDB775FF51304F1081ADE046A7292EF701F48CBA2